1. Cai-dat-va-cau-hinh-firewall-fortigate compress
Italiano (Instituto Universitario del Hospital Italiano)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
Cai-dat-va-cau-hinh-firewall-fortigate compress
Italiano (Instituto Universitario del Hospital Italiano)
Scan to open on Studocu
Studocu is not sponsored or endorsed by any college or university
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
2. Ci 畉t v c畉u h狸nh firewall Fortigate
1
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
3. M畛C L畛C
A. C叩c c畉u h狸nh c董 b畉n..............................................................................................4
1. K畉t n畛i m畛t m畉ng private t畛i m畉ng Internet s畛 d畛ng m畛t firewall Fortigate
trong mode NAT/Route.............................................................................................4
2. K畉t n畛i m畛t m畉ng private t畛i m畉ng Internet trong m畛t b動畛c...........................7
3. Thay 畛i 畛a ch畛 c畛a m畛t m畉ng trong (internal network) trong m畛t b動畛c s畛
d畛ng ch動董ng tr狸nh wizard setup c畛a Fortigate........................................................10
4. Troubeshooting cho vi畛c ci 畉t mode NAT/Route........................................12
5. Insert m畛t thi畉t b畛 Fortigate vo b棚n trong m畉ng m kh担ng lm 畉nh h動畛ng t畛i
c畉u h狸nh c畛a m畉ng (mode Transparent)...................................................................14
6. Troubleshooting cho vi畛c ci 畉t mode transparent.......................................18
7. Ki畛m tra version c畛a firmware hi畛n t畉i v upgrade firmware FortiOS..........21
8. Setup v troubleshooting c叩c d畛ch v畛 c畛a FortiGuard....................................21
9. Setup m畛t account admin tr棚n thi畉t b畛 Fortigate............................................21
B. C叩c c畉u h狸nh n但ng cao.........................................................................................24
1. K畉t n畛i m畛t thi畉t b畛 Fortigate v畛i 2 ISP cho m畛c 鱈ch redundant..................24
2. S畛 d畛ng m畛t modem cho m畛t k畉t n畛i redundant...........................................24
3. Ph但n ph畛i c叩c session gi畛a 2 k畉t n畛i internet redundant v畛i ECMP d畛a tr棚n
m畛c 畛 s畛 d畛ng.......................................................................................................24
4. B畉o v畛 m畛t web server trong m畉ng DMZ......................................................24
5. B畉o v畛 m畛t mail server v畛i m畛t thi畉t b畛 Fortigate m kh担ng lm thay 畛i
m畉ng (s畛 d畛ng mode transparent)...........................................................................24
6. S畛 d畛ng vi畛c gh辿p c畉p c畛ng 畛 董n gi畉n h坦a vi畛c ci 畉t mode transparent. 24
C. S畛 d畛ng c叩c policy v firewall object 畛 i畛u khi畛n traffic m畉ng.......................24
1. Gi畛i h畉n s畛 truy c畉p Internet c畛a nh但n vi棚n...................................................24
a. T畉o c叩c 畛i t動董ng address cho YouTube v Facebook...............................25
b. T畉o l畉p l畛ch 畛 gi畛i h畉n vi畛c truy c畉p trong th畛i gian t畛 12h t畛i 2h...........26
c. T畉o policy...................................................................................................26
d. S畉p x畉p l畉i v畛 tr鱈 c畛a c叩c policy..................................................................27
2. Gi畛i h畉n vi畛c truy c畉p Internet d畛a tr棚n 畛a ch畛 IP........................................28
2
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
4. a. T畉o c叩c firewall address cho m畛i group user..............................................29
b. T畉o c叩c l畉p l畛ch firewall.............................................................................29
c. T畉o c叩c policy............................................................................................30
d. S畉p x畉p l畉i v畛 tr鱈 c畛a c叩c policy..................................................................31
3. Exclude c叩c user kh畛i UTM filtering.............................................................31
4. Ki畛m tra r畉ng traffic 動畛c ch畉p nh畉n b畛i m畛t policy....................................31
5. S畉p x畉p c叩c policy theo th畛 t畛 炭ng..............................................................31
6. Cho ph辿p c叩c query DNS t畛i duy nh畉t m畛t DNS server 動畛c approve.........32
7. Extending AirPlay and AirPrint communication through a FortiWiFi unit....32
8. Ensuring sufficient and consistent bandwidth for VoIP traffic.......................32
9. Using geographic addresses...........................................................................32
10. Providing Internet access for your private network users (static source NAT)
32
11. Providing Internet access for a private network with multiple Internet
addresses (dynamic source NAT)............................................................................32
12. Dynamic source NAT without changing the source port (one-to-one source
NAT)32
13. Dynamic source NAT using the central NAT table........................................33
14. Allowing access to a web server on an internal network when you only have
one Internet IP address............................................................................................33
15. Allowing Internet access to a web server on a protected network when you
only have one Internet IP address, using port translation........................................33
16. Allowing Internet access to a web server on a protected network when you
have an IP address for the web server.....................................................................33
17. Configuring port forwarding to open ports on a FortiGate unit.....................33
18. NAT 畛a ch畛 鱈ch 畛ng cho m畛t d畉i 畛a ch畛 IP...............................................37
D. Profile UTM........................................................................................................41
E. SSL VPN.............................................................................................................41
1. Setting up remote web browsing for internal sites through SSL VPN...........41
a. T畉o m畛t firewall address for email server..................................................42
b. T畉o portal web............................................................................................42
3
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
5. c. T畉o m畛t user SSL VPN v group user........................................................43
d. T畉o m畛t policy SSL VPN...........................................................................44
2. Using SSL VPN to provide protected Internet access for remote users.........46
3. SSL VPN split tunneling: Using SSL VPN to provide protected Internet
access and access to head office servers for remote users.......................................46
4. Verifying that SSL VPN users have the most recent AV software before they
can log into the SSL VPN.......................................................................................46
F. IPSec VPN..........................................................................................................46
G. Authentication.....................................................................................................46
H. M畉ng WiFi..........................................................................................................46
I. Logging v Reporting..........................................................................................46
4
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
6. A. C叩c c畉u h狸nh c董 b畉n
1. K畉t n畛i m畛t m畉ng private t畛i m畉ng Internet s畛 d畛ng m畛t firewall Fortigate
trong mode NAT/Route
Problem:
Lm sao 畛 connect v c畉u h狸nh m畛t thi畉t b畛 Fortigate m畛i 畛 畉m b畉o vi畛c k畉t n畛i an
ton t畛i m畉ng Internet. Thi畉t b畛 Fortigate c滴ng s畉 b畉o v畛 m畉ng private kh畛i c叩c threat
t畛 ngoi Internet nh動ng v畉n cho ph辿p c叩c user b棚n trong m畉ng private c坦 th畛 k畉t n畛i
ra ngoi m畉ng Internet
Gi畉i ph叩p:
Nh狸n chung, Fortigate th動畛ng 動畛c install nh動 l m畛t router ho畉c gateway gi畛a m畉ng
private v m畉ng Internet. Fortigate v畉n hnh trong ch畉 畛 坦 動畛c g畛i l ch畉 畛
NAT/Route v畛i m畛c 鱈ch 畛 畉n i c叩c 畛a ch畛 c畛a m畉ng private khi c叩c thi畉t b畛 ny
truy c畉p ra ngoi internet
K畉t n畛i interface wan1 c畛a Fortigate t畛i thi畉t b畛 動畛c h畛 tr畛 b畛i P, thi畉t b畛 ny
th担ng th動畛ng l converter quang ho畉c modem
5
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
7. K畉t n畛i m畉ng internal vo interface internal c畛a Fortigate
B畉t ngu畛n thi畉t b畛 c畛a ISP, Fortigate v PC c畛a m畉ng internal
T畛 m畛t PC trong m畉ng internal, k畉t n畛i t畛i Fortigate th担ng qua giao di畛n qu畉n
l箪 web. B畉n c坦 th畛 c畉u h狸nh PC 畛 n坦 t畛 畛ng nh畉n 畛a ch畛 IP th担ng qua DHCP
sau 坦 browse t畛i 畛a ch畛 https://192.168.1.99 ho畉c b畉n c滴ng c坦 th畛 畉t cho n坦
m畛t 畛a ch畛 IP t挑nh n畉m trong d畉i 192.168.1.0/255.255.255.0
Login v畛i ti kho畉n username l admin v kh担ng c坦 pasword
i t畛i System > Network > Interface v ch畛n Edit interface wan1 v thay 畛i
c叩c th担ng s畛 sau:
T動董ng t畛 edit interface internal theo c叩c th担ng s畛 sau:
i t畛i Router > Static > Static Route v ch畛n Create New 畛 add tuy畉n default
route nh動 sau:
6
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
8. Ch炭 箪: M畛t tuy畉n default route lu担n lu担n c坦 畛a ch畛 IP 鱈ch v subnet mask 鱈ch l
0.0.0.0 v 0.0.0.0. Ch鱈nh v狸 v畉y b畉n s畉 ch畛 c坦 duy nh畉t m畛t tuy畉n default route. N畉u
danh s叩ch static route th畛c s畛 達 ch畛a m畛t tuy畉n default route th動c b畉n c坦 th畛 edit
ho畉c delete n坦 v add m畛t tuy畉n m畛i
i t畛i System > Network > DNS v add th担ng tin v畛 畛a ch畛 Primary DNS
server v Secondary DNS server
i t畛i Policy > Policy > Policy v ch畛n Create New 畛 add c叩c tham s畛 sau 畛
cho ph辿p user trong m畉ng private c坦 th畛 truy c畉p m畉ng Internet:
Ch畛n Enable NAT v Use Destination Interface Address
Ch畛n OK 畛 save policy l畉i
K畉t qu畉:
Tr棚n PC, b畉n c坦 th畛 k畉t n畛i t畛i interface internal c畛a Fortigate, m畛 m畛t web browser
v browse t畛i b畉t k畛 website no. B畉n c滴ng c坦 th畛 k畉t n畛i t畛i Internet th担ng qua FTP,
ho畉c b畉t k畛 giao th畛c no ho畉c ph動董ng th畛c k畉t n畛i no
i t畛i Policy > Policy > Policy v check 畛 c畛t Count 畛ng v畛i policy m b畉n 達 config
tr動畛c 坦 畛 xem c叩c trafic ang 動畛c x畛 l箪:
7
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
9. i t畛i Policy > Monitor > Session Monitor 畛 view c叩c session 達 動畛c x畛 l箪 b畛i
Fortigate
畛a ch畛 ngu畛n c畛a t畉t c畉 c叩c session n棚n l m畛t 畛a ch畛 n畉m trong d畉i m畉ng
192.168.1.0. 畛a ch畛 IP NAT ngu畛n cho t畉t c畉 c叩c session n棚n l 172.20.120.14 (ho畉c
m畛t 畛a ch畛 IP 達 add vo interface wan1). Policy ID n棚n l 1 v狸 坦 l gi叩 tr畛 ID default
cho ph辿p user trong m畉ng internal 動畛c ph辿p k畉t n畛i t畛i m畉ng Internet
B畉n c滴ng c坦 th畛 xem c叩c k畉t qu畉 b畉ng c叩ch i t畛i Policy > Monitor > Policy Monitor
畛 view m畛t graph v畛 c叩c session active c畛a m畛i policy. V狸 hi畛n t畉i ch炭ng ta ch畛 c坦
duy nh畉t m畛t policy n棚n trong m畛c ny ch畛 c坦 duy nh畉t m畛t entry
2. K畉t n畛i m畛t m畉ng private t畛i m畉ng Internet trong m畛t b動畛c
Problem:
B畉n mu畛n s畛 d畛ng 鱈t b動畛c nh畉t c坦 th畛 畛 s畛 d畛ng Fortigate up v cho ph辿p k畉t n畛i
m畉ng Internet cho m畛t m畉ng private
8
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
10. Gi畉i ph叩p:
N畉u nh cung c畉p d畛ch v畛 Internet c畛a b畉n (ISP) s畛 d畛ng giao th畛c DHCP 畛 cung
c畉p vi畛c k畉t n畛i internet cho h畛 th畛ng c畛a b畉n th狸 b畉n ch畛 c畉n th畛c hi畛n duy nh畉t m畛t
b動畛c c畉u h狸nh tr棚n Fortigate 畛 cho ph辿p m畉ng private c畛a b畉n c坦 th畛 k畉t n畛i t畛i
m畉ng Internet. C叩c b動畛c 畛 PC n畉m trong m畉ng internal c坦 th畛 l畉y 動畛c 畛a ch畛 IP v
k畉t n畛i t畛i Fortigate gi畛ng m畛c 1. T畛 nay v畛 sau s畉 kh担ng n坦i l畉i vi畛c ny v狸 coi nh動
坦 l b動畛c m畉c 畛nh ph畉i c坦 畛 b畉n c坦 th畛 c畉u h狸nh 動畛c Fortigate
9
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
11. i t畛i System > Network > Interface v edit interface wan1
Thi畉t l畉p Addressing Mode l DHCP v ch畛n Retrieve Default Gateway from
server v Override internal DNS
Ch畛n OK 畛 save s畛 thay 畛i
Ch炭 箪: N畉u ISP s畛 d畛ng ph動董ng ph叩p PPPoE ho畉c 叩nh 畛a ch畛 theo 畛a ch畛 do
ISP quy 畛nh th狸 b畉n ph畉i c畉u h狸nh interface wan1 theo c叩c option ny thay v狸 s畛
d畛ng DHCP
K畉t qu畉:
K畉t qu畉 b畉n nh畉n 動畛c s畉 gi畛ng nh動 m畛c 1 n畉u nh動 b畉n c畉u h狸nh 炭ng
Fix l畛i g畉p ph畉i:
N畉u b畉n c畉u h狸nh xong m kh担ng 畉t 動畛c k畉t qu畉 nh動 mong mu畛n th狸 h達y th畛c
hi畛n theo c叩c b動畛c nh動 sau:
Ki畛m tra interface wan1 達 c坦 th畛 nh畉n 動畛c c畉u h狸nh IP t畛 ISP. Login vo
Fortigate th担ng qua giao di畛n qu畉n l箪 web v i t畛i System > Network >
Interface > wan1. Ch畉c ch畉n r畉ng Addressing Mode 達 動畛c thi畉t l畉p l
DHCP v c叩c th担ng tin t動董ng t畛 nh動 c叩c th担ng s畛 sau:
10
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
12. N畉u 畛a ch畛 IP kh担ng 炭ng ho畉c b畛 thi畉u th狸 ch畛n Renew 畛 th畛c hi畛n gi畉i ph坦ng v
nh畉n l畉i 畛a chi IP. N畉u b畉n kh担ng th畛 nh畉n 動畛c m畛t 畛a ch畛 IP h畛p l畛 theo c叩ch ny
th狸 Fortigate kh担ng th畛 truy th担ng v畛i server DNS c畛a ISP
N畉u ISP kh担ng h畛 tr畛 vi畛c thi畉t l畉p DNS th担ng qua DHCP th狸 b畉n ph畉i c畉u h狸nh DNS
cho Fortigate th担ng qua System > Network > DNS
N畉u ISP kh担ng h畛 tr畛 vi畛c thi畉t l畉p default gateway cho b畉n th担ng qua DHCP th狸 b畉n
ph畉i thi畉t l畉p th担ng s畛 ny th担ng qua Router > Static > Static Route v tr畛 default
gateway t畛i 畛a ch畛 c畛a ISP
N畉u m畉ng internal 動畛c c畉u h狸nh 畛 nh畉n 畛a ch畛 IP th担ng qua DHCP t畛 Fortigate th狸
i t畛i System > Network > DHCP Server v edit th担ng tin DHCP server cho interface
internal. Trong tr動畛ng h畛p b畉n s畛 dung Fortigate lm DHCP server th狸 b畉n n畉u thi畉t
l畉p lu担n th担ng s畛 DNS. B畉n c坦 th畛 ki畛m tra th担ng tin v畛 c叩c PC 達 nh畉n 畛a ch畛 IP t畛
Fortigate th担ng qua System > Monitor > DHCP Monitor
Ki畛m tra l畉i 畛a ch畛 IP tr棚n c叩c PC c畛a m畉ng internal 畛 ch畉c ch畉n ch炭ng n畉m trong
c湛ng d畉i m畉ng v畛i d畉i m畉ng 動畛c c畉p ph叩t b畛i Fortigate.
N畉u th畛c hi畛n c叩c b動畛c tr棚n m kh担ng 動畛c h達y ki畛m tra l畉i k畉t n畛i v畉t l箪
3. Thay 畛i 畛a ch畛 c畛a m畛t m畉ng trong (internal network) trong m畛t b動畛c s畛
d畛ng ch動董ng tr狸nh wizard setup c畛a Fortigate
Problem:
S畛 d畛ng c叩c b動畛c 鱈t nh畉t c坦 th畛 畛 th畛c hi畛n thay 畛i 畛a ch畛 subnet c畛a m畛t interface
internal v t畉t c畉 c叩c thi畉t b畛 k畉t n畛i v畛i n坦
11
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
13. Gi畉i ph叩p:
S畛 d畛ng Fortigate setup wizard 畛 thay 畛i 畛a ch畛 IP c畛a interface internal tr棚n
Fortigate v thay 畛i c叩c 畛a ch畛 m畉ng m Fortigate DHCP server cung c畉p cho c叩c
thi畉t b畛 trong m畉ng internal. Renew l畉i 畛a ch畛 IP cho c叩c device trong m畉ng internal
Ch炭 箪: Khi b畉n s畛 d畛ng Fortigate setup wizard th狸 n坦 s畉 delete t畉t c畉 c叩c policy h畛
th畛ng v add vo 坦 m畛t policy thay th畉 畛 cho ph辿p m畉ng internal c坦 th畛 truy c畉p
動畛c vo Internet. Ch鱈nh v狸 畉c i畛m ny n棚n c坦 th畛 b畉n s畉 kh担ng mu畛n s畛 d畛ng gi畉i
ph叩p ny khi m b畉n 達 th畛c hi畛n add m畛t s畛 c叩c policy tr動畛c 坦.
T畛 m畛t PC trong m畉ng internal, login vo Fortigate th担ng qua tr狸nh qu畉n l箪
web
Ch畛n icon Wizard:
Thay 畛i c叩c th担ng s畛 trong trang Local Area Network (LAN) Settings theo
c叩c th担ng s畛 m畉ng m畛i nh動 sau:
Enable DHCP n棚n 動畛c l畛a ch畛n. Thay 畛i c叩c thi畉t l畉p nh動 sau:
12
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
14. Th畛c hi畛n renew l畉i 畛a ch畛 IP c畛a c叩c device trong m畉ng internal
K畉t qu畉:
B但y gi畛 c叩c thi畉t b畛 trong m畉ng internal bao g畛m interface internal c畛a Fortigate ph畉i
c坦 畛a ch畛 IP n畉m trong d畉i 192.168.50.0/255.255.255.0. Sau 坦 t畛 b畉t k畛 thi畉t b畛 no
trong d畉i m畉ng ny th畛 truy c畉p vo m畉ng Internet
Log vo Fortigate th担ng qua 畛a ch畛 IP m畛i, ki畛m tra l畉i DHCP, DNS v c叩c policy
c畉n thi畉t
4. Troubeshooting cho vi畛c ci 畉t mode NAT/Route
Problem:
B畉n 達 setup m畛t Fortigate trong ch畉 畛 NAT/Route v c叩c b動畛c nh動 c叩c m畛c tr棚n
nh動ng c叩c thi畉t b畛 trong m畉ng private c畛a b畉n th狸 kh担ng th畛 k畉t n畛i 動畛c t畛i Internet
Gi畉i ph叩p:
S畛 d畛ng m畛t trong c叩c b動畛c sau 畛 th畛c hi畛n t狸m v fix c叩c v畉n 畛 m b畉n ang g畉p
ph畉i:
13
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
15. Ki畛m tra k畉t n畛i v畉t l箪 gi畛a PC v Fortigate c滴ng nh動 l k畉t n畛i v畉t l箪 gi畛a
Fortigate v ISP. 畛 ki畛m tra tr畉ng th叩i c畛a c叩c k畉t n畛i v畉t l箪 ny b畉n c坦 th畛
lm ki畛m tra widget Unit Operation dashboard trong System > Dashboard >
Status 畛 ki畛m tra tr畉ng th叩i c畛a c叩c interface
Ki畛m tra l畉i c叩c thi畉t b畛 動畛c cung c畉p b畛i ISP 畛 ch畉c ch畉n r畉ng n坦 v畉n
hnh t畛t
Ki畛m tra 畛 ch畉c ch畉n r畉ng b畉n c坦 th畛 k畉t n畛i t畛i 動畛c 畛a ch畛 IP internal
c畛a Fortigate. V鱈 d畛 t畛 PC b畉n th畛c hi畛n ping t畛i 畛a ch畛 192.168.1.99 畛
ki畛m tra vi畛c k畉t n畛i t畛i Fortigate. N畉u kh担ng 動畛c, b畉n h達y ki畛m tra l畉i
xem 畛a ch畛 IP ang 動畛c thi畉t l畉p tr棚n m叩y c畛a b畉n c坦 thu畛c c湛ng d畉i
m畉ng v畛i interface internal hay kh担ng, n畉u OK h達y ki畛m tra l畉i k畉t n畛i v畉t
l箪 gi畛a PC c畛a b畉n v Fortigate ho畉c c畛a c叩c thi畉t b畛 trung gian n畉m gi畛a
PC c畛a b畉n v Fortigate
Check l畉i c畉u h狸nh c畛a interface internal tr棚n Fortigate
Check l畉i c畉u h狸nh c畛a interface k畉t n畛i v畛i m畉ng Internet 畛 ch畉c ch畉n l
interface ny 動畛c c畉u h狸nh 炭ng
Ki畛m tra vi畛c truy c畉p t畛 Fortigate t畛i m畉ng Internet th担ng qua vi畛c s畛
d畛ng l畛nh ping v traceroute trong mn h狸nh command line c畛a Fortigate
b畉ng c叩c c但u l畛nh sau:
# execute ping google.com.vn
# execute traceroute google.com.vn
Ki畛m tra l畉i vi畛c c畉u h狸nh DNS tr棚n Fortigate. B畉n c坦 th畛 check vi畛c c畉u
h狸nh c叩c l畛i c畛a DNS th担ng qua vi畛c ping ho畉c traceroute t畛i m畛t domain
name. N畉u nh畉n 動畛c th担ng b叩o theo ki畛u:
ping www.fortinet.com
ping: cannot resolve www.fre.com: Unknown host
th狸 ch畉c ch畉n b畉n n棚n ki畛m tra l畉i vi畛c c畉u h狸nh DNS
Ki畛m tra l畉i policy b畉ng c叩ch i t畛i Policy > Policy > Policy v ki畛m tra policy
internal -> wan1 達 動畛c add. Check c畛t Count 畛 xem li畛u policy ny c坦 動畛c
x畛 l箪 b畛i Fortigate hay kh担ng. Check l畉i c畉u h狸nh c畛a policy 畛 ch畉c ch畉n n坦
t動董ng t畛 v畛i c叩c th担ng s畛 sau:
14
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
16. Ch炭 箪 r畉ng Enable NAT v Use Destination Interface Address ph畉i 動畛c l畛a ch畛n
Ki畛m tra l畉i c畉u h狸nh 畛nh tuy畉n t挑nh static routing b畉ng c叩ch i t畛i Router >
Static > Static Route v ch畉c ch畉n r畉ng tuy畉n default route l 炭ng. i t畛i
Router > Monitor > Router Monitor 畛 ki畛m tra vi畛c i畛u khi畛n 畛nh tuy畉n v
tuy畉n default route xu畉t hi畛n trong danh s叩ch nh動 m畛t tuy畉n static route
Disable vi畛c l畛c web: Web filtering. N畉u b畉n 達 enable ch畛c nng l畛c web ny
trong m畛t policy th狸 n坦 c坦 th畛 block vi畛c truy c畉p t畛i c叩c web site m b畉n ang
mu畛n truy c畉p t畛i. 畛 fix v畉n 畛 ny b畉n i t畛i UTM Profiles > Web Filter >
Profile v trong profile default b畉n ch畛n Advanced Filter v enable t湛y ch畛n
Allow Websites When a Rating Error Occurs
Ngoi ra b畉n c滴ng c坦 th畛 th畛 gi畉i ph叩p sau:
o Ki畛m tra xem t畛 interface internal c畛a b畉n c坦 th畛 ping t畛i 動畛c interface
Internet hay kh担ng, v鱈 d畛 interface k畉t n畛i ra internet l 172.16.20.12 v
畛a ch畛 IP c畛a PC c畛a b畉n l 192.168.50.30 th狸 b畉n th畛 ping t畛 PC ny
t畛i 畛a ch畛 172.16.20.12. N畉u kh担ng 動畛c th狸 c坦 ngh挑a l Fortigate ang
ch畉n session t畛 d畉i internal sang internet
o Ki畛m tra l畉i k畉t n畛i c畛a b畉n t畛i ISP
5. Insert m畛t thi畉t b畛 Fortigate vo b棚n trong m畉ng m kh担ng lm 畉nh h動畛ng
t畛i c畉u h狸nh c畛a m畉ng (mode Transparent)
Problem:
15
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
17. Lm c叩ch no 畛 k畉t n畛i v c畉u h狸nh m畛t thi畉t b畛 Fortigate m畛i 畛 b畉o v畛 m畉ng m
kh担ng lm thay 畛i c畉u h狸nh c畛a m畉ng. M畉ng 動畛c k畉t n畛i v畛i Internet s畛 d畛ng m畛t
router, router ny s畉 th畛c hi畛n NAT
Gi畉i ph叩p ny cho ph辿p add c叩c policy vo m畉ng m kh担ng 動畛c ph辿p thay th畉 router.
Fortigate ph畉i th畛c hi畛n block vi畛c truy c畉p t畛 Internet vo m畉ng private nh動ng v畉n
cho ph辿p m畉ng private c坦 th畛 truy c畉p vo Internet. Ngoi ra Fortigate c嘆n ph畉i c坦
ch畛c nng i畛u khi畛n vi畛c s畛 d畛ng ti nguy棚n 畛ng d畛ng v t狸m c叩ch remove virus
Gi畉i ph叩p:
Tham kh畉o: http://docs.fortinet.com/cb/inst1.html
Ci 畉t thi畉t b畛 Fortigate trong mode transparent gi畛a m畉ng internal v router. Add
m畛t policy t畛i thi畉t b畛 Fortigate 畛 cho ph辿p ng動畛i d湛ng trong m畉ng internal c坦 th畛
connect t畛i Internet v add ch畛c nng qu辿t virus, i畛u khi畛n 畛ng d畛ng t畛i policy ny.
Kh担ng c坦 b畉t k畛 y棚u c畉u no li棚n quan t畛i vi畛c thay 畛i v畛 m畉ng ngo畉i tr畛 vi畛c cung
c畉p cho thi畉t b畛 Fortigate m畛t 畛a ch畛 IP qu畉n l箪
Ch炭 箪: Vi畛c thay 畛i mode c畛a Fortigate t畛 ch畉 畛 NAT/Route sang ch畉 畛
Transparent s畉 ph畉i remove ton b畛 c叩c c畉u h狸nh 動畛c th畛c hi畛n trong ch畉 畛
NAT/Route. N畉u b畉n mu畛n gi畛 l畉i c叩c c畉u h狸nh ny th狸 h達y ch畉c ch畉n r畉ng b畉n 達
backup l畉i ton b畛 c畉u h狸nh c畛a Fortigate th担ng qua widget System Information
C叩c b動畛c th畛c hi畛n nh動 sau:
16
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
18. i t畛i System > Dashboard > Status > System Information v b棚n c畉nh
Operation Mode v ch畛n Change v c畉u h狸nh theo c叩c th担ng s畛 sau:
Ch畛n Ok 畛 switch sang ch畉 畛 transparent
Login vo firewall qua giao di畛n web qu畉n l箪 th担ng qua 畛a ch畛 IP
https://10.31.101.40 t畉t nhi棚n h達y ch畉c ch畉n r畉ng 畛a ch畛 IP c畛a PC c畛a b畉n
n畉m c湛ng trong d畉i v畛i 畛a ch畛 IP c畛a Fortigate
i t畛i System > Network > DNS v add th担ng tin v畛 DNS server primary v
secondary
i t畛i Policy > Policy > Policy v ch畛n Create New 畛 add c叩c th担ng tin sau 畛
cho ph辿p ng動畛i d湛ng trong m畉ng private c坦 th畛 truy c畉p Internet:
Ch畛n UTM. Ch畛n Enable Antivirus v ch畛n Enable Application Control
Ch畛n OK 畛 save c畉u h狸nh c畛a policy
T畉t ngu畛n c畛a Fortigate
17
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
20. 畛a ch畛 ngu畛n c畛a t畉t c畉 c叩c session 畛u l trong m畉ng 10.31.10.0. 畛a ch畛 IP NAT
ngu畛n v c畛t port NAT ngu畛n 畛 tr畛ng v狸 l炭c ny Fortigate kh担ng 動畛c c畉u h狸nh
NAT/Route
6. Troubleshooting cho vi畛c ci 畉t mode transparent
Problem:
B畉n 達 setup c畉u h狸nh mode transparent cho Fortigate nh動ng traffic kh担ng pass 動畛c
qua thi畉t b畛 Fortigate
Gi畉i ph叩p:
S畛 d畛ng theo c叩c b動畛c sau 畛 t狸m v fix c叩c v畉n 畛 v畛 k畉t n畛i c畛a Fortigate trong
mode transparent:
Ki畛m tra k畉t n畛i v畉t l箪 gi畛a PC v Fortigate c滴ng nh動 l k畉t n畛i v畉t l箪 gi畛a
Fortigate v ISP. 畛 ki畛m tra tr畉ng th叩i c畛a c叩c k畉t n畛i v畉t l箪 ny b畉n c坦 th畛
lm ki畛m tra widget Unit Operation dashboard trong System > Dashboard >
Status 畛 ki畛m tra tr畉ng th叩i c畛a c叩c interface
Ki畛m tra l畉i c叩c thi畉t b畛 動畛c cung c畉p b畛i ISP 畛 ch畉c ch畉n r畉ng n坦 v畉n hnh
t畛t
Ki畛m tra 畛 ch畉c ch畉n r畉ng b畉n c坦 th畛 k畉t n畛i t畛i 動畛c 畛a ch畛 IP internal c畛a
Fortigate. V鱈 d畛 t畛 PC b畉n th畛c hi畛n ping t畛i 畛a ch畛 192.168.1.99 畛 ki畛m tra
vi畛c k畉t n畛i t畛i Fortigate. N畉u kh担ng 動畛c, b畉n h達y ki畛m tra l畉i xem 畛a ch畛 IP
19
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
21. ang 動畛c thi畉t l畉p tr棚n m叩y c畛a b畉n c坦 thu畛c c湛ng d畉i m畉ng v畛i interface
internal hay kh担ng, n畉u OK h達y ki畛m tra l畉i k畉t n畛i v畉t l箪 gi畛a PC c畛a b畉n v
Fortigate ho畉c c畛a c叩c thi畉t b畛 trung gian n畉m gi畛a PC c畛a b畉n v Fortigate
Ki畛m tra vi畛c truy c畉p t畛 Fortigate t畛i m畉ng Internet th担ng qua vi畛c s畛 d畛ng
l畛nh ping v traceroute trong mn h狸nh command line c畛a Fortigate b畉ng c叩c
c但u l畛nh sau:
# execute ping google.com.vn
# execute traceroute google.com.vn
Ki畛m tra l畉i vi畛c c畉u h狸nh DNS tr棚n Fortigate. B畉n c坦 th畛 check vi畛c c畉u h狸nh
c叩c l畛i c畛a DNS th担ng qua vi畛c ping ho畉c traceroute t畛i m畛t domain name.
N畉u nh畉n 動畛c th担ng b叩o theo ki畛u:
ping www.fortinet.com
ping: cannot resolve www.fre.com: Unknown host
th狸 ch畉c ch畉n b畉n n棚n ki畛m tra l畉i vi畛c c畉u h狸nh DNS
Ki畛m tra l畉i policy b畉ng c叩ch i t畛i Policy > Policy > Policy v ki畛m tra policy
internal -> wan1 達 動畛c add. Check c畛t Count 畛 xem li畛u policy ny c坦 動畛c
x畛 l箪 b畛i Fortigate hay kh担ng. Check l畉i c畉u h狸nh c畛a policy 畛 ch畉c ch畉n n坦
t動董ng t畛 v畛i c叩c th担ng s畛 sau:
Ki畛m tra l畉i c畉u h狸nh 畛nh tuy畉n t挑nh static routing b畉ng c叩ch i t畛i Router >
Static > Static Route v ch畉c ch畉n r畉ng tuy畉n default route l 炭ng
20
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
22. Disable vi畛c l畛c web: Web filtering. N畉u b畉n 達 enable ch畛c nng l畛c web ny
trong m畛t policy th狸 n坦 c坦 th畛 block vi畛c truy c畉p t畛i c叩c web site m b畉n ang
mu畛n truy c畉p t畛i. 畛 fix v畉n 畛 ny b畉n i t畛i UTM Profiles > Web Filter >
Profile v trong profile default b畉n ch畛n Advanced Filter v enable t湛y ch畛n
Allow Websites When a Rating Error Occurs
Ki畛m tra l畉i k畉t n畛i c畛a b畉n t畛i gateway 動畛c cung c畉p b畛i ISP. Th畛 ping t畛i
畛a ch畛 Ip c畛a default gateway t畛 m畛t PC t畛 trong m畉ng internal
Confirm r畉ng thi畉t b畛 Fortigate c坦 th畛 k畉t n畛i t畛i m畉ng FortiGuard. M畛t khi 達
register, firewall Fortigate s畉 ch畛a ch畛c nng antivirus v i畛u khi畛n 畛ng d畛ng
v c叩c update kh叩c t畛 m畉ng FortiGuard. Thi畉t b畛 Fortigate ph畉i c坦 th畛 k畉t n畛i
t畛i m畉ng t畛 畛a ch畛 IP qu畉n l箪 c畛a n坦. N畉u c叩c b動畛c test sau m cung c畉p c叩c
k畉t qu畉 sai, th狸 Fortigate kh担ng th畛 k畉t n畛i t畛i Internet t畛 畛a ch畛 IP qu畉n l箪.
Check tuy畉n default route c畛a Fortigate 畛 ch畉c ch畉n r畉ng n坦 l 炭ng. Check
l畉i firewall internet c畛a b畉n 畛 ch畉c ch畉n r畉ng n坦 cho ph辿p k畉t n畛i t畛 畛a ch畛 IP
qu畉n l箪 c畛a Fortigate t畛i m畉ng Internet.
o 畉u ti棚n check th担ng tin license trong widget License Information 畛
ch畉c ch畉n r畉ng tr畉ng th叩i c畛a t畉t c畉 c叩c service match v畛i c叩c service m
b畉n 達 mua. Thi畉t b畛 Fortigate k畉t n畛i v畛i m畉ng FortiGuard 畛 t鱈nh to叩n
th担ng tin ny
o i t畛i System > Config > FortiGuard. M畛 web filtering v t湛y ch畛n
email v ch畛n Test Availability. Sau m畛t ph炭t, tr狸nh qu畉n l箪 web based
s畉 th担ng b叩o r畉ng k畉t n畛i thnh c担ng
Check b畉ng FortiGate bridge. B畉ng bridge l m畛t list c叩c 畛a ch畛 MAC trong
c湛ng m畛t m畉ng nh動 c畛a Fortigate v 畛a ch畛 MAC c畛a c叩c interface Fortigate>
Thi畉t b畛 Fortigate s畛 d畛ng b畉ng ny 畛 x叩c 畛nh vi畛c forward m畛t g坦i tin. N畉u
m畛t 畛a ch畛 MAC c畛a m畛t thi畉t b畛 動畛c add vo b畉ng bridge th狸 c叩c g坦i tin v畛i
畛a ch畛 MAC 坦 s畉 b畛 block. Ch鱈nh v狸 v畉y h達y check l畉i b畉ng bridge 畛 ch畉c
ch畉n r畉ng c叩c 畛a ch畛 MAC 炭ng 動畛c add vo b畉ng bridge. S畛 d畛ng c但u l畛nh
sau trong CLI 畛 check b畉ng bridge:
21
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
23. N畉u 畛a ch畛 MAC c畛a thi畉t b畛 kh担ng 動畛c li畛t k棚 畛 但y th狸 Fortigate s畉 kh担ng th畛
t狸m th畉y thi畉t b畛 tr棚n m畉ng. i畛u ny c坦 th畛 ch畛 ra r畉ng thi畉t b畛 kh担ng 動畛c k畉t n畛i
ho畉c ang kh担ng v畉n hnh. Check l畉i k畉t n畛i m畉ng c畛a thi畉t b畛 v ch畉c ch畉n r畉ng
n坦 ang v畉n hnh 炭ng
7. Ki畛m tra version c畛a firmware hi畛n t畉i v upgrade firmware FortiOS
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Install-
basic/update_firmware.html
8. Setup v troubleshooting c叩c d畛ch v畛 c畛a FortiGuard
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Install-
basic/cb_install-fortiguard.html
9. Setup m畛t account admin tr棚n thi畉t b畛 Fortigate
Problem:
B畉n mu畛n add m畛t account administrator m畛i qu畉n tr畛 Fortigate, account ny c坦
quy畛n super admin v c坦 th畛 truy c畉p vo m畛i thu畛c t鱈nh c畛a Fortigate. B畉n c滴ng c坦
th畛 mu畛n x叩c 畛nh c叩c administrator ri棚ng bi畛t cho t畛ng ng動畛i d湛ng thay v狸 nhi畛u
ng動畛i s畛 d畛ng d湛ng m畛t account administrator l admin
22
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
24. Gi畉i ph叩p:
T畉o m畛t administrator m畛i v畛i profile l super_admin, v enable full quy畛n access t畛i
t畉t c畉 c叩c thu畛c t鱈nh c畛a Fortigate
i t畛i System > Admin > Adminitrators v ch畛n Create New 畛 add
administrator sau:
Ch畛n OK 畛 save administrator
Ch炭 箪: T棚n v password c畛a administrator ph但n bi畛t ch畛 hoa, ch畛 th動畛ng. B畉n kh担ng
th畛 s畛 d畛ng c叩c k箪 t畛 < > ( ) # trong t棚n 坦. Kho畉ng tr畉ng 動畛c cho ph辿p nh動ng
kh担ng ph畉i l k箪 t畛 畉u ti棚n v k箪 t畛 cu畛i c湛ng. Kho畉ng tr畉ng trong t棚n v password
c坦 th畛 g但y confuse v n坦 s畉 y棚u c畉u ph畉i d湛ng d畉u quote () 畛 nh畉p t棚n trong CLI
23
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
25. Profile admin l profile m畉c 畛nh c畛a Fortigate 動畛c s畛 d畛ng cho account admin 畛
truy c畉p vo t畉t c畉 c叩c thu畛c t鱈nh c畛a Fortigate, ph畛 thu畛c vo c叩c thu畛c t鱈nh m
ng動畛i d湛ng c坦 th畛 truy c畉p, b畉n c坦 th畛 畛nh ngh挑a ra c叩c profile kh叩c nhau, v畛i m畛i
profile b畉n 畛nh ngh挑a ra c叩c thu畛c t鱈nh m ng動畛i d湛ng c坦 th畛 truy c畉p
K畉t qu畉:
Login vo Fortigate s畛 d畛ng account v畛i username/password l
Terry_White/password. V畛i ti kho畉n ny b畉n c坦 th畛 view v thay 畛i t畉t c畉 c叩c thu畛c
t鱈nh c畛a Fortigate
i t畛i Log & Report > Event Log 畛 ki畛m tra c叩c s畛 ki畛n login c畛a ng動畛i d湛ng:
Ch畛n m畛t entry trong log 畛 xem th担ng tin chi ti畉t c畛a user 達 k畉t n畛i. Tr動畛ng
Message ch畛 ra r畉ng user Terry White 達 login thnh c担ng t畛 畛a ch畛 192.168.1.1
i t畛i System > Dashboard > Status v view widget System Information. Tr動畛ng
Current Administrator ch畛 ra s畛 l動畛ng administrator 達 login
Ch畛n Detail 畛 show ra c叩c th担ng tin chi ti畉t:
24
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
26. B. C叩c c畉u h狸nh n但ng cao
1. K畉t n畛i m畛t thi畉t b畛 Fortigate v畛i 2 ISP cho m畛c 鱈ch redundant
2. S畛 d畛ng m畛t modem cho m畛t k畉t n畛i redundant
3. Ph但n ph畛i c叩c session gi畛a 2 k畉t n畛i internet redundant v畛i ECMP d畛a tr棚n
m畛c 畛 s畛 d畛ng
4. B畉o v畛 m畛t web server trong m畉ng DMZ
5. B畉o v畛 m畛t mail server v畛i m畛t thi畉t b畛 Fortigate m kh担ng lm thay 畛i
m畉ng (s畛 d畛ng mode transparent)
6. S畛 d畛ng vi畛c gh辿p c畉p c畛ng 畛 董n gi畉n h坦a vi畛c ci 畉t mode transparent
C. S畛 d畛ng c叩c policy v firewall object 畛 i畛u khi畛n traffic m畉ng
1. Gi畛i h畉n s畛 truy c畉p Internet c畛a nh但n vi棚n
Problem:
B畉n mu畛n gi畛i h畉n vi畛c truy c畉p Internet c畛a nh但n vi棚n vo c叩c website nh動 YouTube
v Facebook trong kho畉ng th畛i gian t畛 12 gi畛 tr動a t畛i 2 gi畛 chi畛u
25
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
27. Gi畉i ph叩p:
T畉o m畛t l畉p l畛ch cho firewall (firewall schedule) cho ph辿p truy c畉p vo YouTube v
Facebook trong kho畉ng th畛i gian t畛 12h t畛i 2h. T畉o m畛t policy m畛i, policy ny s畉 bao
g畛m l畉p l畛ch firewall m b畉n 達 t畉o tr動畛c 坦. Policy ny s畉 hon ton 畛c l畉p v畛i
policy cho ph辿p browser t畛i Internet m b畉n ang s畛 d畛ng hi畛n t畉i
畛 lm 動畛c c叩c i畛u ny th狸 c叩c y棚u c畉u sau ph畉i 畉m b畉o th畛a m達n:
Ng動畛i s畛 d畛ng c坦 th畛 k畉t n畛i t畛i Fortigate 畛 truy c畉p Internet
C叩c policy cho ph辿p c叩c traffic t畛i v t畛 Internet. 畛 董n gi畉n h坦a, v鱈 d畛 ny s畛
d畛ng m畛t policy cho ph辿p t畉t c畉 c叩c truy c畉p t畛i v t畛 Internet
C叩c b動畛c sau ph畉i 動畛c th畛c hi畛n 畛 hon thnh y棚u c畉u tr棚n:
T畉o c叩c th畛c th畛 畛a ch畛 firewall (firewall address entries) cho YouTube v
Facebook
T畉o m畛t l畉p l畛ch tu畉n hon (recurring schedule) cho ph辿p truy c畉p c叩c website
ny
T畉o m畛t policy, policy ny s畉 reference t畛i c叩c trang web ny v l畉p l畛ch
Ch畉c ch畉n r畉ng policy ny n畉m 畛 top c畛a danh s叩ch policy
a. T畉o c叩c 畛i t動董ng address cho YouTube v Facebook
26
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
28. i t畛i Firewall Objects > Address > Address v ch畛n Create New v hon thnh c叩c
th担ng s畛 sau:
Ch畛n OK
Lm t動董ng t畛 v畛i trang facebook:
b. T畉o l畉p l畛ch 畛 gi畛i h畉n vi畛c truy c畉p trong th畛i gian t畛 12h t畛i 2h
i t畛i Firewall Objects > Schedule > Recurring v ch畛n Create New v hon
thnh c叩c th担ng s畛 sau:
Ch畛n OK
27
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
29. c. T畉o policy
T畉o m畛t policy m畛i, policy ny s畉 s畛 d畛ng l畉p l畛ch m畛i. Trong v鱈 d畛 ny, ch炭ng ta s畉
t畉o ra m畛t policy 畛 block vi畛c truy c畉p vo 2 website ny trong th畛i gian l畉p l畛ch
i t畛i Policy > Policy > Policy v chon Create New 畛 add policy m畛i nh畉m
c畉m vi畛c truy c畉p vo c叩c website ny trong th畛i gian t畛 12h t畛i 2h
Ch畛n OK
d. S畉p x畉p l畉i v畛 tr鱈 c畛a c叩c policy
Trong v鱈 d畛 ny, c坦 2 policy m畛i 動畛c add. Fortigate s畉 畛c c叩c policy ny theo chi畛u
t畛 cao xu畛ng th畉p. Khi c坦 m畛t i畛u ki畛n th畛a m達n n坦 s畉 d畛ng vi畛c 畛c policy ti畉p
theo. B畉n s畉 ph畉i chuy畛n v畛 tr鱈 c畛a policy nh動 sau:
畛 di chuy畛n 動畛c nh動 v畉y, b畉n lm nh動 sau:
28
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
30. Click chu畛t ph畉i vo policy Lunch Access v ch畛n Move To
Ch畛n Before v nh畉n s畛 policy cho t畉t c畉 c叩c policy access
Ch畛n OK
L畉p l畉i c叩c b動畛c tr棚n cho policy Deny 畛 move n坦 sau policy Lunch Access
Ch炭 箪: 畛 ch畉c ch畉n r畉ng t畉t c畉 c叩c session 動畛c t畉t 畛 cu畛i c畛a th畛i gian l畉p l畛ch, s畛
d畛ng l畛nh sau:
K畉t qu畉:
Ng動畛i d湛ng s畉 kh担ng th畛 truy c畉p vo c叩c website YouTube v Facebook trong th畛i
gian l畉p l畛ch
2. Gi畛i h畉n vi畛c truy c畉p Internet d畛a tr棚n 畛a ch畛 IP
Problem:
Lm th畉 no 畛 gi畛i h畉n vi畛c truy c畉p vo Internet d畛a tr棚n 畛a ch畛 c畛a user trong
m畉ng Internal
29
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
31. Gi畉i ph叩p:
X叩c 畛nh c叩c group user d畛a tr棚n 畛a ch畛 IP c畛a h畛 v add c叩c firewall address cho c叩c
group ny.
2 group user 動畛c x叩c 畛nh nh動 sau:
Nh坦m ng動畛i d湛ng k畛 thu畉t c坦 畛a ch畛 IP n畉m trong d畉i 10.10.20.100 畉n
10.10.20.150 (engineering)
Nh坦m ng動畛i d湛ng kinh doanh, marketing c坦 畛a ch畛 IP nm trong d畉i
10.10.20.30. 畉n 10.10.20.50 (marketing)
Y棚u c畉u l: Lm th畉 no 畛 cho ph辿p nh坦m marketing c坦 th畛 truy c畉p vo Internet
trong th畛i gian office (t畛 8h am 畉n 6h pm) nh動ng gi畛i h畉n kh畉 nng truy c畉p c畛a
nh坦m k畛 thu畉t ch畛 c坦 th畛 truy c畉p t畛i m畉ng Internet trong kho畉ng th畛i gian t畛 12h am
畉n 2h pm
a. T畉o c叩c firewall address cho m畛i group user
i t畛i Firewall Objects > Address > Address v ch畛n Create New 畛 add d畉i
畛a ch畛 cho nh坦m engineering:
Lm t動董ng t畛 v畛i nh坦m marketing:
30
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
32. b. T畉o c叩c l畉p l畛ch firewall
i t畛i Firewall Objects > Schedule > Recurring v ch畛n Create New 畛 add
m畛t l畉p l畛ch m畛i cho engineering:
Lm t動董ng t畛 v畛i nh坦m marketing:
Ch畛n OK
c. T畉o c叩c policy
i t畛i Policy > Policy > Policy v ch畛n Create New 畛 t畉o policy cho nh坦m
marketing:
31
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
33. Ch畛n Enable NAT v Use Destination Interface Address
Lm t動董ng t畛 v畛i nh坦m engineering
Ch畛n OK
d. S畉p x畉p l畉i v畛 tr鱈 c畛a c叩c policy
Di chuy畛n c叩c policy engineering v marketing l棚n top c畛a danh s叩ch policy. C叩ch
lm t動董ng t畛 nh動 m畛c B1
K畉t qu畉:
32
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
34. Ph嘆ng marketing c坦 th畛 truy c畉p m畉ng internet ngay l畉p t畛c trong khi 坦 ph嘆ng
engineering kh担ng th畛 k畉t n畛i m畉ng cho t畛i th畛i i畛m nh動 trong l畉p l畛ch
3. Exclude c叩c user kh畛i UTM filtering
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb_fw_ex
clude-group.html
4. Ki畛m tra r畉ng traffic 動畛c ch畉p nh畉n b畛i m畛t policy
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb_fw_ver
ifytraffic.html
5. S畉p x畉p c叩c policy theo th畛 t畛 炭ng
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb_fw_ord
eringpolicies.html
6. Cho ph辿p c叩c query DNS t畛i duy nh畉t m畛t DNS server 動畛c approve
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb_fw_de
nyallowdns.html
7. Extending AirPlay and AirPrint communication through a FortiWiFi unit
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb_fw_air
play_airprint.html
8. Ensuring sufficient and consistent bandwidth for VoIP traffic
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/traffic_sha
ping_voip.html
9. Using geographic addresses
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb_fw_ge
oaddrschdl.html
33
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
35. 10.Providing Internet access for your private network users (static source NAT)
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-snat.html
11. Providing Internet access for a private network with multiple Internet
addresses (dynamic source NAT)
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-snat1.html
12.Dynamic source NAT without changing the source port (one-to-one source
NAT)
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-snat2.html
13.Dynamic source NAT using the central NAT table
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-snat3.html
14.Allowing access to a web server on an internal network when you only have
one Internet IP address
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-dnat.html
15.Allowing Internet access to a web server on a protected network when you
only have one Internet IP address, using port translation
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-dnat1.html
16.Allowing Internet access to a web server on a protected network when you
have an IP address for the web server
34
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
36. http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-dnat2.html
17.Configuring port forwarding to open ports on a FortiGate unit
Problem:
B畉n mu畛n cho ph辿p c叩c k畉t n畛i t畛 Internet t畛i m畛t PC trong m畉ng internal 畛 PC c坦
th畛 access m畛t service Internet y棚u c畉u m畛 c叩c port. Service y棚u c畉u m畛 c叩c port
TCP n畉m trong d畉i 7882 t畛i 7999 c滴ng nh動 l m畛 c叩c port UDP 鱈ch l 2119 v 2995
Gi畉i ph叩p:
V鱈 d畛 ny s畉 ch畛 ra c叩ch lm th畉 no 畛 c畉u h狸nh c叩c firewall VIP 畛 map c叩c session
sau t畛i PC trong m畉ng internal:
C叩c session TCP t畛i 畛a ch畛 IP c畛a wan1 v畛i 畛a ch畛 port 鱈ch n畉m trong d畉i
7882 t畛i 7999
35
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
37. C叩c session UDP t畛i 畛a ch畛 IP c畛a wan1 v畛i 畛a ch畛 port 鱈ch l 2119 v 2995
Gi畉i ph叩p ny li棚n quan t畛i vi畛c t畉o ra nhi畛u VIP 畛 map c叩c session t畛 畛a ch畛 IP c畛a
wan1 t畛i 畛a ch畛 IP c畛a PC v add c叩c VIP t畛i m畛t group VIP v add group VIP 坦 t畛i
policy internal
i t畛i Firewall Objects > Virtual IP > Virtual IP v ch畛n Create New 畛 add
m畛t virtual IP v畛i m畛c 鱈ch 畛 map c叩c k畉t n畛i t畛i interface wan1 tr棚n c叩c port
t畛 7882 畉n 7999 t畛i server
Ch畛n Port Forwarding v c畉u h狸nh nh動 sau:
Ch畛n OK 畛 save VIP
Lm t動董ng t畛 v畛i session UDP c坦 port 2119 v port 2995
36
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
38. i t畛i Firewall Objects > Virtual IP > VIP Group v ch畛n Create New 畛 add
m畛t VIP Group 畛 include t畉t c畉 3 VIP
37
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
39. Add Server Port Range, First UDP Port VIP v Second UDP Port VIP t畛i danh
s叩ch Members
i t畛i Policy > Policy > Policy v ch畛n Create New 畛 add m畛t policy, policy
ny s畉 accept group VIP m ch炭ng ta 達 t畉o ra tr動畛c 坦
Ch畛n OK 畛 save policy
Ch炭 箪: N畉u b畉n ch畛n NAT th狸 畛a ch畛 ngu畛n s畉 動畛c thay 畛i t畛i 畛a ch畛 c畛a interface
internal. Th担ng th動畛ng, b畉n s畉 kh担ng mu畛n th畛c hi畛n NAT ngu畛n v狸 i畛u ny s畉 l畉m
畉n i c叩c 畛a ch畛 ngu畛n th畛c s畛 c畛a c叩c session
K畉t qu畉:
T畉t c畉 c叩c packet 動畛c accept b畛i policy ph畉i c坦 m畛t 畛a ch畛 port 鱈ch 動畛c 畛nh
ngh挑a trong VIP. VIP c滴ng translate 畛a ch畛 IP 鱈ch l 172.20.120.14 thnh
192.168.1.110 tr動畛c khi 動畛c forward t畛i m畉ng internal cho server. C叩c port 鱈ch, 畛a
ch畛 IP ngu畛n v port ngu畛n kh担ng thay 畛i
畛 test c畉u h狸nh, b畉n c坦 th畛 th畛 c叩c l畛nh sau:
38
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
40. Ho畉c c叩c l畛nh kh叩c 畛ng v畛i c叩c port kh叩c nh動 sau:
T動董ng t畛, check Policy Monitor 畛 check c叩c session hi畛n ang 動畛c x畛 l箪 nh動 trong
c叩c m畛c 達 tr狸nh by tr動畛c
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-dnat3.html
18.NAT 畛a ch畛 鱈ch 畛ng cho m畛t d畉i 畛a ch畛 IP
Problem:
B畉n mu畛n cho ph辿p ng動畛i s畛 d畛ng tr棚n Internet c坦 th畛 truy c畉p t畛i 3 web server trong
m畉ng internal c畛a b畉n. B畉n c坦 3 畛a ch畛 Internet cho web server (thu畛c d畉i
172.20.120.100 - 103) v m畛i server c坦 m畛t 畛a ch畛 IP tr棚n m畉ng internal
(192.168.20.120 - 123)
Gi畉i ph叩p:
39
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
41. 畛 cho ph辿p c叩c k畉t n畛i t畛i c叩c web server, b畉n ph畉i c畉u h狸nh Fortigate 畛 accept c叩c
session HTTP v畛i 畛a ch畛 鱈ch n畉m trong d畉i 172.20.120.100 103 v translate 畛a
ch畛 IP 鱈ch ny thnh 192.168.1.120 123 tr動畛c khi forward session ny t畛i m畛t web
server
Ngoi ra, port 動畛c s畛 d畛ng b畛i m畛i web server accept c叩c k畉t n畛i HTTP l port 80
chu畉n c畛a HTTP. Nh動ng b畉n mu畛n c叩c k畉t n畛i t畛 Internet t畛i c叩c web server s畛 d畛ng
port 8000
i t畛i Firewall Objects > Virtual IP > Virtual IP v ch畛n Create New 畛 add
m畛t virtual IP 畛 map c叩c 畛a ch畛 IP internet c畛a web server t畛i c叩c 畛a ch畛 IP
th畛c s畛 c畛a n坦 trong m畉ng internal
Ch畛n Port Forwarding v c畉u h狸nh nh動 sau:
Ch畛n OK 畛 save VIP
i t畛i Policy > Policy > Policy v ch畛n Create New 畛 add m畛t policy cho
ph辿p ng動畛i d湛ng tr棚n m畉ng internet c坦 th畛 truy c畉p vo web server
40
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
42. Ch畛n OK 畛 save policy
Ch炭 箪: N畉u b畉n ch畛n NAT th狸 畛a ch畛 ngu畛n s畉 動畛c thay 畛i t畛i 畛a ch畛 c畛a interface
internal. Th担ng th動畛ng, b畉n s畉 kh担ng mu畛n th畛c hi畛n NAT ngu畛n v狸 i畛u ny s畉 l畉m
畉n i c叩c 畛a ch畛 ngu畛n th畛c s畛 c畛a c叩c session
K畉t qu畉:
C叩c g坦i tin HTTP 動畛c accept b畛i policy ny c坦 畛a ch畛 IP 鱈ch c畛a ch炭ng 動畛c
translate nh動 sau:
172.20.120.100 thnh 192.168.1.120
172.20.120.101 thnh 192.168.1.121
172.20.120.102 thnh 192.168.1.122
172.20.120.103 thnh 192.168.1.123
Trong t畉t c畉 c叩c tr動畛ng h畛p, 畛a ch畛 port 鱈ch 動畛c translate t畛 8080 thnh 80. 畛a ch畛
IP ngu畛n v 畛a ch畛 port ngu畛n kh担ng thay 畛i
畛 test vi畛c NAT 鱈ch b畉n th畛c hi畛n browse t畛i c叩c 畛a ch畛 http://172.20.120.100
103:8000 t畛 m畉ng internet. S畛 d畛ng c叩c l畛nh sau 畛 th畛c hi畛n b畉t c叩c g坦i tin:
41
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
43. Trong k畉t qu畉 畉u ra b畉n s畉 nh畉n th畉y nh動 sau:
D嘆ng 畉u ra 畉u ti棚n ch畛 ra r畉ng m畛t g坦i t畛 m畛t thi畉t b畛 client v畛i 畛a ch畛 IP
172.20.120.12 動畛c nh畉n b畛i interface wan1 v畛i 畛a ch畛 鱈ch l 172.20.120.100
v畛i 畛a ch畛 port 鱈ch l 8000
D嘆ng th畛 2 ch畛 ra r畉ng khi g坦i tin exit t畛 interface internal th狸 畛a ch畛 鱈ch 動畛c
thay 畛i t畛i 192.168.1.120 v 畛a ch畛 port 動畛c thay 畛i thnh 80
D嘆ng th畛 3 ch畛 ra response t畛 web server
D嘆ng th畛 4 ch畛 ra response t畛 web server ang 動畛c tr畉 v畛 thi畉t b畛 client. 畛a
ch畛 ngu畛n 動畛c thay 畛i l畉i thnh 172.20.120.100 v 畛a ch畛 port ngu畛n 動畛c
thay 畛i l畉i thnh 8000
C叩c 畛a ch畛 port ngu畛n ban 畉u kh担ng thay 畛i
Vi畛c ki畛m tra l畉i ho畉t 畛ng c畛a policy 動畛c th畛c hi畛n t動董ng t畛 nh動 c叩c m畛c tr動畛c
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/Firewall/cb-
firewall-dnat4.html
D. Profile UTM
E. SSL VPN
1. Setting up remote web browsing for internal sites through SSL VPN
Problem:
B畉n mu畛n cung c畉p cho ng動畛i d湛ng t畛 xa c坦 th畛 truy c畉p vo c叩c site internal c畛a
c担ng ty v c叩c site external li棚n quan t畛i c担ng ty (company-related external sites)
42
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
44. Gi畉i ph叩p:
Vi畛c s畛 d畛ng SSL VPN cho ph辿p b畉n c坦 th畛 t畉o ra m畛t c畛ng h畉m web (web portal) m
th担ng qua n坦 ng動畛i d湛ng t畛 xa c坦 th畛 k畉t n畛i v view m畛t list c叩c 動畛ng d畉n cho c叩c
server v website n畛i b畛
a. T畉o m畛t firewall address for email server
T畉o m畛t firewall address cho email server
畛 add 畛a ch畛 c畛a m畛t email server, i t畛i Firewall Objects > Address >
Address v ch畛n Create New v nh畉p vo 畛a ch畛 c畛a email server
43
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
45. Ch畛n OK
b. T畉o portal web
T畉o portal SSL VPN v m畛t bookmark cho email server 畛 ng動畛i d湛ng c坦 th畛 k畉t n畛i
vo sau khi 達 login
i t畛i VPN > SSL > Config v v畛i IP Pools ch畛n Edit v add twhite vo b畉ng
Selected
i t畛i VPN > SSL > Portal v ch畛n Create New 畛 t畉o portal
Ch畛n OK 畛 坦ng c畛a s畛 Edit Setting
Trong portal web m畉c 畛nh, x坦a widget Bookmarks b畉ng c叩ch ch畛n icon
Remove c畛a n坦 (nh狸n gi畛ng k箪 t畛 X)
Tr棚n Add Widget 畛 ph鱈a b棚n ph畉i c畛a portal m畉c 畛nh, ch畛n Bookmarks
Trong widget Bookmark m畛i ch畛n icon Edit (nh狸n gi畛ng m畛t c叩i b炭t ch狸)
(Option) Edit Name v ch畉c ch畉n r畉ng Applications 動畛c thi畉t l畉p l
HTTP/HTTPS
Ch畛n OK trong widget Bookmarks
Trong widget Bookmarks ch畛n Add v t畉o m畛t bookmark 畛 link trang web
c畛a email server
44
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
46. Ch畛n OK 畛 cu畛i c畛a widget Bookmarks
Ch畛n Apply 畛 畛nh c畛a trang portal web 畛 save c畉u h狸nh
Ch炭 箪:
Vi畛c add v lm vi畛c v畛i c叩c widget web portal c坦 th畛 g但y confuse v t畉o ra c叩c k畉t
qu畉 kh担ng mong mu畛n. Ch鱈nh v狸 v畉y lu担n lu担n ch畛n Always 畛 畛nh c畛a trang web
portal sau khi th畛c hi畛n m畛t s畛 thay 畛i. Khi b畉n 達 hon thnh t畉t c畉 c叩c thay 畛i,
navigate t畛i trang qu畉n l箪 kh叩c v quay l畉i trang web portal ny 畛 ch畉c ch畉n r畉ng c叩c
s畛 thay 畛i c畛a b畉n 達 動畛c l動u
c. T畉o m畛t user SSL VPN v group user
T畉o user SSL VON v add user 坦 vo m畛t group user cho vi畛c s畛 d畛ng SSL VPN
i t畛i User > User > User v ch畛n Create New 畛 add user
i t畛i User > User Group > User Group v ch畛n Create New 畛 add twhite t畛i
group user SSL VPN
Ch炭 箪: Ch畉c ch畉n r畉ng b畉n ch畛n Allow SSL-VPN Access v b畉n c滴ng l畛a ch畛n SSL
VPN web portal 畛 c叩c thnh vi棚n c畛a group user ny c坦 th畛 connect t畛i. N畉u kh担ng
connect 動畛c, nh坦m user Sales s畉 kh担ng xu畉t hi畛n trong danh s叩ch group khi c畉u h狸nh
policy authen cho SSL VPN
Di chuy畛n twhite t畛i dnah s叩ch Members
Ch畛n OK
d. T畉o m畛t policy SSL VPN
45
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
47. i t畛i Policy > Policy > Policy v ch畛n Create New 畛 add policy SSL VPN
Ch畛n Configure SSL-VPN Users v ch畛n Add 畛 add m畛t quy t畉c authen
(authentication rule) cho ng動畛i d湛ng SSL VPN remote t畛 xa
Ch炭 箪: N畉u nh坦m ng動畛i d湛ng Sales kh担ng xu畉t hi畛n trong danh s叩ch User Group th狸
h達y ch畉c ch畉n r畉ng b畉n 達 ch畛n SSL VPN Access khi t畉o group user. N畉u t湛y ch畛n 坦
kh担ng 動畛c l畛a ch畛n th狸 nh坦m ng動畛i d湛ng Sales s畉 kh担ng xu畉t hi畛n trong danh s叩ch
group khi c畉u h狸nh policy authen
Ch畛n OK
K畉t qu畉:
畛 ki畛m tra setup 達 work, th畛c hi畛n nh動 sau:
T畛 internet, browse t畛i website https://172.20.120.136:10443/remote/login
Login vo web portal:
Sau khi login, portal SSL VPN xu畉t hi畛n nh動 sau:
46
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
48. Ch畛n link Email trong widget Bookmarks
Portal launch m畛t c畛a s畛 m畛i hi畛n th畛 website c畛a email server
i t畛 VPN > Monitor > SSL-VPN Monitor 畛 view danh s叩ch c叩c user 達 k畉t
n畛i s畛 d畛ng SSL-VPN
Check Policy > Monitor > Session Monitor 畛 check th担ng tin c畛a policy 達
c畉u h狸nh:
Ch炭 箪: B畉n c滴ng c坦 th畛 s畛 d畛ng l畛nh sau:
Debug application sslvpn -1
畛 debug th担ng tin li棚n quan t畛i vi畛c login c畛a user th担ng qua SSL VPN
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/SSL-
VPN/ssl_internet_browsing.html
2. Using SSL VPN to provide protected Internet access for remote users
Problem:
B畉n mu畛n cung c畉p
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/SSL-
VPN/ssl_browsing.html
47
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780
49. 3. SSL VPN split tunneling: Using SSL VPN to provide protected Internet
access and access to head office servers for remote users
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/SSL-
VPN/ssl_tunnel_mode.html
4. Verifying that SSL VPN users have the most recent AV software before they
can log into the SSL VPN
http://docs.fortinet.com/cb/html/index.html#page/FOS_Cookbook/SSL-
VPN/SSL_user_correct_software.html
F. IPSec VPN
G. Authentication
H. M畉ng WiFi
I. Logging v Reporting
48
Downloaded by hainguyenit.edubit .vn (dragonhunt911@gmail.com)
lOMoARcPSD|36941780