Basic Fortigate Firewall Configuration

InfoSec Write-ups – Medium–

( Beginners Guide part 2)

In the first part of our “Fortigate basic configuration guide”, we looked at administrator set up, interface configuration with DHCP service running that will lease ip addresses to your clients, and finally, we have configured a firewall address object for a specific device on our subnet, My Mac book.

We needed to create a firewall address object so that we could, later on, point specifically to that device on our subnet

Now it is time to let traffic from our interface get out to the internet with the static route and our first policy

Static Route

Routing is a destination decision making in other words, it is the thing that controls how packets are sent along the path from source to destination. Routing is an osi layer 3 decision, and network devices that belong to that class are known as Routers. Your FortiGate firewall, is not only a next-generation firewall, but it is also a router

Network devices that perform routing, contain a routing table, which helps them to specify the next hop for a packet, using rules. your FortiGate does routing lookups every time it needs to route packets

To see your FortiGate routing table, open the command line and type:

Get router info routing-table database

This command will show you all the routes at your fortigate, including those that are in active

Static route is Probably the most used route in a fortigate firewall ,It is manually configured and network experts, will always tell you , that you can do just about any route using static route, although you have dynamic routes , ( OSPF…) which are much more sophisticated

So in our topology we have the LAN which is at the 10.0.7.0/24 subnet, we also have our WAN interface which is connected to our router at the 10.0.3.55

We need to tell our fortigate “ if you see a packet that is coming from the 10.0.7.0 subnet , send it through our WAN interface ( the 10.0.3.55) towards our router “

Our static route, we be a default route, that is the same route, that youtube whenever you connect in your home to your ISP router, which means that any packet that does not have a specific route in your routing table , will be forwarded to the default route ( your router ISP ) as the default Hop

Default route is written in that way 0.0.0.0./0.0.0.0 , so let’s configure that in our fortigate

Head to Network — static route

And in static route create new static route , the following screen will appear

Static routes ( as dynamic routes ) have different attributes, that determine if they are Active or Not, Preferred more or Less, static route attributes are Distance and Priority ( available in the advanced options ) , we will not get to this, in this article , so keep the administrative distance to 10, that is the default setting

  • In destination , we will keep the 0.0.0.0/0.0.0.0 which is the default route
  • In interface we will choose the interface connected to our WAN , which is port 1
  • And in gateway address , we will enter, our router GW IP which is connected to our fortigate, in my case, it is 10.0.3.1

So , we have a default route that sends packets to our WAN interface , towards our ISP router.

Policy

Alright, we have our interface all set up, our firewall address object and now we also have a static route , that will let packet flow towards the ISP router on their way to the internet

What is missing? A Policy Of Course

You should think of policy as “Traffic matching”, that is , you define a rule that will allow or deny traffic, assuming that it finds a match , once it finds match ( that is your policy ) , that are a set of things, it can do with that traffic , allow or deny it, save logs, do a network address translation, apply a security policy and more

There are different types of policies in your fortigate, we will look at the most popular one and that is IPV4 policies

So , go to policies and objects ( you probably guessed it 🙂 , on your left Pane

Create new Policy, and you will see the following screen

We have said that a policy checks for traffic matching

Your traffic has different attributes to it ( source, destination, protocol that it is using, the time of day…), so lets fill in the missing details

Name your Policy

Incoming interface is our LAN Subnet ( which is at port 10 )

Outgoing interface is our WAN interface ( port 1 )

Source — currently choose any one , but then again , we can also choose, specific devices based on the firewall address objects we created as My loved Mac https://amzn.to/2HbU0Ua

Destination — again choose all, but you can also limit the destinations to be more specific as well known internet services

Schedule — you can set your policy to work 24 hours or in different days, in specific hours , as in the case where you need your specific device to backup your hosts

Service — which protocol ? will you allow only https and dns or any protocol out there, be granular , so your policies , will not become your back door

And the last thing is the ACTION, will allow or deny the traffic based on the different matches

Your policy, should look something like that

You will see that underneath the matching fields , you can set more criterias such as the inspection type ( Flow or Proxy ) , NAT, Security profiles , Logging and more , but this will have to wait for another article


Basic Fortigate Firewall Configuration was originally published in InfoSec Write-ups on Medium, where people are continuing the conversation by highlighting and responding to this story.

View original article on InfoSec Write-ups – Medium

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s