Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007



Similar documents
Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Please report errors or omissions in this or any Fortinet technical document to

Connecting an Android to a FortiGate with SSL VPN

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

Configuring IPsec VPN between a FortiGate and Microsoft Azure

FortiGate High Availability Overview Technical Note

FortiOS Handbook IPsec VPN for FortiOS 5.0

Configuring IPsec VPN with a FortiGate and a Cisco ASA

High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3

USER GUIDE. FortiGate SSL VPN User Guide Version 3.0 MR5.

Chapter 6 Virtual Private Networking Using SSL Connections

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

(91) FortiOS 5.2

Configuring Global Protect SSL VPN with a user-defined port

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Using VDOMs to host two FortiOS instances on a single FortiGate unit

FortiOS Handbook Install and System Administration for FortiOS 5.0

NETASQ MIGRATING FROM V8 TO V9

Chapter 2 Connecting the FVX538 to the Internet

HA OVERVIEW. FortiGate FortiOS v3.0 MR5.

USER GUIDE. FortiOS v3.0 MR7 SSL VPN User Guide.

Chapter 8 Router and Network Management

FortiOS Handbook - Getting Started VERSION 5.2.2

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Fortinet Network Security NSE4 test questions and answers:

Multi-Homing Security Gateway

For extra services running behind your router. What to do after IP change

Setting Up Scan to SMB on TaskALFA series MFP s.

System Administration. FortiOS Handbook v3 for FortiOS 4.0 MR3

Fortigate Features & Demo

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

INSTALL GUIDE. FortiGate-60 series and FortiGate-100A FortiOS 3.0 MR4.

Innominate mguard Version 6

FortiOS Handbook SSL VPN for FortiOS 5.0

Using IPsec VPN to provide communication between offices

Barracuda Link Balancer

SonicWALL PCI 1.1 Implementation Guide

Fortinet Certified Network Security Administrator

How To Configure Syslog over VPN

Fireware Essentials Exam Study Guide

Firewalls und IPv6 worauf Sie achten müssen!

FortiOS Handbook - SSL VPN VERSION 5.2.4

UIP1868P User Interface Guide

Broadband Phone Gateway BPG510 Technical Users Guide

FortiOS Handbook - IPsec VPN VERSION 5.2.2

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

SNMP Monitoring Guide

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

FortiOS Handbook - IPsec VPN VERSION 5.2.4

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Using SonicWALL NetExtender to Access FTP Servers

How To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Chapter 10 Troubleshooting

Chapter 9 Monitoring System Performance

Configuring a FortiGate unit as an L2TP/IPsec server

How to Set Up an IPsec Connection with RADIUS Authentication (with SIP)

Chapter 3 LAN Configuration

SonicOS Enhanced Release Notes

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Innominate mguard Version 7.0 Configuration Examples

FortiOS Handbook - Authentication VERSION 5.2.6

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

LinkProof And VPN Load Balancing

Hillstone Multi-Core Security Appliance Easy Configuration Guide

FortiOS Handbook - WAN Optimization, Web Cache, Explicit Proxy, and WCCP VERSION 5.2.4

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Troubleshooting. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiGate Troubleshooting Guide

Lab Configuring Access Policies and DMZ Settings

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

enetworks TM Using the Syslog Feature C.1 Configuring the Syslog Feature

FortiGate 200A. Administration Guide. FortiGate-200A Administration Guide Version 2.80 MR8 4 February

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Preparing for Version 10

Chapter 3 Security and Firewall Protection

Using a VPN with Niagara Systems. v0.3 6, July 2013

DSL-G604T Install Guides

Edgewater Routers User Guide

IP Office Technical Tip

Case Study for Layer 3 Authentication and Encryption

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

Using a VPN with CentraLine AX Systems

NEFSIS DEDICATED SERVER

Securing Networks with PIX and ASA

ADMINISTRATION GUIDE Cisco Small Business

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

Transcription:

Feature Brief FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

Revision History Revision Change Description 1.0 Initial Release. 1.1 Removed sectoin on Content Archive and AV Quarantine Feature Modification. Introduction The FortiOS v3.00 MR5 release of the FortiGate Multi-Threat Security System introduces new features and enhancements. The following is a description of these changes. Central Management Services FortiOS v3.00 MR5 enhances the subscription based services offered by FortiGuard. The new service is called Central Management Services. The service includes the following: On-demand FortiOS image upgrade Scheduled FortiOS image upgrade Configuration file backup and restore with version control The features are available, with a valid subscription, through the System > Admin page. The features also are being provided by FortiManager v3.00 MR5. Please look at the web UI screenshots below. When the Account ID is applied, Management Services field in the same page, is updated with the users subscription information. July 20, 2007 2

The Account ID in this web UI page is updated automatically from the field in the System > Maintenance > FortiGuard Center page. Interface Aliases A name alias can be added to any physical interface. When this is configured the alias is appended to the end of the interface name in brackets () in each part of the Web UI it is displayed, such as the System > Network page and the Firewall > Policy page. Please look at the web UI screenshots below. July 20, 2007 3

Disabling Maintainer User for Password Recovery A CLI only command has been added that allows for disabling the maintainer user. Essentially, this means password recovery is disabled. The only way to recover the FortiGate in this scenario is to load the firmware using the TFTP boot process. The CLI commands are shown below. config sys global set admin-maintainer <enable disable> PKI Enhancements Some additional enhancements to the FortiGates PKI support have been implemented: Creation for local certificates with multiple organisational unit (OU) fields. Up to five are allowed. This is supported in the Web UI, but the CLI only supports one OU. Multiple PKI administrators. Separate administrative server certificates from user server certificates. HTTPS administrative access using PKI only. Upon receipt of an invalid client certificate, the Web UI displays a login failure page. USB Disk Support UPDATED FOR ANY USB FLASH July 20, 2007 4

MEMORY KEY FortiOS firmware and configuration files can now be loaded from and saved to any manufactutere's USB external USB flash memory key. Furthermore, FortiGates can now be configured to automatically upgrade firmware versions and load configurations stored on the USB flash memory key. Protection Profiles Per Virtual Domains FortiOS v3.00 MR5 adds support firewall protection profiles to be configured on a per-virtual domain basis. Now, each VDom has it's own copy of protection profiles. This further means protection profiles are neither shared nor visible acros VDoms. Multicast Destination NAT in a PIM-SM Environment Support The FortiGate now supports NAT'ing of multicast streams, this feature has the capability to NAT both the source and/or the multicast destination address of the stream. When used in conjunction with PIM-SM the FortiGate can translate externally received multicast destination addresses to multicast addresses that may be used internally in a private network. The feature has the capability to forward NAT'ed or non NAT'ed multicast packets out of the same egress interface. A loopback interface is required to perform the translation in a PIM-SM environment. This feature can only be configured via the CLI. Firewall Policy Authentication Enhancement The authentication method has been enchanced for FortiOS v3.00 MR5. In previous releases, if two or more firewall policies had authentication configured only one would be used for authentication. For example: policy ID 2: internal to DMZ, service = HTTP, authentication = ENABLED policy ID 3: internal to DMZ, service = FTP, authentication = ENABLED If HTTP traffic arrived at the internal port destined for an IP address on WAN1, the FortiGate would prompt for authentication and upon a successful attempt, the traffic would be allowed through. When FTP traffic arrived at the internal port destined for an IP address on DMZ, the FortiGate would not prompt for authentication because the authentication was based purely on source IP address. In FortiOS v3.00 MR5, the authentication lookup is based on source IP address an policy ID. In the example above, when the HTTP traffic arrives at the internal port, the FortiGate creates an entry in the kernel that includes both the source IP address and the policy ID. When the FTP traffic arrives at the internal interface, the FortiGate performs a lookup on the source IP address and the policy ID, which results in no entries being found, and the FortiGate prompts for authentication. The web UI screenshot below demonstrate the configuration of the two policies described above. IPv6 IPSec FortiOS v3.00 MR5 introduces IPv6 IPSec interfaces. This is a CLI feature only. The following outlines the support: July 20, 2007 5

IKE Support for configuring a phase1 with an IPv6 address for the remote gateway. Support for configuring a phase2 that uses IPv6 addresses in the selectors. Support for attaching a phase2 with IPv6 selectors to a phase1 with an IPv6 address (IPv6 over IPv6). Support for attaching a phase2 with IPv4 selectors to a phase1 with an IPv6 address (IPv4 over IPv6). Support for attaching a phase2 with IPv6 selectors to a phase1 with an IPv4 address (IPv6 over IPv4). Continue to support attaching a phase2 with IPv4 selectors to a phase1 with IPv4 address (IPv4 over IPv4). Manual Key Support for configuring a manual connection between two IPv6 addresses. IPSec Support for encrypting IPv6 traffic and encapsulating it with an IPv6 tunnel mode ESP header. Support for encrypting IPv6 traffic and encapsulating it with an IPv4 tunnel mode ESP header. Support for encrypting IPv4 traffic and encapsulating it with an IPv6 tunnel mode ESP header. Continue to support encrypting IPv4 traffic and encapsulating it with an IPv4 tunnel mode ESP header. Support for decrypting an IPv6 ESP packet and forwarding the enclosed IPv4 or IPv6 packet. Limitations IPv6 based IPSec sessions are not accelerated by the FortiASIC. Only interface-based IPv6 IPSec is supported, there is no support for policy-based IPv6 IPSec. Consequently, FortiAnalyzer IPSec connections cannot be IPv6. FortiManager IPSec connections cannot be IPv6. FortiOS has no IPv6 DNS support, therefore no "type ddns" for IPv6 IPSec phase1. Support for DNS names in RSA certificates that resolve to IPv6 addresses. FortiOS does not support IPv6 addresses in a certificate. Specifically, the "cn-type" attribute in "config user peer" does not have an "ipv6" option and so it is not possible to validate certificates that use IPv6 addresses. There is no support for defining multiple IPv6 subnets in a phase2 selector such as the "src-addr-type name" and "dst-addr-type name" attributes of a phase2 have not been extended to IPv6. FortiOS has no routing daemon support for IPv6. FortiOS has no IPv6 DHCP support, therefore DHCP over IPSec not supported for IPv6. FortiOS has no IPv6 SNMP support. FortiOS has no support for IPv6 PPPoE and thus no support for IPv6 IPSec over PPPoE exists. FortiOS has no support for IPv6 PPP for modem and thus no support for IPv6 IPSec over modem exists. It is possible to specify an IPv6 address for an IPSec interface using "config ipv6" and specifying the "ip6- address". This allows a subnet to be defined which may or may not work well with ZebOS if/when it supports IPv6. At that point it may require extending the ipv6 configuration to support defining a remote IPv6 address. FortiOS does not re-assemble fragmented IPv6 packets -- regardless of whether IPSec is involved or not. SSL-VPN Group Level Bookmarks This convenient feature allows the FortiGate administrator to configure multiple bookmarks, add them to a group, and make the group available for SSL-VPN users. The bookmark group needs to be enabled, using the checkbox and pull-down menu, in the User Group configuration when an SSL VPN type User Group is configured. When an SSL-VPN user logs-in, the group of pre-defined bookmarks are available. Group bookmarks can be created for Web, Telnet, FTP, SMB, VNC, and RDP. Please look at the web UI screenshots below. July 20, 2007 6

Once SSL-VPN Bookmark Groups are created, they must be assigned to the SSL-VPN User Group as shown here. And after an SSL-VPN user connects to the FortiGate, SSL-VPN Bookmark Groups appear like below: July 20, 2007 7

Hard Disk Upload to FortiAnalyzer This CLI only feature allows for log files stored on the hard disk of the FortiGate to be uploaded to a FortiAnalyzer at scheduled time, when the file is rolled, and other parametres. config log disk setting set upload-destination fortianalyzer set uploadip <IP address of FortiAnalyzer> end In HA A-A mode, only the master's logs are uploaded either to the hard disk or FortiAnalyzer. July 20, 2007 8