Table of Contents
1. Preparing for Deployment
Before touching the FortiGate GUI or CLI, gather:
- Network Plan: IP subnets for LAN, WAN, DMZ, VPN pools, and management.
- Access Credentials: FortiGate serial number, default admin login (GUI/SSH), and SSH keys if used.
- Documentation: FortiGate model datasheet, FortiOS version compatibility, and firmware image.
Maintaining clear documentation of your network design and IP addressing will streamline every subsequent configuration step.
2. Initial Access and Administrative Hardening
2.1 Physical & Management Access
- Physical Connections:
- Connect the WAN port (e.g.,
wan1
) to your ISP modem. - Connect an internal switch or a management workstation to a LAN port (e.g.,
port2
).
- Connect the WAN port (e.g.,
- Browser Access:
- Assign your PC a static IP in the default FortiGate management subnet (e.g., 192.168.1.2/24).
- Navigate to
https://192.168.1.99
and log in with:- Username:
admin
- Password: (blank)
- Username:
2.2 Change Default Admin Settings
- Change the Admin Password:
Navigate to System > Administrators, edit theadmin
user, and set a strong password. - Restrict Administrative Access:
Bind admin access to trusted hosts (specific management IPs) and enable only HTTPS and SSH services on the management interface. - Enable CLI Audit Logging:
config system global
set cli-audit-log enable
end
3. Network Interface Configuration
3.1 WAN Interface
- Navigate to Network > Interfaces.
- Edit the WAN interface (
wan1
):- Addressing Mode:
- DHCP if provided by ISP.
- Static: configure IP, subnet mask, and default gateway.
- Administrative Access: Allow only HTTPS (and SSH, if required).
- Addressing Mode:
- Apply changes.
3.2 LAN Interface
- Edit the LAN interface (
internal
orport2
):- IP/Subnet: e.g.,
192.168.10.1/24
. - Role: set to
LAN
.
- IP/Subnet: e.g.,
- Enable DHCP Server (optional): define an IP range for client leases, DNS servers, and default gateway.
- Apply changes.
3.3 DMZ Interface (Optional)
To host public-facing servers in a DMZ:
- Create or edit a dedicated interface (physical or VLAN).
- IP/Subnet: assign a separate range (e.g.,
10.0.0.0/24
). - Role: set to
DMZ
. - Apply changes.
4. Static Routing
A default route ensures internet-bound traffic reaches the WAN:
- Network > Static Routes > Create New.
- Destination:
0.0.0.0/0
(default route). - Gateway: ISP’s next-hop IP.
- Interface:
wan1
. - Distance:
10
(default). - Save.
For additional networks (e.g., DMZ or VPN pools), add specific routes pointing to the appropriate interface.
5. Creating Firewall Policies
Firewall policies define traffic flows between interfaces. A typical LAN-to-WAN policy:
- Policy & Objects > IPv4 Policy > Create New.
- Name:
LAN_to_WAN
. - Incoming Interface:
internal
. - Outgoing Interface:
wan1
. - Source:
all
(or specifyInternal_Subnet
). - Destination:
all
. - Service:
ALL
. - Action:
Accept
. - NAT: Enable (for internet access).
- Logging: Enable
All Sessions
. - Save.
DMZ-to-WAN and WAN-to-DMZ (Port Forwarding)
- DMZ Policy: Mirror the above, swapping
internal
with the DMZ interface. - VIPs (Virtual IPs) for port forwarding:
- Policy & Objects > Virtual IPs > Create New.
- Name: e.g.,
Web_VIP
. - Interface:
wan1
. - External IP: public IP.
- Mapped IP: internal server IP.
- Port Forwarding: enable and set service (e.g., TCP 80).
- Save and apply the VIP to a new WAN-to-DMZ policy.
6. Security Profiles (UTM)
Enhance policy enforcement by applying security profiles:
- Security Profiles menu: configure profiles for Antivirus, Web Filter, Application Control, and Intrusion Prevention (IPS).
- Customize filters and exception lists per organizational needs.
- Attach profiles to firewall policies under the Security Profiles section.
7. VPN Configuration (Optional)
FortiGate supports both IPsec and SSL VPN for remote connectivity:
7.1 Site-to-Site IPsec VPN
- VPN > IPsec Wizard.
- Select a template (e.g.,
Site to Site
). - Local Interface:
wan1
. - Remote Gateway: Peer’s IP or FQDN.
- Authentication: pre-shared key or certificate.
- Phase 1 & 2 selectors: choose encryption and hashing algorithms.
- Create policy and routes automatically.
7.2 SSL VPN
- VPN > SSL-VPN Settings.
- Enable SSL VPN on
wan1
. - Define portal settings (splits, bookmarks).
- Create user groups and assign to the portal.
- Save and distribute URL to clients.
8. Logging, Monitoring & SIEM Integration
8.1 Local and Remote Logging
- Log & Report > Log Settings: enable local disk logs and/or remote Syslog/FortiCloud.
- Retention and rotation policies help manage disk usage.
8.2 Syslog Configuration for SIEM
Follow the Huntress guide for CEF-formatted logs:
config log syslogd setting
set status enable
set format cef
set server <SIEM_IP>
end
config log syslogd filter
set severity information
set forward-traffic enable
set anomaly enable
set local-traffic enable
…
end
Verify with show log syslogd setting
and show log syslogd filter
.
9. Backup, Firmware Updates & High Availability
9.1 Configuration Backup
- Dashboard > Status: in the System Information widget, click Backup to download a
.conf
file. - Store backups off-site or in FortiCloud.
9.2 Firmware Upgrades
- System > Firmware: check and install FortiOS updates during planned maintenance windows.
- Always backup config before upgrading.
9.3 High Availability (HA)
- System > HA: configure cluster mode (active-active or active-passive), set group name, password, and heartbeat interfaces.
- Sync configuration and firmware across cluster members for seamless failover.
Comments