Fortinet Document Library
Version:
6.2.7
6.2.6
6.2.5
Version:
6.2.4
6.2.3
6.2.2
Version:
6.2.0
6.0.0
5.6.0
Version:
5.4.0
Table of Contents
Getting started
Installing a FortiGate in NAT mode
Connecting network devices
Configuring interfaces
Adding a default route
(Optional) Selecting DNS servers
Creating a policy
Results
Using zones to simplify firewall policies
Creating the VLAN interfaces
Creating the zone
Creating a firewall policy for the zone
Results
Redundant Internet with SD-WAN
Connecting your ISPs to the FortiGate
Modifying existing policies
Creating the SD-WAN interface
(Optional) Configuring SD-WAN Status Check
Allowing traffic from the internal network to the SD-WAN interface
Results
Testing failover
Fortinet Security Fabric installation and audit
Configuring External
Installing Accounting and Marketing
Installing Sales
Configuring the FortiAnalyzer
Running a Security Fabric Audit
Results
(Optional) Adding security profiles to the Security Fabric
Transparent web proxy
Configuring system and network settings
Adding proxy options to your policy
Creating a proxy policy
Results
Limiting bandwidth with traffic shaping
Enable Traffic Shaping
Creating a firewall address to limit
Configuring a traffic shaper to limit bandwidth
Verifying your Internet access security policy
Creating two traffic shaping policies
Results
NGFW policy-based mode
Configuring your FortiGate for NGFW policy-based mode
Creating a Central SNAT Policy
Creating an IPv4 policy to block Facebook
Ordering the policy table
Results
Packet capture
Creating packet capture filters
Results
Traffic shaping for VoIP
Enable Traffic Shaping and VoIP features
Creating a high priority VoIP traffic shaper
Creating a low priority FTP traffic shaper
Creating a medium priority daily traffic shaper
Adding a VoIP security profile to your Internet access policy
Creating three traffic shaping policies
Results
Authentication
FortiToken Mobile Push for SSL VPN
Adding a FortiToken to the FortiAuthenticator
Adding the user to the FortiAuthenticator
Creating the RADIUS client on the FortiAuthenticator
Connecting the FortiGate to the RADIUS server
Configuring the SSL VPN
Results
SAML 2.0 FSSO with FortiAuthenticator and Centrify
Configuring DNS and FortiAuthenticator's FQDN
Enabling FSSO and SAML on the FortiAuthenticator
Adding SAML connector to Centrify for IdP metadata
Importing the IdP certificate and metadata on the FortiAuthenticator
Uploading the SP metadata to the Centrify tenant
Configuring FSSO on the FortiGate
Configuring Captive Portal and security policies
Results
SAML 2.0 FSSO with FortiAuthenticator and Google G Suite
Configuring FSSO and SAML on the FortiAuthenticator
Configuring SAML on G Suite
Importing the IdP certificate and metadata on the FortiAuthenticator
Configuring FSSO on the FortiGate
Configuring Captive Portal and security policies
Results
SAML 2.0 FSSO with FortiAuthenticator and Okta
Configuring DNS and FortiAuthenticator's FQDN
Enabling FSSO and SAML on the FortiAuthenticator
Configuring the Okta developer account IDP application
Importing the IDP certificate and metadata on the FortiAuthenticator
Configuring FSSO on the FortiGate
Configuring Captive Portal and security policies
Results
High availability
High availability with two FortiGates
Setting up registration and licensing
Configuring the primary FortiGate for HA
Connecting the backup FortiGate
Configuring the backup FortiGate for HA
Viewing the status of the HA cluster
Results
(Optional) Upgrading the firmware for the HA cluster
High availability with FGCP (expert)
Configuring the primary FortiGate
Configuring the backup FortiGate
Connecting the primary and backup FortiGates
Checking cluster operation
Disabling override (recommended)
Results
FGCP Virtual Clustering with two FortiGates (expert)
Preparing the FortiGates
Configuring clustering
Connecting and verifying cluster operation
Adding VDOMs and setting up virtual clustering
Checking virtual cluster operation
Results
FGCP Virtual Clustering with four FortiGates (expert)
Preparing the FortiGates
Configuring clustering
Connecting and verifying cluster operation
Adding VDOMs and setting up virtual clustering
Checking virtual cluster operation
Results
FGCP high availability troubleshooting
Before you set up a cluster
Troubleshooting licensing
Troubleshooting hardware revisions
Troubleshooting the initial cluster configuration
Verifying the cluster configuration from the GUI
Troubleshooting the cluster configuration from the GUI
Verifying the cluster configuration from the CLI
Troubleshooting the cluster configuration from the CLI
More troubleshooting information
Using FGSP to load balance access to two active-active data centers
Configuring the first FortiGate (Peer-1)
Configuring the second FortiGate (Peer-2)
Configuring the third FortiGate (Peer-3)
Configuring the fourth FortiGate (Peer-4)
Synchronizing TCP sessions
Synchronizing UDP and ICMP sessions
Synchronizing VoIP sessions
Security profiles
Blocking Facebook
Enabling Web Filtering and Application Control
Edit the default Web Filter profile
Edit the default Application Control profile
Creating the security policy
Results
FortiManager in the Fortinet Security Fabric
Connecting FortiManager and Edge
Configuring central management on Edge
Allowing FortiManager to have Internet access
Results
FortiSandbox in the Fortinet Security Fabric
Checking the Security Rating
Connecting FortiSandbox and Edge
Allowing VM Internet access
Adding FortiSandbox to Security Fabric
Adding sandbox inspection to security profiles
Results
Exempting Google from SSL inspection
Using the default deep-inspection profile
Creating an SSL/SSH profile that exempts Google
Results
Transparent web filtering using a virtual wire pair
Configure the management interface
Configure the virtual wire pair
Configure the virtual wire pair policy and enable web filtering
Results
Preventing certificate warnings (CA-signed certificate)
Using a CA-signed certificate
Generating a CSR on a FortiGate
Getting the certificate signed by a CA
Importing the signed certificate to your FortiGate
Editing the SSL inspection profile
Importing the certificate into web browsers
Results
Preventing certificate warnings (default certificate)
Using the default certificate
Generating a unique certificate
Downloading the certificate
Importing the certificate into web browsers
Results
Preventing certificate warnings (self-signed)
Creating a certificate with OpenSSL
Importing the self-signed certificate
Editing the SSL inspection profile
Importing the certificate into web browsers
Results
Why you should use SSL inspection
VPNs
Fortinet Security Fabric over IPsec VPN
Configuring the tunnel interfaces
Adding the tunnel interfaces to the VPN
Adding Branch to the Security Fabric
Allowing Branch to access the FortiAnalyzer
Results
(Optional) Using local logging for Branch
IPsec VPN with FortiClient
Creating a user group for remote users
Adding a firewall address
Configuring the IPsec VPN
Creating a security policy
Configuring FortiClient
Results
IPsec VPN to Azure
Site-to-site IPsec VPN with certificate authentication
Enabling certificate management
Obtaining the necessary certificates
Installing the client certificates
Installing the CA certificates
Configuring the IPsec VPN on HQ
Configuring the IPsec VPN on Branch
Results
Site-to-site IPsec VPN with two FortiGates
Configuring IPsec VPN on HQ
Configuring IPsec VPN on Branch
Results
Multicast IPsec VPN without PIM
Configuring the HQ IPsec VPN
Configuring the Branch IPsec VPN
Configuring the HQ multicast policy and phase 2 settings
Configuring the Branch multicast policy and phase 2 settings
Results
SSL VPN using web and tunnel mode
Editing the SSL VPN portal
Configuring the SSL VPN tunnel
Adding security policies
Verifying remote user OS and software
Results
Configuring ADVPN
Configuring the Hub FortiGate
Configuring the Spoke FortiGates
Results
Client-Side SD-WAN with IPsec VPN Deployment Scenario (Expert)
Configuring the data center FortiGates
Creating the data center side of the IPsec VPN
Adding addresses to the tunnel interfaces
Implementing route discovery with BGP
Controlling access to data center networks
Pointing to branch offices with black hole routes
Configuring Branch FortiGate
Creating the branch side of the IPsec VPN
Adding IP addresses to the tunnel interfaces
Implementing route discovery with BGP
Setting up the load balancing SD-WAN configuration
Controlling access from branch networks
Brainpool curves in IKEv2 IPsec VPN
Creating the HQ tunnel
Customizing the HQ tunnel
Creating and customizing the Remote Office tunnel
Results
WiFi
Setting up WiFi with a FortiAP
Connecting and authorizing the FortiAP unit
Creating an SSID
Creating a custom FAP profile
Allowing wireless access to the Internet
Results
Setting up a WiFi Bridge with a FortiAP
Connecting and authorizing the FortiAP unit
Creating an SSID
Creating a custom FortiAP profile
Results
Filtering WiFi clients by MAC address
Acquiring the MAC address
Creating the FortiAP interfaces
Defining a device using its MAC address
Creating the new SSID
Managing the FortiAP
Authorizing the managed FortiAP
Editing the default FortiAP profile
Allowing wireless access to the Internet
Results
Dual-band SSID with optional client load balancing
Configuring the dual-band SSID
Results
(Optional) Adding client load balancing
Monitoring and suppressing rogue APs
Configuring rogue scanning
Monitoring rogue APs
Suppressing rogue APs
Reverting a suppressed AP
Exempting an AP from rogue scanning
FortiConnect guest on-boarding using RSSO
Registering the WLC as a RADIUS client on the FortiConnect
Registering the FortiGate as a RADIUS accounting server on the FortiConnect
Validating the WLC configuration created from FortiConnect
Creating a security profile on the WLC
Creating the wireless ESS profile on the WLC
Enabling RADIUS accounting listening on the FortiGate
Configuring the RSSO Agent on the FortiGate
Results
FortiConnect as a RADIUS server in FortiCloud
Configuring FortiCloud to access FortiConnect
Configuring FortiCloud as a RADIUS client on FortiConnect
Configuring FortiConnect as a RADIUS server on FortiCloud
Creating a new SSID on FortiCloud
Results
Replacing the Fortinet_Wifi certificate
Change Log
Home
FortiGate / FortiOS 5.6.0
Cookbook
Cookbook
Getting started
Installing a FortiGate in NAT mode
Connecting network devices
Configuring interfaces
Adding a default route
(Optional) Selecting DNS servers
Creating a policy
Results
Using zones to simplify firewall policies
Creating the VLAN interfaces
Creating the zone
Creating a firewall policy for the zone
Results
Redundant Internet with SD-WAN
Connecting your ISPs to the FortiGate
Modifying existing policies
Creating the SD-WAN interface
(Optional) Configuring SD-WAN Status Check
Allowing traffic from the internal network to the SD-WAN interface
Results
Testing failover
Fortinet Security Fabric installation and audit
Configuring External
Installing Accounting and Marketing
Installing Sales
Configuring the FortiAnalyzer
Running a Security Fabric Audit
Results
(Optional) Adding security profiles to the Security Fabric
Transparent web proxy
Configuring system and network settings
Adding proxy options to your policy
Creating a proxy policy
Results
Limiting bandwidth with traffic shaping
Enable Traffic Shaping
Creating a firewall address to limit
Configuring a traffic shaper to limit bandwidth
Verifying your Internet access security policy
Creating two traffic shaping policies
Results
NGFW policy-based mode
Configuring your FortiGate for NGFW policy-based mode
Creating a Central SNAT Policy
Creating an IPv4 policy to block Facebook
Ordering the policy table
Results
Packet capture
Creating packet capture filters
Results
Traffic shaping for VoIP
Enable Traffic Shaping and VoIP features
Creating a high priority VoIP traffic shaper
Creating a low priority FTP traffic shaper
Creating a medium priority daily traffic shaper
Adding a VoIP security profile to your Internet access policy
Creating three traffic shaping policies
Results
Authentication
FortiToken Mobile Push for SSL VPN
Adding a FortiToken to the FortiAuthenticator
Adding the user to the FortiAuthenticator
Creating the RADIUS client on the FortiAuthenticator
Connecting the FortiGate to the RADIUS server
Configuring the SSL VPN
Results
SAML 2.0 FSSO with FortiAuthenticator and Centrify
Configuring DNS and FortiAuthenticator's FQDN
Enabling FSSO and SAML on the FortiAuthenticator
Adding SAML connector to Centrify for IdP metadata
Importing the IdP certificate and metadata on the FortiAuthenticator
Uploading the SP metadata to the Centrify tenant
Configuring FSSO on the FortiGate
Configuring Captive Portal and security policies
Results
SAML 2.0 FSSO with FortiAuthenticator and Google G Suite
Configuring FSSO and SAML on the FortiAuthenticator
Configuring SAML on G Suite
Importing the IdP certificate and metadata on the FortiAuthenticator
Configuring FSSO on the FortiGate
Configuring Captive Portal and security policies
Results
SAML 2.0 FSSO with FortiAuthenticator and Okta
Configuring DNS and FortiAuthenticator's FQDN
Enabling FSSO and SAML on the FortiAuthenticator
Configuring the Okta developer account IDP application
Importing the IDP certificate and metadata on the FortiAuthenticator
Configuring FSSO on the FortiGate
Configuring Captive Portal and security policies
Results
High availability
High availability with two FortiGates
Setting up registration and licensing
Configuring the primary FortiGate for HA
Connecting the backup FortiGate
Configuring the backup FortiGate for HA
Viewing the status of the HA cluster
Results
(Optional) Upgrading the firmware for the HA cluster
High availability with FGCP (expert)
Configuring the primary FortiGate
Configuring the backup FortiGate
Connecting the primary and backup FortiGates
Checking cluster operation
Disabling override (recommended)
Results
FGCP Virtual Clustering with two FortiGates (expert)
Preparing the FortiGates
Configuring clustering
Connecting and verifying cluster operation
Adding VDOMs and setting up virtual clustering
Checking virtual cluster operation
Results
FGCP Virtual Clustering with four FortiGates (expert)
Preparing the FortiGates
Configuring clustering
Connecting and verifying cluster operation
Adding VDOMs and setting up virtual clustering
Checking virtual cluster operation
Results
FGCP high availability troubleshooting
Before you set up a cluster
Troubleshooting licensing
Troubleshooting hardware revisions
Troubleshooting the initial cluster configuration
Verifying the cluster configuration from the GUI
Troubleshooting the cluster configuration from the GUI
Verifying the cluster configuration from the CLI
Troubleshooting the cluster configuration from the CLI
More troubleshooting information
Using FGSP to load balance access to two active-active data centers
Configuring the first FortiGate (Peer-1)
Configuring the second FortiGate (Peer-2)
Configuring the third FortiGate (Peer-3)
Configuring the fourth FortiGate (Peer-4)
Synchronizing TCP sessions
Synchronizing UDP and ICMP sessions
Synchronizing VoIP sessions
Security profiles
Blocking Facebook
Enabling Web Filtering and Application Control
Edit the default Web Filter profile
Edit the default Application Control profile
Creating the security policy
Results
FortiManager in the Fortinet Security Fabric
Connecting FortiManager and Edge
Configuring central management on Edge
Allowing FortiManager to have Internet access
Results
FortiSandbox in the Fortinet Security Fabric
Checking the Security Rating
Connecting FortiSandbox and Edge
Allowing VM Internet access
Adding FortiSandbox to Security Fabric
Adding sandbox inspection to security profiles
Results
Exempting Google from SSL inspection
Using the default deep-inspection profile
Creating an SSL/SSH profile that exempts Google
Results
Transparent web filtering using a virtual wire pair
Configure the management interface
Configure the virtual wire pair
Configure the virtual wire pair policy and enable web filtering
Results
Preventing certificate warnings (CA-signed certificate)
Using a CA-signed certificate
Generating a CSR on a FortiGate
Getting the certificate signed by a CA
Importing the signed certificate to your FortiGate
Editing the SSL inspection profile
Importing the certificate into web browsers
Results
Preventing certificate warnings (default certificate)
Using the default certificate
Generating a unique certificate
Downloading the certificate
Importing the certificate into web browsers
Results
Preventing certificate warnings (self-signed)
Creating a certificate with OpenSSL
Importing the self-signed certificate
Editing the SSL inspection profile
Importing the certificate into web browsers
Results
Why you should use SSL inspection
VPNs
Fortinet Security Fabric over IPsec VPN
Configuring the tunnel interfaces
Adding the tunnel interfaces to the VPN
Adding Branch to the Security Fabric
Allowing Branch to access the FortiAnalyzer
Results
(Optional) Using local logging for Branch
IPsec VPN with FortiClient
Creating a user group for remote users
Adding a firewall address
Configuring the IPsec VPN
Creating a security policy
Configuring FortiClient
Results
IPsec VPN to Azure
Site-to-site IPsec VPN with certificate authentication
Enabling certificate management
Obtaining the necessary certificates
Installing the client certificates
Installing the CA certificates
Configuring the IPsec VPN on HQ
Configuring the IPsec VPN on Branch
Results
Site-to-site IPsec VPN with two FortiGates
Configuring IPsec VPN on HQ
Configuring IPsec VPN on Branch
Results
Multicast IPsec VPN without PIM
Configuring the HQ IPsec VPN
Configuring the Branch IPsec VPN
Configuring the HQ multicast policy and phase 2 settings
Configuring the Branch multicast policy and phase 2 settings
Results
SSL VPN using web and tunnel mode
Editing the SSL VPN portal
Configuring the SSL VPN tunnel
Adding security policies
Verifying remote user OS and software
Results
Configuring ADVPN
Configuring the Hub FortiGate
Configuring the Spoke FortiGates
Results
Client-Side SD-WAN with IPsec VPN Deployment Scenario (Expert)
Configuring the data center FortiGates
Creating the data center side of the IPsec VPN
Adding addresses to the tunnel interfaces
Implementing route discovery with BGP
Controlling access to data center networks
Pointing to branch offices with black hole routes
Configuring Branch FortiGate
Creating the branch side of the IPsec VPN
Adding IP addresses to the tunnel interfaces
Implementing route discovery with BGP
Setting up the load balancing SD-WAN configuration
Controlling access from branch networks
Brainpool curves in IKEv2 IPsec VPN
Creating the HQ tunnel
Customizing the HQ tunnel
Creating and customizing the Remote Office tunnel
Results
WiFi
Setting up WiFi with a FortiAP
Connecting and authorizing the FortiAP unit
Creating an SSID
Creating a custom FAP profile
Allowing wireless access to the Internet
Results
Setting up a WiFi Bridge with a FortiAP
Connecting and authorizing the FortiAP unit
Creating an SSID
Creating a custom FortiAP profile
Results
Filtering WiFi clients by MAC address
Acquiring the MAC address
Creating the FortiAP interfaces
Defining a device using its MAC address
Creating the new SSID
Managing the FortiAP
Authorizing the managed FortiAP
Editing the default FortiAP profile
Allowing wireless access to the Internet
Results
Dual-band SSID with optional client load balancing
Configuring the dual-band SSID
Results
(Optional) Adding client load balancing
Monitoring and suppressing rogue APs
Configuring rogue scanning
Monitoring rogue APs
Suppressing rogue APs
Reverting a suppressed AP
Exempting an AP from rogue scanning
FortiConnect guest on-boarding using RSSO
Registering the WLC as a RADIUS client on the FortiConnect
Registering the FortiGate as a RADIUS accounting server on the FortiConnect
Validating the WLC configuration created from FortiConnect
Creating a security profile on the WLC
Creating the wireless ESS profile on the WLC
Enabling RADIUS accounting listening on the FortiGate
Configuring the RSSO Agent on the FortiGate
Results
FortiConnect as a RADIUS server in FortiCloud
Configuring FortiCloud to access FortiConnect
Configuring FortiCloud as a RADIUS client on FortiConnect
Configuring FortiConnect as a RADIUS server on FortiCloud
Creating a new SSID on FortiCloud
Results
Replacing the Fortinet_Wifi certificate
Change Log
5.6.0
6.2.7
6.2.6
6.2.5
6.2.4
6.2.3
6.2.2
6.2.0
6.0.0
5.6.0
5.4.0
Download PDF
Copy Link
Connecting your ISPs to the FortiGate
Connect your ISP devices to your FortiGate so that the ISP you wish to use for most traffic is connected to WAN1 and the other connects to WAN2.
Connecting your ISPs to the FortiGate
Connect your ISP devices to your FortiGate so that the ISP you wish to use for most traffic is connected to WAN1 and the other connects to WAN2.
Link
PDF
TOC