This section explains System Configuration step-by-step, starting with Device Initialization and covering each subtopic in detail.
When you power on a FortiGate device for the first time, it requires some initial configurations to make it operational. Let’s break it down into manageable steps:
Physical Connection:
192.168.1.99 for FortiGate) and use a web browser or SSH client.Access the CLI (Command Line Interface):
adminTo allow remote management via HTTP/HTTPS or SSH, assign an IP address to the management interface:
config system interface
edit <interface_name> # e.g., port1
set ip <IP_address> <Subnet_mask> # e.g., 192.168.1.1/255.255.255.0
set allowaccess ping https ssh # Allow secure management access
set alias "Management" # Optional description
end
Configure the default gateway for internet access:
config router static
edit 1
set gateway <Gateway_IP> # e.g., 192.168.1.254
set device <interface_name> # e.g., port1
end
Set Hostname:
A descriptive hostname helps identify the device:
config system global
set hostname <Device_Name> # e.g., FortiGate_Main
end
Set DNS Servers:
Configure the device to resolve domain names:
config system dns
set primary <Primary_DNS> # e.g., 8.8.8.8
set secondary <Secondary_DNS> # e.g., 8.8.4.4
end
Configure System Time:
Either manually set the time:
config system time
set time <HH:MM:SS> # e.g., 12:30:00
set date <YYYY/MM/DD> # e.g., 2024/12/25
end
Or, use an NTP server for automatic time synchronization:
config system ntp
set status enable
set server "pool.ntp.org"
end
To enhance security, enable HTTPS and SSH management:
config system global
set admin-https enable
set admin-ssh enable
end
Interfaces on FortiGate devices act as the connection points for networks. Here's how to set them up:
Configure each interface based on its function (e.g., internal LAN, external WAN):
config system interface
edit <interface_name> # e.g., port2 for LAN, port3 for WAN
set role lan # LAN interface
set ip <IP_address> <Subnet_mask> # e.g., 192.168.10.1/255.255.255.0
set allowaccess ping http https ssh # Allow management if needed
end
VLANs (Virtual Local Area Networks) are used for segmentation. To create a VLAN interface:
config system interface
edit <vlan_name> # e.g., VLAN100
set type vlan
set vlanid <VLAN_ID> # e.g., 100
set interface <physical_interface> # e.g., port1
set ip <IP_address> <Subnet_mask> # e.g., 192.168.100.1/255.255.255.0
set allowaccess ping https
end
To automatically assign IPs to devices in a network, enable DHCP:
config system dhcp server
edit 1
set interface <interface_name> # e.g., port2
set default-gateway <Gateway_IP> # e.g., 192.168.10.1
set netmask <Subnet_mask> # e.g., 255.255.255.0
set range <Start_IP> <End_IP> # e.g., 192.168.10.100 192.168.10.200
end
High Availability ensures redundancy and fault tolerance. Here's how to configure it:
Access the HA configuration:
config system ha
set mode <a-p|a-a> # Active-Passive (a-p) or Active-Active (a-a)
set group-name <Cluster_Name> # e.g., FortiHACluster
set password <Cluster_Password>
set hbdev <heartbeat_interface> # e.g., port4
end
The Cluster ID identifies the HA group, and Priority determines the primary unit:
config system ha
set clusterid <ID> # e.g., 1
set priority <Priority> # Higher value = higher priority
end
Synchronize session tables between cluster members:
config system ha
set session-pickup enable
end
Virtual Domains (VDOMs) allow a single FortiGate device to function as multiple independent logical units. This is especially useful for multi-tenant environments or networks requiring logical segmentation.
FortiGate supports two VDOM modes:
Split VDOM Mode:
Multi-VDOM Mode:
To enable VDOM mode:
config system global
set vdom-admin enable
end
Create a New VDOM:
Add a VDOM and allocate resources:
config vdom
edit <vdom_name> # e.g., HR_VDOM
set operation-mode <nat|transparent> # NAT or Transparent
end
Assign Interfaces to VDOMs:
Allocate physical or VLAN interfaces to the VDOM:
config system interface
edit <interface_name> # e.g., port2
set vdom <vdom_name> # e.g., HR_VDOM
end
Configure Inter-VDOM Links:
For traffic between VDOMs, create a virtual link:
config vdom-link
edit <link_name> # e.g., vdom_link_1
set src <source_vdom> # e.g., HR_VDOM
set dst <destination_vdom> # e.g., Finance_VDOM
end
Switching Between VDOMs:
Use the CLI to switch to a specific VDOM for management:
config vdom
edit <vdom_name> # e.g., HR_VDOM
end
Network Address Translation (NAT) and Firewall Policies are key to managing traffic flow in FortiGate.
SNAT modifies the source IP address of outbound traffic to match the FortiGate’s public IP address.
Basic SNAT Configuration:
Add a NAT rule within a firewall policy:
config firewall policy
edit 1
set srcintf <LAN_interface> # e.g., port2
set dstintf <WAN_interface> # e.g., port1
set srcaddr <LAN_subnet> # e.g., 192.168.10.0/24
set dstaddr all
set action accept
set nat enable
end
Central NAT Table:
For complex environments, use the Central NAT Table:
config firewall central-nat
edit 1
set orig-addr <source_IP_range> # e.g., 192.168.10.0/24
set orig-port 0-65535
set trans-addr <public_IP> # e.g., 203.0.113.1
end
DNAT redirects inbound traffic from an external IP to an internal server.
DNAT in Firewall Policies:
Add a DNAT rule within a firewall policy:
config firewall vip
edit <VIP_name> # e.g., Web_Server_VIP
set extip <public_IP> # e.g., 203.0.113.10
set mappedip <private_IP> # e.g., 192.168.10.10
end
config firewall policy
edit 1
set srcintf <WAN_interface> # e.g., port1
set dstintf <LAN_interface> # e.g., port2
set srcaddr all
set dstaddr <VIP_name> # e.g., Web_Server_VIP
set action accept
end
Logging and monitoring help administrators track and troubleshoot network activity.
FortiGate can store logs locally or forward them to external systems like FortiAnalyzer or Syslog servers.
Configure Local Logging:
Enable logging on specific policies:
config firewall policy
edit 1
set logtraffic all # Log all sessions
end
View logs using the Web GUI or CLI:
execute log filter device-id <device_id>
execute log display
Configure Remote Logging:
Forward logs to FortiAnalyzer:
config log fortianalyzer setting
set status enable
set server <Analyzer_IP> # e.g., 192.168.1.100
set source-ip <interface_IP> # e.g., 192.168.1.1
end
Forward logs to a Syslog server:
config log syslogd setting
set status enable
set server <Syslog_IP> # e.g., 192.168.1.101
end
FortiGate provides several tools to monitor system health and traffic.
Dashboard Monitoring:
CLI Monitoring Commands:
Monitor system performance:
diag sys top
View active sessions:
diag sys session list
Analyze packet flow for troubleshooting:
diag debug flow
diag debug enable
Proper administrative control ensures that only authorized personnel can access and perform actions on the FortiGate device. Fortinet allows granular role-based access using admin profiles.
To manage administrative access securely, it is a best practice to create unique accounts for each administrator. This enables audit tracking and role segregation.
config system admin
edit "admin_read"
set password YourSecurePassword
set accprofile "read-only"
set vdom "root"
end
edit sets the username.
set accprofile assigns the permission level (e.g., super_admin, read-only, or custom profile).
set vdom restricts access to a specific Virtual Domain.
You can define custom profiles that permit access to specific features or commands.
config system accprofile
edit "custom_admin"
set secfabgrp read-write
set loggrp read-only
set sysgrp read-only
end
This example allows full access to Security Fabric and limited access to logging and system settings.
To enhance security, you can configure automatic account lockout after a number of failed attempts.
config system global
set admin-lockout-threshold 3 # Number of failed attempts
set admin-lockout-duration 300 # Lockout duration in seconds
end
These settings prevent brute-force attempts by locking the user out temporarily.
Backing up configuration is a critical part of system maintenance and disaster recovery.
execute backup config flash mybackup.conf
This saves the current configuration file to the internal flash storage with the specified filename.
execute restore config flash mybackup.conf
This command restores a previously backed-up configuration file from the flash storage.
To TFTP:
execute backup config tftp mybackup.conf 192.168.1.10
To FTP:
execute backup config ftp mybackup.conf ftpserver 21 user password
These methods allow you to push configuration backups to a remote server for redundancy.
Firmware updates are important for performance improvements, security patches, and new features.
To manually upgrade firmware using a previously uploaded image:
execute restore image <image_file_name> <device_storage_location>
Or to trigger a system update (mainly for FortiGuard updates, but relevant in some cases):
execute update-now
In practice, most administrators use the Web GUI to:
Upload new firmware
Check for compatibility warnings
View system restore points
This process typically involves:
Navigating to System > Firmware
Choosing Upload Firmware or Check for Updates
Following prompts for reboot and backup
Always back up your configuration before an upgrade.
Verify the release notes for hardware compatibility and behavior changes.
Test new firmware in a lab environment for critical networks.
| Supplement Topic | Key Focus |
|---|---|
| Admin Profiles | Create accounts, assign access levels, enforce lockout security |
| Configuration Backup | Use execute backup and execute restore for local or remote storage |
| Firmware Upgrade | Manage via CLI or GUI; ensure compatibility and create backups |
Why might a FortiGate HA secondary device remain out of synchronization with the primary device?
Configuration synchronization may fail due to version mismatch, interface configuration conflicts, or disabled HA synchronization settings.
In a FortiGate HA cluster, the primary device automatically synchronizes configuration changes with secondary members. If synchronization fails, the secondary unit may appear in an out-of-sync state. One common cause is running different FortiOS versions between cluster members. Another issue may occur if certain settings are excluded from synchronization or if manual configuration changes were made directly on the secondary device. Interface mismatches and incorrect HA configuration parameters can also prevent proper synchronization. Administrators should verify firmware versions, check HA settings, and review synchronization status using diagnostic commands to identify the root cause.
Demand Score: 89
Exam Relevance Score: 91
What is the purpose of hardware acceleration on FortiGate devices?
Hardware acceleration offloads packet processing from the CPU to dedicated network processors.
FortiGate appliances include specialized hardware components such as NP (Network Processor) and CP (Content Processor) chips. These processors are designed to accelerate common network tasks like packet forwarding, encryption, and security inspection. When hardware acceleration is functioning properly, traffic processing is handled by these chips rather than the main CPU. This significantly increases throughput and reduces latency. If acceleration is disabled or unsupported by certain policies, traffic must be processed by the CPU, which can reduce performance. Monitoring tools can help confirm whether sessions are being offloaded to hardware processors.
Demand Score: 81
Exam Relevance Score: 88
Why might hardware acceleration fail to offload traffic to NP processors?
Certain features or configurations can prevent hardware offloading.
Hardware acceleration works only when traffic meets specific conditions. Features such as deep packet inspection, traffic shaping, proxy-based security inspection, or unsupported policy configurations may force packets to be processed by the CPU instead of the NP processor. Additionally, some interface types or VPN configurations may not support hardware offloading. When troubleshooting performance issues, administrators should check whether the security policy or enabled features are compatible with NP acceleration. Reviewing session information can help determine whether traffic is being processed by hardware or software.
Demand Score: 78
Exam Relevance Score: 87
What is the primary purpose of Virtual Domains (VDOMs) on FortiGate?
VDOMs allow a single FortiGate device to operate as multiple independent virtual firewalls.
VDOMs are used to segment a FortiGate device into multiple logical units that operate independently. Each VDOM has its own routing table, security policies, interfaces, and administrators. This allows service providers or enterprises to isolate different departments or customers on the same physical device. For example, a company may use separate VDOMs for production, development, and management networks. VDOMs improve security isolation and administrative flexibility while reducing hardware requirements. They are commonly used in multi-tenant environments or large enterprise networks.
Demand Score: 75
Exam Relevance Score: 90
How do VLANs differ from VDOMs in FortiGate deployments?
VLANs segment network traffic at Layer 2, while VDOMs provide full virtual firewall instances.
VLANs divide a physical network interface into multiple logical networks by tagging traffic with VLAN IDs. This is useful for separating broadcast domains and organizing network segments. VDOMs, however, operate at a higher level by creating fully independent firewall environments. Each VDOM can contain its own VLAN interfaces, routing table, policies, and administrative controls. While VLANs provide network segmentation, VDOMs provide complete security and management isolation. In many enterprise environments, VLANs are used within VDOMs to build scalable network architectures.
Demand Score: 73
Exam Relevance Score: 88
Why are HA clusters commonly deployed in enterprise firewall environments?
HA clusters provide redundancy and ensure network availability during device failures.
High Availability (HA) allows multiple FortiGate devices to operate as a cluster. In an active-passive configuration, the primary device handles traffic while the secondary device remains synchronized and ready to take over if the primary fails. This failover process happens automatically and typically within seconds. HA clusters help maintain continuous network connectivity, which is critical for enterprise environments where downtime can cause significant operational disruptions. Configuration synchronization ensures that both devices maintain identical settings, allowing seamless transition during failover events.
Demand Score: 72
Exam Relevance Score: 89