• Tidak ada hasil yang ditemukan

FortiOS 7.4.1 Administration Guide 1374 2061

N/A
N/A
Ricardo Peart

Academic year: 2023

Membagikan "FortiOS 7.4.1 Administration Guide 1374 2061"

Copied!
688
0
0

Teks penuh

If the FortiGate supports SSL content scanning and inspection, client illumination can be configured for HTTPS and FTPS traffic. The FortiGate can be configured to deliver traffic shaping with policing or traffic shaping with queuing.

Guaranteed and maximum bandwidth limits

Configuring outbandwidth

Traffic shaping policy

DSCP matching and DSCP marking

In a firewall shaping policy and regular firewall policy, use thetosandtos-maskfields to perform DSCP matching.

Traffic shaping policies

Overview

Configuring traffic shaping policies

Select the shared shaper to be applied to traffic in the entrance-to-exit direction. Select the reverse shaper to be applied to traffic in the exit-to-entry direction.

Local-in and local-out traffic matching

Traffic creators and class IDs can be used at the same time when configuring traffic shaping policies. Check the session list to verify that the class ID (2) matches the styling policy ID (3):.

VLAN CoS matching on a traffic shaping policy

In this example, FortiGate A forwards traffic to FortiGate B with VLAN CoS 3 that matches firewall policy 6. When FortiGate B receives the traffic, it uses the policy to shape the traffic and will prioritize based on the CoS value.

Traffic shaping profiles

If a particular session matches both the firewall policy and the firewall shaping policy, then anything configured in the firewall shaping policy overrides whatever is configured in the firewall policy.

Traffic shaping with policing

The sum of all guaranteed bandwidth of all classes within a traffic shaping profile cannot exceed 100%. The guaranteed bandwidth is always respected, even if one class has a lower priority than another.

Traffic shaping with queuing

As long as the egress bandwidth meets the metrics, the bandwidth usage should not exceed the available bandwidth of the link when using the traffic shaping profile. For more information about queuing traffic shaping, see Queuing Traffic Shaping Using a Traffic Shaping Profile on page 1400.

Configuring traffic shaping profiles

Configure the Traffic Shaping Class ID settings (Traffic Shaping Class ID, Guaranteed Bandwidth, Maximum Bandwidth, and Priority). In this example, three traffic classes are defined in the traffic shaping profile assigned to port1.

Traffic shaping with queuing using a traffic shaping profile

In this example, the outbound bandwidth of the interface is used as 1 Mbps and the maximum bandwidth of the class is 50%. This example sets a maximum of 10% of packets to be dropped when queue usage reaches the maximum value.

Traffic shapers

Shared traffic shaper

A joint traffic shaper selected in a traffic shaping policy affects traffic in the direction specified in the policy. You can define a traffic shaper for a policy in the opposite direction (reverse shaper) to affect the transfer rate of inbound traffic.

Per-IP traffic shaper

Changing traffic shaper bandwidth unit of measurement

Multi-stage DSCP marking and class ID in traffic shapers

Multi-stage VLAN CoS marking

This example configures VLAN CoS marking in multiple phases using traffic shapers on FortiGate A and FortiGate B. When traffic originates from FortiGate A with CoS 6, the traffic shaping policy is applied because the CoS matches.

Adding traffic shapers to multicast policies

Global traffic prioritization

When using DSCP, values ​​0 to 63 can be used, corresponding to the six bits in the DSCP value. Priority level 1 is used for traffic that is below the guaranteed bandwidth when using a traffic shaper.

CLI commands

In scenario 1, approximately 300 kbps of high-priority traffic and 300 kbps of medium-priority traffic pass through the FortiGate on port3. In scenario 2, approximately 400 kbps of high-priority traffic and 800 kbps of medium-priority traffic pass through the FortiGate on port3.

DSCP matching in firewall policies

DSCP matching in firewall shaping policies

DSCP marking in firewall shaping policies

FortiGate B uses a DSCP matching firewall design policy that limits the speed of the sales team's connection to the database to 10 MB/s. FortiGate A has a traffic shaping policy to mark traffic from the QA team with a DSCP value of 100000, while return traffic is marked with 000011.

Interface-based traffic shaping profile

Source l Address: matches the source address of the traffic to the selected address or address group. Destination l Address: matches the destination address of the traffic to the selected address or address group.

Interface-based traffic shaping with NP acceleration

QoS assignment and rate limiting for FortiSwitch quarantined VLANs

This minimizes the impact of any quarantined host on authorized network traffic.

Ingress traffic shaping profile

PC1 to PC4 traffic is marked with class ID 2 and low priority, and PC2 to PC4 traffic is marked with class ID 3 and high priority. All classes will first be allocated their guaranteed bandwidth, which uses up to 10 Mbps, 20 Mbps and 30 Mbps respectively.

Internet Services

The remaining available bandwidth (40 Mbps) is divided between Class 3 and Class 4 based on their guaranteed bandwidth ratio of 20:30.

Using Internet Service in a policy

Sample IPv4 configuration

In the CLI, first enable the Internet service and then use its ID to apply the policy. Because the IP address and services related to Google Gmail on the Internet are included in this Internet service (65646), all traffic to Google Gmail is routed through this policy.

Sample IPv6 configuration

Using custom Internet Service in policy

CLI syntax

Sample configuration

Using extension Internet Service in policy

Custom extension Internet Service CLI syntax

At the same time, the incoming traffic is dropped because this IP address and port are disabled from Google.Gmail.

Global IP address information database

IP reputation filtering

Packets from the source IP address with reputation levels three, four, or five will be forwarded by this policy. This policy only allows outbound FTP traffic if the destination server has a minimum reputation of 4.

Internet service groups in policies

In this example, the PC has access to Google, so all Google services are placed in an Internet service group. Set the Destination to the newly created custom Internet service group and apply the newly created traffic shaper.

Allow creation of ISDB objects with regional information

Go to Policies & Objects > Firewall Policies and create a new policy or edit an existing policy.

Internet service customization

Warning: The configuration will only be applied after a reboot or using the 'execute internet-service refresh' command.

Look up IP address information from the Internet Service Database page

Internet Service Database on-demand mode

Since no services have been applied to a policy, the IP range and IP address values ​​are empty in the summary details.

Inspection modes

If you are unable to view a security profile feature, go to System > Feature Visibility to enable it.

Flow mode inspection (default mode)

Proxy mode inspection

At the same time, you also want to protect your web servers from external attacks. In this scenario, a proxy inspection policy is recommended to prioritize the security of employee emails.

Inspection mode feature comparison

You have a corporate mail server in your domain that is used by your employees for everyday business activities. By applying the antivirus and email filter in this mode, you can filter out any malware and spam emails received by the mail servers via SMTP or MAPI.

Feature comparison between Antivirus inspection modes

External Blocklist EMS Threat Feed AI/ML Based Detection

Feature comparison between Web Filter inspection modes

Feature comparison between Email Filter inspection modes

Feature comparison between DLP inspection modes

Proxy feature visibility in the GUI for entry-level models

Antivirus

Protocol comparison between antivirus inspection modes

Other antivirus differences between inspection modes

In legacy mode, stream-based scanning is disabled, so large archive files and files that cannot be handled by WAD in-process scanning are buffered and sent to the scanner daemon for processing.

AI-based malware detection

Configuring an antivirus profile

Enable the use of the explosion prevention database available with Advanced Malware Protection in FortiGuard. Use external malware block list Enable the use of one or more external block list file accesses.

Protocol options

Scan mode

Proxy mode stream-based scanning

TCP windows

The maximum stream-based uncompressed data size that will be scanned, in MB (default = 0 (unlimited)). Current-based decompression is only used under certain circumstances.).

Databases

Content disarm and reconstruction

Sample topology

File Quarantine Saves the original document file to disk (if possible) or a connected FortiAnalyzer based on the FortiGate log settings (config log fortianalyzer setting). FortiGuard Virus Outbreak Protection Service (VOS) allows the FortiGate antivirus database to be subsidized with third-party malware hash signatures compiled by FortiGuard.

External malware block list

To view entries in the malware block list on the External Connections page, hover over the malware hashmap and click View Entries. The malware threat feed is also specified (set external-blocklist-enable-all disable) for the threat socket, malhash1 (set external-blocklist "malhash1").

Malware threat feed from EMS

Checking flow antivirus statistics

HTTP Virus Detected: 1 HTTP Virus Blocked: 0 SMTP Virus Detected: 0 SMTP Virus Blocked: 0 POP3 Virus Detected: 0 POP3 Virus Blocked: 0 IMAP Virus Detected: 0 IMAP Virus Blocked: 0 NNTP- virus detected: 0 NNTP virus blocked: 0 FTP virus detected: 0 FTP virus blocked: 0 SMB virus detected: 0 SMB virus blocked: 0. HTTP virus detected: 1 HTTP virus blocked: 0 SMTP virus detected: 0 SMTP virus blocked: 0 POP3 virus detected: 0 POP3 virus blocked: 0 IMAP virus detected: 0 IMAP virus blocked: 0 NNTP virus detected: 0 NNTP virus blocked: 0 FTP virus detected: 1 FTP virus blocked: 1 SMB virus detected: 0 SMB virus blocked: 0.

CIFS support

To make a CIFS profile available for assignment in a policy, the policy must use proxy inspection mode. Please note that in proxy inspection mode, archive files with special conditions (encrypted, corrupted, mailbomb, etc.) flagged by the antivirus engine are automatically blocked.

Configure file-type filtering and antivirus scanning on CIFS traffic

Messages that are compressed with the LZNT1, LZ77 and LZ77+Huffman algorithms can be scanned in proxy mode. To decrypt CIFS traffic, FortiOS obtains the session key from the domain controller by logging in to the superuser account.

Log samples

Using FortiSandbox post-transfer scanning with antivirus

Using FortiSandbox inline scanning with antivirus

The FortiGate will block the file if there is an inline scan error or timeout. The FortiGate will log or ignore the file if there is an inline scan error or timeout, and the file is allowed to go through.

Using FortiNDR inline scanning with antivirus

When potential infections are blocked by FortiNDR inline inspection, a replacement message is displayed (see Replacement messages on page 2750 for more information). The following inspection logic applies when FortiNDR inline inspection is enabled concurrently with other AV inspection methods.

Exempt list for files based on individual hash

FortiGate can download quarantined files in an archive format (.TGZ) instead of the original raw file. At least one protocol must be enabled in the AV profile for inspection and AntiVirus scanning must be enabled for the quarantine option to work.

Web filter

URL filter

In the following example, a URL filter will be created to block the facebook.com URL with a wildcard. When the FortiGuard filter is enabled in a web filter profile and applied to firewall policies, if a request for a web page appears in traffic that is controlled by one of the firewall policies, the URL is sent to the nearest FortiGuard server.

Blocking a web category

Authenticate Require the user to authenticate with the FortiGate before allowing access to a category or group of categories. This option is only available for local or remote categories in the right-click menu.

Allowing users to override blocked categories

Issuing a warning on a web category

Authenticating a web category

Customizing the replacement message page

Customizing the CA certificate

Credential phishing prevention

Antiphishing scans only occur after the web-based URL filters and FortiGuard filters allow traffic. In this example, URLs that match FortiGuard category 37 (Social Networks) are blocked and other categories are recorded.

Additional antiphishing settings

Configuration examples

In this case, the qweranddauw9 entries use the literal type, [0-6]Dat*and[0-5]foo[1-4] use the default regular expression type.

Usage quota

Web content filter

The maximum number of web content templates in a list depends on the device model. To find the maximum number of web content models allowed for a device, go to the Max Value Table (https://docs.fortinet.com/max-value-table).

Content evaluation

You can use multiple web content filter lists and choose the best one for each web filter profile. Wildcard Use this setting to block or exclude a single word or text strings of up to 80 characters.

Advanced filters 1

Block malicious URLs discovered by FortiSandbox

Allow websites when a rating error occurs

Rate URLs by domain and IP address

Block invalid URLs

Advanced filters 2

Safe search

Restrict YouTube access

The file filter profile includes a setting to restrict access to Vimeo, which can only be configured in the CLI.

Log all search keywords

Restrict Google account usage to specific domains

HTTP POST action

Remove Java applets, ActiveX, and cookies

Web filter statistics

Proxy-based web filter statistics report

Flow-based web filter statistics report

URL certificate blocklist

Websense Integrated Services Protocol

Inspecting HTTP3 traffic

In this example, a web filter profile is created to block the words Welcome to aioquic, which are displayed on a web page that uses HTTP/3.

Configuring web filter profiles with Hebrew domain names

The content of the replacement message displayed in the browser depends on the inspection mode. When the log file is downloaded, the hostname in the raw file is displayed in Punycode.

Video filter

Configuring a video filter profile

Filtering based on FortiGuard categories

QUIC can be blocked manually (see Blocking QUIC Manually on page 1620) in application control profiles, such as in scenarios where traffic uses HTT2 over QUIC. Video Filter Enable and select filter_category Application Control Enable and select deep inspection default SSL inspection.

Verifying that the video is blocked

Troubleshooting and debugging

Filtering based on YouTube channel

Identifying the YouTube channel ID

Basic configuration

Configuration with YouTube channel override

If the category action is changed to allow and the channel action is changed to block, access to the video would be blocked.

Replacement messages displayed in blocked videos

In this example, the user visited a video on the YouTube website that belongs to a blocked FortiGuard category.

DNS filter

Referensi

Dokumen terkait

moec- ti saimsang sama kedjahatanuja orang jang di- hoekoem' dan bermaksoed memperbaiki kebedji- kanija orang jang dihoekoen, inilah kita akan Ka moelai polo dengan jara| halnj