Category Network Training

FortiGate Auto Backup to SFTP configuration

Hello everyone, today I am going to show you how to automatically back up your FortiGate configuration. As you know, backing up the configuration is crucial for every network engineer. Sometimes, network engineers forget to download backups of their configurations. If you follow along with me in this video, your firewall configuration will be automatically backed up every day. Additionally, every time an admin user logs in to the FortiGate, it will also generate the configuration and upload it to SFTP.

Step 1: Access the FortiGate Web Interface

  1. Open a web browser and enter the IP address or hostname of your FortiGate device to access its web interface.

Step 2: Log in 2. Log in to the FortiGate web interface with administrative credentials.

Step 3: Configure the SFTP Server

a. Navigate to System > Config > Features. b. Locate the “Backup” section and ensure that “Enable SFTP” is enabled. This allows the FortiGate device to communicate with the SFTP server for backup purposes.

Step 4: Create a Backup Profile

a. Go to System > Admin > Settings. b. Under Backup, you’ll find the “Backup Profiles” section. Click on the “Create New” button to create a new backup profile.

Step 5: Configure the Backup Profile

a. In the “Create New Backup Profile” window, provide a descriptive name for the profile. This name will help you identify the backup profile later. b. Select the frequency at which you want backups to occur. You can choose from options like daily, weekly, or monthly. c. Specify the time of day when the backup should be initiated. Choose a time that is convenient and doesn’t disrupt your network operations. d. Under the “Backup Location” section, select “SFTP Server” as the backup destination.

Step 6: Configure SFTP Server Settings

a. After selecting “SFTP Server,” you’ll need to enter the following details for your SFTP server: – Server IP Address or Hostname: This is the address of your SFTP server where backups will be sent. – Port: Typically, SFTP uses port 22, but ensure it matches your SFTP server’s configuration. – Username: Provide the SFTP username for authentication. – Password: Enter the password associated with the SFTP username. – Directory: Specify the directory on the SFTP server where you want to store the FortiGate backups.

Step 7: Schedule the Backup

a. After configuring the SFTP server settings, go to System > Config > Backup. b. Click on “Create New” to create a new backup schedule. c. In the “Create New Backup Schedule” window: – Select the backup profile you created in the previous step from the dropdown menu. – Choose the days of the week for backups (for weekly backups) or the day of the month (for monthly backups).

Step 8: Review and Apply Configuration

a. Review your backup configuration to ensure that all settings are accurate and complete. b. Click “Apply” or “OK” to save and apply the changes.

With these detailed steps, your FortiGate device is now configured to automatically back up its configuration to the specified SFTP server at the scheduled time and frequency you defined. Regularly verify the backups to ensure they are functioning correctly and provide a reliable safeguard for your firewall’s settings.

Tagged Untagged Switch Configuration

Hello everyone , in this video I will describe and configure vlan on hp switch and assign vlans to ports as access and trunk. In HP (Hewlett-Packard) networking switches, “tagged” and “untagged” are terms commonly used to describe how VLANs (Virtual LANs) are handled on switch ports. Tagged ports are used to carry traffic for multiple VLANs simultaneously. These ports are typically used to interconnect switches or to connect devices that need to communicate with multiple VLANs. Tagged ports are also known as “trunk” ports in Cisco networking terminology. Untagged ports are used to connect end-user devices, such as computers, printers, or IP phones, to the network. Each untagged port is associated with a specific VLAN. Untagged ports are also known as “access” ports in cisco networking terminology.

Tagged Ports (Trunk Ports): Tagged ports are used to interconnect switches, routers, or other networking devices and carry traffic for multiple VLANs. They are configured with additional information called VLAN tags, which helps identify which VLAN each Ethernet frame belongs to. Here are the key details:

  • Port Configuration: To configure a port as tagged (trunk), you typically need to access the switch’s command-line interface or web-based management interface.

In Cisco devices, you might use commands like:

interface GigabitEthernet0/1

switchport mode trunk

switchport trunk allowed vlan 10,20,30

switchport trunk native vlan 10

In HP/Aruba switches, you might use commands like:

vlan 10

tagged 1-48

  • VLAN Membership: You specify which VLANs can traverse the tagged port using the “switchport trunk allowed vlan” (Cisco) or “tagged” (HP/Aruba) command. In the example above, VLANs 10, 20, and 30 are allowed to traverse the trunk port.
  • Native VLAN: The native VLAN is used for untagged frames on a tagged port. In the Cisco example, VLAN 10 is the native VLAN. Any untagged traffic entering the port is treated as part of this VLAN.

Untagged Ports (Access Ports): Untagged ports are used to connect end-user devices, such as computers, phones, or printers, to the network. They are associated with a single VLAN, and traffic on these ports is not tagged with VLAN information. Here are the key details:

  • Port Configuration: To configure a port as untagged (access), you typically follow a similar process as configuring tagged ports through the switch’s management interface or CLI.

In Cisco devices, you might use commands like:

interface FastEthernet0/1

switchport mode access

switchport access vlan 10

In HP/Aruba switches, you might use commands like:

vlan 10

untagged 1-48

  • VLAN Assignment: You specify which VLAN the port is associated with using the “switchport access vlan” (Cisco) or “untagged” (HP/Aruba) command. In the examples above, the port is assigned to VLAN 10.

Use Cases:

  • Tagged Ports: Tagged ports are used for scenarios where you need to carry traffic for multiple VLANs between network devices. Common use cases include connecting switches together, connecting to routers that perform inter-VLAN routing, and connecting to virtualization hosts where multiple virtual networks exist.
  • Untagged Ports: Untagged ports are used to connect end devices to the network. For example, a computer in a specific department would connect to an untagged port in that department’s VLAN, ensuring that all its traffic is part of that VLAN.

In summary, configuring tagged and untagged ports correctly is crucial for effective VLAN management. Tagged ports allow traffic from multiple VLANs to traverse a single physical link, while untagged ports connect end devices to a specific VLAN. This segmentation helps in maintaining network security, optimizing traffic flow, and organizing network resources.

Fortigate Active Directory Integration

Hello everyone , in this video I will integrate my fortigate firewall with windows active directory , by doing this I can write the policies based on logged on users to their desktops , for example for one security group I can write a policy that can be access to facebook and for another group facebook will be blocked , or allow internet just for specific users that raised in security. Writing policies is depend on your environment.

1. Understanding Active Directory:

  • Active Directory is a Microsoft directory service that stores information about objects on a network, such as users, computers, groups, and more.
  • It provides centralized authentication and authorization services for network resources.

2. Purpose of Integration:

  • Integrating FortiGate with Active Directory helps streamline user authentication and access control for network resources.
  • It simplifies user management by allowing administrators to use AD user accounts for firewall policies.

3. Steps for FortiGate Active Directory Integration:

a. Configuration in Active Directory: – Ensure your Active Directory is properly configured with user accounts, groups, and organizational units (OUs).

b. FortiGate Web Interface Access: – Access the FortiGate web interface using a web browser.

c. Create a New LDAP Server Object: – Navigate to the “System” menu and select “Authentication” > “LDAP Servers.” – Click “Create New” to add a new LDAP server object. – Configure the LDAP server settings, including the server’s IP address or hostname, port (typically 389 for LDAP, 636 for LDAPS), and authentication credentials (usually a service account in AD).

d. Test LDAP Server Connectivity: – After configuring the LDAP server object, you can test the connectivity to ensure FortiGate can communicate with your AD server.

e. Create LDAP Authentication Group: – Go to “User & Device” > “User Definition” > “LDAP Servers.” – Create an LDAP authentication group and specify the LDAP server you created earlier.

f. Define Firewall Policies: – Create firewall policies that use LDAP authentication groups for user-based access control. – For example, you can define policies that allow or deny access to specific resources based on user group membership.

g. User Authentication: – When a user attempts to access a network resource, FortiGate will use the LDAP server to verify the user’s credentials. – Users will need to enter their AD username and password for authentication.

4. Additional Considerations:

  • Security: Ensure secure communication between FortiGate and Active Directory by using LDAPS (LDAP over SSL/TLS) for encrypted communication.
  • User Mapping: FortiGate can map AD groups to local FortiGate groups, simplifying policy management.
  • Fallback Mechanisms: Configure fallback authentication methods in case the LDAP server is unreachable or for users not in AD.

5. Monitoring and Maintenance:

  • Regularly monitor the integration for any issues, such as LDAP server connectivity problems or changes in AD group memberships.
  • Keep FortiGate and Active Directory servers up-to-date with security patches.

Install and Config Mikrotik Router

Hello everyone, in this video I am going to install mikrotik router os on hyper-v and after that I will be configure routerOS to provide internet access for clients by configuring dhcp server , create a nat rule , setup pptp vpn server. Ok lets start

  1. Hardware Requirements:
    • MikroTik router device (such as a MikroTik RouterBOARD)
    • Ethernet cables
    • Computer with an Ethernet port
    • Power source for the router
  2. Initial Setup:
    • Connect the MikroTik router to a power source and to your computer using an Ethernet cable. The router usually has a default IP address for the initial configuration, such as 192.168.88.1. Ensure that your computer is set to obtain an IP address automatically through DHCP.
  3. Access the Router:
    • Open a web browser on your computer and enter the default IP address of the MikroTik router in the address bar (e.g., http://192.168.88.1).
    • You should see the MikroTik login page. The default username is “admin,” and there is no password by default. It is crucial to change the default password during the initial setup for security reasons.
  4. Basic Configuration:
    • Once logged in, you can start configuring the router. Here are some basic configurations:
      • Set a strong password for the “admin” user.
      • Set the router’s hostname.
      • Configure the time zone.
      • Set the DNS servers.
  5. LAN Configuration:
    • Configure the LAN (Local Area Network) settings, including the IP address and subnet mask for the router’s LAN interface.
    • You can create DHCP server pools to assign IP addresses to devices on your local network automatically.
  6. WAN Configuration:
    • Configure the WAN (Wide Area Network) interface, which could be connected to your internet service provider (ISP). This often involves configuring the IP address, subnet mask, gateway, and DNS servers provided by your ISP.
    • Set up NAT (Network Address Translation) if you have multiple devices on your LAN and want them to share a single public IP address.
  7. Firewall Configuration:
    • Create firewall rules to control incoming and outgoing traffic. MikroTik routers have a powerful firewall system that allows you to filter and control traffic based on various criteria.
  8. Security and Access Control:
    • Configure access control lists (ACLs) to restrict or allow specific traffic.
    • Enable SSH or secure Winbox access for remote management and disable insecure services like Telnet.
  9. Additional Features:
    • Depending on your needs, you can configure various additional features such as VPNs, VLANs, QoS (Quality of Service), routing protocols, and more.
  10. Save and Backup Configuration:
    • After configuring your MikroTik router, make sure to save your configuration settings and create regular backups. This can be done through the router’s web interface.
  11. Testing:
    • Test your network to ensure everything is working as expected. Check internet connectivity, LAN connectivity, and any specific services or features you’ve configured.
  12. Documentation:
    • Keep thorough documentation of your MikroTik router’s configuration, including any changes you make over time. This will be helpful for troubleshooting and future reference.

Configure Site to Site VPN on Cisco ASA

Welcome to my channel , in this  video i will configure site to site vpn on Cisco ASA . i will show you the steps to set up a secure and reliable VPN connection between two Cisco Adaptive Security Appliances (ASAs).

Before we dive into the technical aspects, let’s take a moment to understand the importance of site-to-site VPNs in today’s interconnected world. As businesses expand globally, secure communication between different locations becomes paramount. Whether you’re connecting remote offices, data centers, or branch networks, a site-to-site VPN offers a robust solution to ensure data confidentiality, integrity, and availability.

Assumptions:

  • You have physical or remote access to the Cisco ASA device.
  • You have administrative access to the ASA via SSH, console cable, or ASDM (Adaptive Security Device Manager).

Step 1: Basic ASA Configuration

  1. Connect to the ASA using SSH or the console cable.
  2. Log in with your administrator credentials.

hostname ASA_NAME enable password YOUR_ENABLE_PASSWORD passwd YOUR_CONSOLE_PASSWORD interface GigabitEthernet0/0 nameif outside security-level 0 ip address YOUR_OUTSIDE_IP 255.255.255.0 no shutdown exit interface GigabitEthernet0/1 nameif inside security-level 100 ip address YOUR_INSIDE_IP 255.255.255.0 no shutdown exit route outside 0.0.0.0 0.0.0.0 YOUR_GATEWAY_IP 1

  1. Replace ASA_NAME, YOUR_ENABLE_PASSWORD, YOUR_CONSOLE_PASSWORD, YOUR_OUTSIDE_IP, YOUR_INSIDE_IP, and YOUR_GATEWAY_IP with your specific values.

Step 2: Define ISAKMP Policy

  1. Configure the ISAKMP (Internet Security Association and Key Management Protocol) policy to specify the encryption and authentication parameters for the VPN.

crypto isakmp policy 10 authentication pre-share encryption aes-256 hash sha group 2 lifetime 86400

Step 3: Create a Pre-shared Key

  1. Define a pre-shared key that will be used to authenticate the remote VPN peer.

crypto isakmp key YOUR_PRESHARED_KEY address REMOTE_PEER_IP

Replace YOUR_PRESHARED_KEY with your chosen pre-shared key and REMOTE_PEER_IP with the IP address of the remote VPN peer.

Step 4: Create a Crypto Map

  1. Create a crypto map that defines the remote peer’s IP, transform sets, and access control list (ACL) for traffic to be encrypted.

crypto map MY_CRYPTO_MAP 10 match address VPN_ACL crypto map MY_CRYPTO_MAP 10 set peer REMOTE_PEER_IP crypto map MY_CRYPTO_MAP 10 set transform-set MY_TRANSFORM_SET

Replace MY_CRYPTO_MAP, VPN_ACL, REMOTE_PEER_IP, and MY_TRANSFORM_SET with your desired values.

Step 5: Create an Access Control List (ACL)

  1. Define an access control list (ACL) that identifies which traffic should be encrypted and sent over the VPN.

access-list VPN_ACL extended permit ip LOCAL_NETWORK SUBNET_MASK any

Replace LOCAL_NETWORK and SUBNET_MASK with your local network’s details.

Step 6: Apply Crypto Map to an Interface

  1. Apply the crypto map to the ASA’s outside interface.

crypto map MY_CRYPTO_MAP interface outside

Step 7: Save the Configuration

  1. Save the configuration changes.

write memory

Step 8: Verify the VPN

  1. Check the VPN status using the following command:

show crypto isakmp sa show crypto ipsec sa

These commands will display information about the IKE and IPsec tunnels.

That’s it! You’ve configured a Site-to-Site VPN on a Cisco ASA. Remember to adjust the configuration to match your specific network topology and security requirements. Additionally, ensure that the remote peer’s configuration matches the parameters you’ve configured here for successful VPN establishment.

Reset FortiGate Password

Hello every one , in this video I am going to reset lost password of my fortigate firewall. there is some important things you have to know before resetting your password. First one you can not reset your password remotely , this means you can reset your password just by using console cable and connect your laptop or pc to the firewall. Second one if you want to reset you fortigate password you have to restart your firewall because to reset password we have to use maintainer account and this account is active just for 20 second after system boot up,

1. Identify the Appropriate FortiGate Model:

  • The first step is to identify the specific model of your FortiGate device. This information is typically found on a label or sticker on the device itself or in your network documentation. Knowing the model is important because the procedure may vary slightly between models.

2. Gather the Necessary Tools and Information:

  • Before you begin the password reset process, gather the following items:
    • Physical access to the FortiGate device.
    • A console cable: This is usually an RJ45 to serial cable that connects to the FortiGate’s console port.
    • A computer with terminal emulation software: You’ll need a computer with terminal emulation software installed, such as PuTTY (Windows) or Terminal (macOS/Linux).

3. Connect to the FortiGate Device:

  • Physically connect one end of the console cable to the FortiGate’s console port and the other end to your computer’s serial port or a USB-to-serial adapter.
  • Open your terminal emulation software and configure it to use the appropriate COM port (for Windows) or /dev/ttySx (for Linux) at the correct baud rate (usually 9600 baud).

4. Reboot the FortiGate Device:

  • Physically power cycle the FortiGate device. You can do this by unplugging the power cable and then plugging it back in or using the power button, depending on your FortiGate model.

5. Interrupt the Boot Sequence:

  • During the boot process, you’ll see the FortiGate logo and boot messages appearing in your terminal window. Quickly press “Ctrl + Break” or “Ctrl + C” to interrupt the boot sequence. This action will take you to the FortiGate bootloader menu.

6. Access the Bootloader:

  • Once you’re in the bootloader menu, you can enter configuration mode. To do this, type “conf” and press Enter. This command puts you in configuration mode within the bootloader environment.

7. Reset the Password:

  • Within the configuration mode, you can reset the password for an admin account. The commands may vary depending on your FortiGate model and firmware version, but here is a general example:arduinoCopy codeconfig system admin edit <admin-username> set password <new-password> next end Replace <admin-username> with the actual admin username and <new-password> with the desired new password.

8. Reboot the FortiGate Device:

  • After successfully setting the new password, exit the configuration mode by typing “end” and press Enter. Then, reboot the FortiGate device by typing “reboot” and pressing Enter.

9. Test the New Password:

  • Once the FortiGate device has rebooted, use the new password to log in to the FortiGate’s web interface or command-line interface (CLI). Ensure that the password change has taken effect.

Upgrade FortiGate Firewall

Hello every one , in this video I will upgrade fortigate firewall firmware , as you know upgrading firmware is very important because in older versions of forties , it has different security and performance bugs, also to download firmware, you need to have an account of Fortinet.com

  1. Preparation:
    • Identify the target firmware version you want to upgrade to. Check Fortinet’s official website for the latest firmware releases and release notes.
  2. Download Firmware:
    • Access the Fortinet Support Portal and download the firmware image file for your FortiGate model and the desired firmware version. Save it to your local machine.
  3. Backup Configuration:
    • Log in to the FortiGate web-based interface (GUI).
    • Navigate to System > Dashboard > Status and click on “Backup” to create a backup of your current configuration. Store this backup in a safe location.
  4. Check Hardware Requirements:
    • Verify that your FortiGate model has the necessary hardware resources to support the new firmware version. Refer to the release notes for hardware requirements.
  5. Upload Firmware:
    • In the FortiGate GUI, go to System > Firmware > Image and click on “Upload Images.”
    • Select the firmware image file you downloaded earlier and upload it to the FortiGate.
  6. Install Firmware:
    • After the firmware image is uploaded, select it and click on “Upgrade.” Follow the on-screen instructions to start the upgrade process. This process may take several minutes, and your FortiGate will automatically reboot when it’s completed.
  7. Verify Upgrade:
    • Once the FortiGate reboots, log back into the GUI and verify that the new firmware version is running. Go to System > Dashboard > Status to check the firmware version.
  8. Test Functionality:
    • Test critical network functions, such as firewall rules, VPN connections, and any other services you rely on, to ensure they are working as expected.
  9. Review Release Notes:
    • Review the release notes for the new firmware version to understand any changes, bug fixes, or new features introduced.
  10. Monitor and Troubleshoot:
    • Keep an eye on your network for any unexpected issues that may have been introduced by the upgrade. Be prepared to troubleshoot and rollback if necessary.
  11. Rollback (if needed):
    • In case the upgrade causes critical issues that cannot be resolved immediately, you may need to roll back to the previous firmware version using the backup you created earlier. This should be done carefully to avoid further disruptions.
  12. Post-Upgrade Tasks:
    • Update documentation and notify relevant team members or stakeholders about the successful upgrade.
    • Consider making any necessary adjustments or optimizations to the firewall settings based on the new firmware’s capabilities.