Static routing example

General configuration steps

The steps to configuring routing on this network are:

1. Get your ISP information such as DNS, gateway, etc.

2. Configure FortiGate unit

3. Configure Admin PC and Dentist PCs

4. Testing network configuration

 

Get your ISP information such as DNS, gateway, etc.

Your local network connects to the Internet through your Internet Service Provider (ISP). They have IP addresses that you need to configure your network and routing.

The addresses needed for routing are your assigned IP address, DNS servers, and the gateway.

 

Configure FortiGate unit

The FortiGate unit will have two interfaces in use—one connected to the internal network and one connected to the external network. Port1 will be the internal interface, and port2 will be the external interface.

To configure the FortiGate unit:

1. Configure the internal interface (port1)

2. Configure the external interface (port2)

3. Configure networking information

4. Configure basic security policies

5. Configure static routing

 

Configure the internal interface (port1)

To configure the internal interface (port1) – web based manager

1. Go to System > Network > Interfaces. Highlight port1 and select Edit.

2. Enter the following:

Addressing Mode                     Manual

IP/Netmask                                 172.100.1.1/255.255.255.0

Administrative Access             HTTPS, PING, TELNET

Description                                Internal network

To configure the internal interface (port1) – CLI

config system interface edit port1

set IP 192.168.10.1 255.255.255.0 set allowaccess https ping telnet set description “internal network”

end end

 

Configure the external interface (port2)

The external interface connects to your ISP’s network. You need to know the IP addresses in their network that you should connect to. Use their addresses when you get them, however for this example we will assume the address your ISP gave you is 172.100.20.20 will connect to the gateway at 172.100.20.5 on their network, and their DNS servers are 172.11.22.33 and 172.11.22.34.

 

To configure the internal interface (port2) – web based manager

1. Go to System > Network > Interfaces. Highlight port2 and select Edit.

2. Enter the following:

Addressing Mode                     Manual

IP/Netmask                                 172.100.20.20/255.255.255.0

Administrative Access             HTTPS, PING, TELNET

Description                                Internal network

 

To configure the internal interface (port2) – CLI

configure system interface edit port2

set IP 172.100.20.20 255.255.255.0 set allowaccess https ping telnet set description “internal network”

end end

 

Configure networking information

Networking information includes the gateway, and DNS servers. Your FortiGate unit requires a connection to the

Internet for antivirus and other periodic updates.

 

 

To configure networking information – web-based manager

1. Go to System > Network > DNS.

2. Enter the primary and secondary DNS addresses.

3. Select Apply.

 

 

To configure networking information – CLI

config system global

set dns_1 172.11.22.33 set dns_2 172.11.22.34

end

 

Configure basic security policies

For traffic to flow between the internal and external ports in both directions, two security policies are required as a minimum. More can be used to farther limit or direct traffic as needed, but will not be included here.

Before configuring the security policies, a firewall address group is configured for the PCs that are allowed

Internet access. This prevents PC without Internet privileges from accessing the Internet. The security policy assumptions are:

  • Only the basic networking services have been listed as allowed for added security. Others can easily be added as the users require them.
  • In this example to keep things simple, both incoming and outgoing security policies are the same. In a real network there are applications that are allowed out but not in, and vice versa.
  • Endpoint control has been enabled to ensure that all computers on the local network are running FortiClient and those installs are up to date. This feature ensures added security on your local network without the need for the network administrator to continually bother users to update their software. The FortiGate unit can store an up to date copy of the FortiClient software and offer a URL to it for users to install it if they need to.

 

To configure security policies – web-based manager

1. Go to Policy & Objects > Objects > Addresses.

2. Create a new Firewall Address entry for each of:

PC Name                                          IP Address                                        Interface

Admin                                               192.168.10.11                                    port1

Dentist1                                            192.168.10.21                                    port1

Dentist2                                            192.168.10.22                                    port1

Dentist3                                            192.168.10.23                                    port1

3. Go to Policy & Objects > Objects > Addresses.

4. Select the dropdown arrow next to Create New and select Address Group.

5. Name the group Internet_PCs.

6. Add Admin, Dentist1, Dentist2, and Dentist3 as members of the group.

7. Select OK.

8. Go to Policy & Objects > Policy > IPv4.

9. Select Create New.

10. Enter the following: DH – port2(external) -> port1(internal)

Incoming Interface                   port2

Source Address                        all

 

  Outgoing Interface port1
Destination Address Internet_PCs
Schedule always
Service Multiple.
   

Select DHCP, DNS,FTP, HTTP, HTTPS, NTP, POP3, SMTP, SSH.

Action ACCEPT
Log Allowed Traffic Enabled
 

11.

 

Select OK.

 
12. Select Create New.  
13. Enter the following:  
  Incoming Interface port1
  Source Address Internet_PCs
  Outgoing Interface port2
  Destination Address all
  Schedule always
  Service Multiple.
     

Select DHCP, DNS,FTP, HTTP, HTTPS, NTP, POP3, SMTP, SSH.

  Action ACCEPT
  Log Allowed Traffic Enabled

 

14. Select OK.

 

To configure security policies – CLI

config firewall address edit “Admin”

set associated-interface “port1”

set subnet 192.168.10.11 255.255.255.255 next

edit “Dentist1”

set associated-interface “port1”

set subnet 192.168.10.21 255.255.255.255 next

edit “Dentist2”

set associated-interface “port1”

set subnet 192.168.10.22 255.255.255.255 next

edit “Dentist3”

set associated-interface “port1”

set subnet 192.168.10.23 255.255.255.255 end

config firewall addrgrp edit Internet_PCs

set member Admin Dentist1 Dentist2 Dentist3 end

config firewall policy edit 1

set srcintf port1 set dstintf port2

set srcaddr Internet_PCs set dstaddr all

set action accept set schedule always

set service “DHCP” “DNS” “FTP” “HTTP” “HTTPS” “NTP” “POP3” “SMTP” “SSH” set logtraffic enable

set label “Section2”

set endpoint-restrict-check no-av db-outdated next

edit 2

set srcintf port2 set dstintf port1 set srcaddr all

set dstaddr Internet_PCs set action accept

set schedule always

set service “DHCP” “DNS” “FTP” “HTTP” “HTTPS” “NTP” “POP3” “SMTP” “SSH” set logtraffic enable

set label “Section2”

set endpoint-restrict-check no-av db-outdated end

end

 

Configure static routing

With the rest of the FortiGate unit configured, static routing is the last step before moving on to the rest of the local network. All traffic on the local network will be routed according to this static routing entry.

 

To configure Fortinet unit static routing – web-based manager

1. Go to Router > Static > Static Routes.

2. Select Edit for the top route on the page.

3. Enter the following:

Destination IP/Mask                 172.100.20.5

Device                                         port2

Gateway                                     172.100.20.5

Distance                                     10

 

4. Select OK.

 

To configure Fortinet unit static routing – CLI

configure routing static edit 1

set gateway 172.100.20.5 set distance 10

set device port2 set dst 0.0.0.0

end end

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.