00 BAE FortiManager 7.6 Q3 25 - V1.5 - With Challenge
00 BAE FortiManager 7.6 Q3 25 - V1.5 - With Challenge
6
Hands on Lab
Septiembre 2025
Buenos Aires, Argentina
1
Content
DOCUMENT HISTORY ............................................................................................................................................................ 5
00 – CONNECT TO THE ENVIRONMENT (10 MIN) .................................................................................................................. 6
LAB TOPOLOGY ................................................................................................................................................................................... 6
GETTING STARTED IN THE FNDN LAB ENVIRONMENT ................................................................................................................................. 7
01 INTRODUCTION AND INITIAL CONFIGURATION (30 MIN) ............................................................................................... 10
EXAMINE THE INITIAL CONFIGURATION ................................................................................................................................................... 10
ADJUST DATE AND TIME ..................................................................................................................................................................... 11
CONFIGURE ADOMS ......................................................................................................................................................................... 12
Advanced Mode ADOM ............................................................................................................................................................ 14
Quick Challenge: ....................................................................................................................................................................... 14
FORTIMANAGER AND FORTIANALYZER .................................................................................................................................................. 15
02 ADMINISTRATION AND MANAGEMENT (30 MIN) .......................................................................................................... 17
CREATING ADMINISTRATORS................................................................................................................................................................ 17
WORKSPACE MODE ........................................................................................................................................................................... 18
WORKFLOW MODE ........................................................................................................................................................................... 23
BACKUP AND RESTORE ....................................................................................................................................................................... 28
03 DEVICE REGISTRATION (60 MIN) .................................................................................................................................... 30
REQUEST FROM DEVICE ...................................................................................................................................................................... 30
ADD DEVICE WIZARD ......................................................................................................................................................................... 34
ADD MODEL DEVICE .......................................................................................................................................................................... 37
DEVICE BLUEPRINT ............................................................................................................................................................................ 45
IMPORT MODEL DEVICES FROM A CSV FILE ............................................................................................................................................ 52
DEVICE IN BACKUP MODE ADOM........................................................................................................................................................ 55
OPTIONAL – TABLE/MAP/RING VIEW ................................................................................................................................................... 62
04 DEVICE LEVEL CONFIGURATION AND INSTALLATION (90 MIN) ....................................................................................... 65
MORE ON AUTO-UPDATE AND AUTO-RETRIEVE ....................................................................................................................................... 65
Auto-Update in Backup ADOM ................................................................................................................................................. 65
Auto-Update in Normal ADOM ................................................................................................................................................ 67
Disable Auto-Update ................................................................................................................................................................ 69
MODIFIED ........................................................................................................................................................................................ 71
OUT OF SYNC.................................................................................................................................................................................... 74
CONFLICT ......................................................................................................................................................................................... 74
Challenge - Conflict................................................................................................................................................................... 75
INSTALLING SYSTEM TEMPLATE CHANGES ON MANAGED DEVICES .............................................................................................................. 76
CONFIGURING DEVICE LEVEL CHANGES .................................................................................................................................................. 81
DEVICE MANAGER SCRIPTS.................................................................................................................................................................. 85
CHALLENGE – SD-WAN TEMPLATE ...................................................................................................................................................... 92
SD-WAN Monitor ...................................................................................................................................................................... 92
Common Template with disparate sites ................................................................................................................................... 93
05 POLICIES AND OBJECTS (90 MIN).................................................................................................................................... 95
POLICY PACKAGES.............................................................................................................................................................................. 95
2
More on CLI configurations .................................................................................................................................................... 104
Common Policy Packages ....................................................................................................................................................... 108
Challenge - Common Policy .................................................................................................................................................... 111
POLICY PACKAGE SCRIPTS.................................................................................................................................................................. 112
OBJECTS AND DYNAMIC OBJECTS........................................................................................................................................................ 116
Solving Conflicts ..................................................................................................................................................................... 123
POLICY BLOCK................................................................................................................................................................................. 127
USING METADATA VARIABLES............................................................................................................................................................ 130
ADOM REVISIONS .......................................................................................................................................................................... 135
SD-WAN MANAGEMENT (30 MIN) .................................................................................................................................... 136
06 GLOBAL DATABASE ADOM AND CENTRAL MANAGEMENT (30 MIN) ............................................................................ 141
GLOBAL OBJECTS ............................................................................................................................................................................. 141
HEADER AND FOOTER POLICIES .......................................................................................................................................................... 141
CENTRAL MANAGEMENT .................................................................................................................................................................. 146
Fabric View - Topology ........................................................................................................................................................... 146
Fabric View – Security Rating ................................................................................................................................................. 150
07 DIAGNOSTICS AND TROUBLESHOOTING (30 MIN) ....................................................................................................... 151
BREAK THE FGFM PROTOCOL COMMUNICATION ..................................................................................................................................... 151
Rollback-allow-reboot ............................................................................................................................................................ 154
08 ADDITIONAL CONFIGURATIONS (20 MIN) .................................................................................................................... 155
UPGRADE FORTIGATE FIRMWARE USING FORTIMANAGER ...................................................................................................................... 155
09 SD-WAN CHALLENGE (90 MIN) ..................................................................................................................................... 157
NETWORK TOPOLOGY ...................................................................................................................................................................... 157
OBJECTIVE...................................................................................................................................................................................... 157
WINNING CONDITIONS ..................................................................................................................................................................... 157
SUMMARY: .................................................................................................................................................................................... 158
HINTS............................................................................................................................................................................................ 159
Overlay Template Hint 1: ....................................................................................................................................................... 159
Overlay Template Hint 2: ....................................................................................................................................................... 160
Policy Hint 3:........................................................................................................................................................................... 160
Policy Hint 4:........................................................................................................................................................................... 161
Check the VPN Monitor .......................................................................................................................................................... 161
Routing Hint 5: ....................................................................................................................................................................... 162
SD-WAN Strategy Hint 6: ........................................................................................................................................................ 162
APPENDIX ......................................................................................................................................................................... 163
CONFIGURATION SCRIPTS .................................................................................................................................................................. 163
Site1-1 .................................................................................................................................................................................... 163
Site1-2 .................................................................................................................................................................................... 163
Site1-H1 .................................................................................................................................................................................. 164
Site1-H2 .................................................................................................................................................................................. 165
Site2-1 .................................................................................................................................................................................... 165
Site2-H1 .................................................................................................................................................................................. 166
FORTIMANAGER GUIDES .................................................................................................................................................................. 166
JINJA DOCUMENTATION WIKI ............................................................................................................................................................ 166
Jinja Orchestrator ................................................................................................................................................................... 167
3
4
Document History
NOTE: This document is inspired by the FortiManager 7.6 official admin guides and trainings.
5
00 – Connect to the environment (10 min)
LAB Topology
6
Getting Started in the FNDN Lab Environment
The lab leader will provide you with a passphrase for the individual lab environments. The same
passphrase is used for everyone, but FortiDemo will provide access only to your personal lab
environment.
Note: After signing in, you will see the details of your lab. Keep this page open in a tab in your browser
as an easy reference to Your Training instance and the administrative login IDs and passwords to the
different infrastructure components in your lab.
Note: This lab uses self-signed certificates from the lab certificate authority. Expect to see certificate
warnings when connecting.
7
➔ Test the connectivity to FortiManager by clicking the HTTPs button in the main instance page
8
➔ Verify that the FortiManager Firmware version is 7.6.3
9
01 Introduction and Initial Configuration (30 min)
10
Adjust Date and Time
Adjust FortiManager date and time
➔ Go to Dashboard → System Information widget and edit the System Time
11
Configure ADOMS
ADOMs group devices for administrators to monitor and manage. The purpose of ADOMs is to divide
the administration of devices and control (restrict) access.
o You can view the same information from the CLI using the following command:
▪ diagnose dvm adom list
➔ In the System Settings → ADOMs menu, click +Create New button to add a new ADOM
➔ Explore the options and create a new ADOM with the following characteristics:
o Name: BAE_FMG
o FortiGate 7.6
o Normal Mode
o Disable FortiAP and FortiSwitch management
12
➔ Check the rest of the options for Data Policy, Disk Utilization quota, Time Zone and DNS.
o This is a LAB environment, y u ’ y k qu f DO
o Where is the advanced ADOM mode setting?
➔ Select the new ADOM and you will be placed automatically in the new ADOM: BAE_FMG
13
➔ Now browse to Device Manager → Device & Groups and confirm the ADOM is empty
➔ ADOM Advanced mode setting is in System Settings → Advanced → Misc Settings page
o D b W ’ b
Quick Challenge:
➔ Create a new ADOM in Backup Mode. You will use it later.
14
FortiManager and FortiAnalyzer
➔ Did you notice that you already have FortiView, Log View, Incidents and Reports in FortiManager
menu?
➔ Browse to Dashboard and check the bottom of the System Information widget
o Notice FortiAnalyzer features are enabled on FortiManager
You can use FortiManager as a logging and reporting device by manually enabling FortiAnalyzer
features on FortiManager
➔ OPTIONAL: If you want, you can Click on the slider and disable FortiAnalyzer features in
FortiManager.
o We wont use and FAZ feature in the LAB
o This will restart FortiManager.
15
➔ After FortiManager restarts, check the System Information again to verify FortiAnalyzer features has
been disabled.
16
02 Administration and Management (30 min)
Creating Administrators
You will create an administrator with restricted access permissions. We will use it later in the
Workspace and Workflow labs.
17
o Use any username and password you like
o Admin type Local
o Only allow it to access the new ADOMs created in the previous section
o Select the Standard_User profile
Workspace Mode
Workspace mode disables concurrent read/write access to the ADOM.
18
➔ Click Apply and OK
o You will be logged out
➔ Go to Device Manager → Device and Groups and check the upper menu to see if you can Add
Devices or create Device Groups or even run the Install Wizard.
➔ Lock the ADOM by clicking the padlock icon next to the ADOM name
19
➔ This will lock the ADOM
➔ Now, check the menu again to see if you can add devices or groups.
o The menus are enabled now
20
➔ Try to add a new Device from Device Manager → Devices and Groups
o What happens?
➔ Then browse to Dashboard → System Information → click the Icon next to Current
Administrators to check the Admin Session List
Remember: an ADOM with Workspace mode enabled will be read-only until you lock it.
Enabling Workspace per-ADOM, allows you to select which ADOMs have Workspace mode enabled.
➔ Click Apply
21
➔ Next, browse System Settings → ADOMs and edit the new ADOM: BAE_FMG to enable
Workspace in that ADOM
➔ Click OK
➔ Lock the ADOM and test the locking like the previous exercise using both admins
Remember: In Workspace mode you can lock a device, a policy package, an individual policy, an
object or a Policy Block. You can test this in the next sections after we add devices and policies.
22
Workflow Mode
Workflow mode is used to control the creation, configuration, and installation of policies and objects. It
helps to ensure all changes are reviewed and approved before they are applied.
When workflow mode is enabled, the ADOM must be locked, and a session must be started before
policy or object changes can be made in an ADOM. Workflow approvals must be configured for an
ADOM before any sessions can be started in it.
23
➔ Note: If the Session List is not shown, you can also go to Sessions → Session List
➔ When you are done, save the changes using the Save button
o You can save and continue as many times as you need
25
➔ Check the Revision Diffs and click Close
➔ The changes need approval before installing, login as admin, lock the ADOM and check the
Sessions
o You can Approve, Reject, Repair, Discard or Revert the session
26
➔ Select the session and View Diff.
o Check the Details and CLI Diff
27
Backup and Restore
➔ Login to FMG and go to Dashboard → System Information → Click the backup icon in the
System Configuration section
➔ Select the local folder to store the backup and wait for the download to complete
➔ Then go back to Dashboard → System Information → Click the Restore icon in the System
Configuration section
o Complete the File location and password and restore the System
28
➔ Verify the changes are restored.
➔ If you selected to Restore in Offline mode, jump to System Settings → Advanced → Misc
Settings and disable Offline Mode
Remember: Backups contain everything except logs, FortiGuard Cache and firmware saved on
FortiManager.
29
03 Device Registration (60 min)
In this section we are going to try the different Device Registration options: initiated from the Device,
initiated from the FortiManager and its alternatives.
➔ Switch to the root ADOM and browse to Device Manager → Device & Groups → Unauthorized
Devices
o You should see a list of 6 devices with their serial numbers and IP Address like the following
capture (in your environment the serial numbers will be different)
Think: Do you know why and how these devices are being shown in FMG?
Answer: These devices are already preconfigured with the FortiManager IP address and they started a
request process. However, this request is not completed.
➔ Open the main instance tab in your browser and connect to site1-1
30
This means that the Central Management Settings have been pre-configured with the IP address of the
FortiManager.
All you must do next is authorize the device in FortiManager. But before you authorize site1-1 in FMG, it
is important to accept the FortiManager serial number from the FortiGate side.
31
➔ A pop-up should appear to Accept the FortiManager Serial Number
32
➔ Next, Go back to FortiManager → root ADOM → Device Manager → Devices and Groups →
Unauthorized Devices
o Select site1-1 and click the Authorize button
➔ Select the ADOM BAE_FMG the FortiGate belongs to and click OK.
o Do not assign any Policy Package or Template.
➔ Login again to site1-1 FortiGate, you will notice the following message:
33
➔ Login in Read-Only mode. You should always enter the devices in Read-Only mode when using
FMG.
Congrats! You have added your first Device in FortiManager! In the following exercises we will explore
different ways to add devices.
site1-2 #
➔ Or use the GUI → Security Fabric → Fabric Connectors → Central Management → Disabled
34
➔ Check site1-2 FortiGate management interface configuration (port10)
o Notice the IP address and Admin Access. FMG-Access should be enabled.
➔ Now, login into FortiManager and enter the ADOM BAE_FMG → Device Manager → Device and
Groups
o Click Add Device in the upper menu and select Discover Device
35
➔ Enter the IP address from site1-2 and enable Legacy Login.
o Use the credentials admin/Fortinet
➔ Click Next and wait for the device to be discovered and examine the information
o Do not change anything or assign any template
o Click Next
36
➔ The new device will be shown in the Managed FortiGate section
o And the Config Status should also be Synchonized
➔ Open port10 configuration and write down the IP address. Also, check FMG-Access is enabled.
37
➔ Also, take note of the serial number, you are going to need it soon.
site1-H1 #
➔ Shutdown site1-H1
38
➔ Go to FortiManager and switch to the root ADOM.
o Make sure site1-H1 is not in the Unauthorized Devices list. Delete it if necessary.
➔ Go back to the BAE_FMG ADOM and browse to → Device Manager → Device and Groups
o Click → Add Device → Add Model Device
39
➔ Click Next and wait for the Wizard to complete.
o Then click Finish.
➔ You will have a new Model Device in the list of Managed FortiGate window, like the following
screenshot (your serial number will be different)
o Notice the differences between the Model Device and the previously added Devices
Model devices are used to store configuration for a device that is not yet online and not yet connected
to the network.
40
➔ Right-click on site1-H1 and select Edit
41
➔ Search for site1-H1 in the Device list and notice the status Shut Off
➔ Wait until the pop up says Task Completed and then click Close
42
➔ Give it a minute for the VM to power on.
o You will see a Ready for Auto-link status in FortiManager
➔ You will see a conflict Status after the auto-link, but the site1-H1 should be up
43
➔ We have a conflict because FortiManager has wiped the device configuration and is not in sync with
the FMG DB (both Device DB and Remote Device Config have been modified)
o We can manually sync now.
o Select site1-H1 from the Managed FortiGate section and search the Dashboard Summary
→ Configuration and Installation widget
➔ Wait until the process is complete and click Finish, then Close
44
➔ Back to Device and Groups → Managed FortiGate and check the Device List
o site1-H1 should be Synchronized
Device Blueprint
Device blueprints can be used when adding model devices to simplify configuration of certain device
settings, including device groups, configuring pre-run templates, policy packages, provisioning
templates, and more. In this exercise we are going to add site1-H2 to FMG in the BAE_FMG ADOM
using a Blueprint.
➔ Then, login to FortiManager and create a new Device Group from Device Manager → Device &
Groups → Device Group → + Create a New Group
45
➔ Type a Group Name and select OK
➔ Next, we are going to create a new System template to apply to the Blueprint. We will cover
templates in the next sections, but for now we need a basic template.
o Go to Device Manager → Provisioning Templates → System Templates
46
➔ Click More → Import
➔ You will have a new System Template and since it is based on site1-1, it is already assigned to
site1-1.
o The important thing here to note is that it is only assigned to site1-1.
➔ Remove the Host Name field in the template. Leave it blank and click OK.
47
➔ Now we will create a Device Blueprint that automatically assigns the new System Template and the
new Device Group to Model Devices.
o Go back to Device Manager → Managed FortiGate
o Click the arrow next to Add Device and select Device Blueprint
48
➔ You should see something like this in the Device Blueprint window, then click Close
49
➔ Wait for the process to complete and click Finish
➔ Reboot/Power-on site1-H2 and wait a minute or two for the VM to come back on
➔ After a moment, you will notice site1-H2 in the modified state, and the site is connected (Green
Arrow) u C f u kw ’ w f u
➔ If you get a Last Try Failed status, you probably have the wrong Blueprint! Fix it and start over
50
➔ Once Auto-Link is completed; retrieve site1-H2 configuration like we did in previous exercise to
synchronize the device.
➔ Finally, browse to Provisioning Templates → System Templates and see if site1-H2 has been
assigned the new System Template.
51
Import Model Devices from a CSV file
In this exercise we are going to add site2-1 and site2-H1 to FMG in the new ADOM (BAE_FMG) using a
CSV file, model device and Blueprint.
➔ First, we create the CSV file. Instead of creating a file from scratch, we will create a new one from
FortiManager
o Open the Device Blueprint window
➔ Select the prefix FGVM02 to use for generating the serial number and click OK
52
➔ Open the new generated CVS file and add site2-1 and site2-H1 serial numbers and names.
o Your serial numbers are different
➔ Jump to the root ADOM and remove the devices from the unauthorized list. You cannot add new
devices if the serial number is already present in any other ADOM
➔ Switch to BAE_FMG ADOM and select Device Manager → Add Device → Import Model Devices
from CSV File
53
➔ Wait for the serial numbers to be added, it should look like this:
➔ Click Next and wait for the process to complete, then Finish
➔ Again, both devices will be added. Edit both site2-1 and site2-H1 to add the admin password
54
➔ After retrieving site2-1 and site2-H1 configuration, the device table should look like this:
Questions:
• Did you notice the hostnames differences between the devices? Why some devices have
hostnames and others serial numbers?
• Why site1-1 Config Status is Modified?
In this section, we are moving site1-1 to the backup ADOM to test these conditions.
➔ Browse to System Settings → ADOMs and edit the Backup Mode ADOM
55
➔ Click on Select Device to move devices to this ADOM
➔ Switch to the Backup ADOM and select Device Manager → Devices and Groups
➔ Login to site1-1 GUI and check if you can access read-only mode or read-write mode.
57
➔ As you can see, site1-1 Central Management is working in Configuration Backup Mode
➔ First, go to site1-1 Dashboard. You will notice that the widgets are also different in a BackUP
ADOM.
o From the Configuration Revision History, click the Retrieve Config button to create a new
revision from the device configuration.
58
➔ Now switch to site1-1 GUI and change the timezone configuration directly from the device
➔ Again, switch to FortiManager → Device Manager → Managed FortiGate and check site1-1
configuration status
o Ou f y … W y???
o It should be updated based on the conditions explained at the beginning of the test.
In BackUp Mode ADOM we must enable fcp-cfg-service. This allows the FortiGate to upload its
configuration to the FortiManager's management system, creating backups and revisions in the
designated ADOM.
59
➔ Open FortiManager CLI
➔ Now, go to site1- U k D ’ b k y !
➔ Check FortiManager → Device Manager → And verify site1-1 is still Out of Sync
60
➔ And check again FortiManager. Now site1-1 is synchronized
➔ This last test confirms the conditions in which a device configuration is updated in a BackUp ADOM.
Revisions are sent to the FortiManager when specific conditions are met:
• Configuration change and session timeout
• Configuration change and log out
• Configuration change and reboot
• Manual configuration backup from the managed device.
61
Optional – Table/Map/Ring View
You can arrange the devices in a map for a visual representation of the network.
➔ Go to Device Manager → Device & Groups → Managed Fortigates → Select Map View from the
dropdown menu
o Use the Normal ADOM: BAE_FMG
➔ Select each device from the list and drag/drop the device on the map to the right.
o Have fun with it!
o Click Close, to exit
62
➔ Place each device in its own location:
➔ Now select Ring View from the drop-down menu and see what happens!
o Select One by One in the menu. It will circle through all devices
63
➔ You can always go back to Table View.
64
04 Device Level Configuration and Installation (90 min)
In previous sections we used the Device Manager pane to add and authorize devices for management
by FortiManager. You can also use the Device Manager pane to create device configuration changes
and install device and policy package changes to managed devices. You can also monitor managed
devices from the Device Manger pane.
We are also going to explore the different Configuration Status we can get for the devices to try to
understand w ’ going on in FMG and how to avoid conflicts.
Remember! The device configuration state should always be Synchronized. This means that the latest
revision is confirmed as running on the device.
This is important because you can use the revision to track the changes in FortiGate configurations
➔ Now click site1-1 and check the Configuration Revision History Widget
65
➔ Select the latest revision ID and select View Config icon
o You can view, search and download the current Device configuration
66
➔ Review the Configuration Comparison. Does it make sense according to the latest changes in the
device?
67
➔ Switch to ADOM BAE_FMG and verify all devices are ok.
➔ In the Managed FortiGate window, check all devices are Synchronized or Auto-Update
➔ Login to site1-1 GUI in Read-Write Mode and create a simple firewall policy
68
➔ Check FortiManager again for the Config Status of site1-1. It should be Auto-Update.
o If it is in Modified State, wait a minute. It should Auto-Update.
Disable Auto-Update
The auto-update operation is enabled by default. To disable auto-update and allow the administrator to
accept or refuse updates, use the following CLI commands:
➔ Continuing from previous exercise, we are going to test disabling the auto-update operation in
FortiManager.
o Login to FortiManager CLI and apply the following commands
69
➔ Login to site1-1 GUI in Read-Write mode and delete the previously configured firewall policy
➔ D ’ f b u -update again!
70
Modified
You can change the Device Level DB directly from FMG. This is done from the Device Manager menu.
The Modified status means that configurations are modified on FortiManager and not synchronized
between FortiManager and the managed device. For example, you made a device-level database
change, and after this you must Install the Changes via Install Wizard.
➔ Browse to FMG → Device Manager → Devices & Groups → Managed Fortigate → site1-1
o Select System → Settings from the upper menu
➔ Go back to the Devices Table and check the Config Status. It should be Modified.
71
➔ This means that the Device DB has been Modified, and ’ different from the latest revision history
and different from the remote device config.
➔ To install this, go to FMG → Device Manager and run the Install Wizard
o This will install the changes to site1-1 and updates the Revision History
72
➔ Check the Install Preview
73
Out of Sync
This means that the configuration file on the device is not synchronized with the FortiManager system.
➔ We saw the Out of Sync Status in the Backup ADOM exercise when you make changes to the
FortiGate device and the FortiManager is not updated.
o We also already saw this when you disabled the Auto-Update.
Just remember, every time you see a device configuration Out of Sync, you have to choose either to
retrieve the configuration or install the device DB configuration.
Conflict
Conflict happens when the Install Failed or when configurations were modified on both FortiManager
and managed device, and not auto synced to FortiManager
➔ We have already seen the conflict Status after the auto-link in the Add Model Device exercise.
74
Challenge - Conflict
➔ We will try to create a Conflict by disabling auto-update again and making changes in both Device
Level and Remote Device Config
➔ Disable Auto-Update
We can also get Conflict status even with Auto-Update enabled. If the change from FortiGate is a
device level setting, the policy layer status in FortiManager remains unchanged. If the change from
FortiGate is a policy level setting, the policy layer status in FortiManager might change to Conflict
status. It is highly recommended to always modify settings on FortiManager and not on FortiGate.
75
Installing System Template Changes on Managed Devices
In this exercise, we are going to use a single System Template to set some general parameters that
apply to all devices.
➔ Locate the Time Zone section and set it to any value you like
➔ Also, scroll down to Log Settings and configure to send the logs to This FortiManager
76
➔ Browse to Device & Groups → Managed Fortigate and check the configuration Status
The Configuration Status is in Modified state because we have changed the Device Level DB by
applying a Template, but the remote devices are not updated.
➔ Device configuration and/or provisioning templates have been changed, please run the Install
Wizard to apply changes to remote device.
o Click the Install Wizard button and select Install Device Settings (only)
➔ Follow the Wizard. And check the Install Preview to verify the changes
77
➔ Click install when you are ready and wait for the Wizard to Finish.
➔ Also check the Provisioning Templates column in the Managed FortiGate table
78
➔ Now, login to site1-1 GUI in Read-Write Mode, and change the timezone like we did before
o Change the current Time Zone setting to any other value you like
o Click Apply to save the changes
➔ Go back to FMG → Device Manager → Managed FortiGate and check site1-1 Config Status
o Site1-1 shows Auto-Update
o If the Status is Out of Sync, just wait for a minute to change.
➔ Browse to Managed Fortigate → site1-1 → System Settings menu to see what timezone its
shown in the Device DB
o It should be the same we just set via the GUI
79
➔ And check the Revision History to compare the new auto updated revision against the Previous
Version
o Show Diff Only
➔ W ’ going to happen if I run the Install Wizard again to Install Device Settings?
o Try it now
o Check the install Preview and complete the Wizard
➔ What happened to the Time Zone in the FortiGate device, the Device DB and Revision History?
o Verify all configurations
80
Remember: Provisioning Templates are a way to indirectly modify the Device DB and they take
precedence over the Device DB settings for that Template.
➔ Login to site-1-1 GUI in READ ONLY mode and check the interfaces table.
o Notice the Administrative access column for port1. Only PING is enabled.
➔ Edit port1 and enable Administrative Access HTTPS, HTTP and SSH
81
➔ You can verify that site1- f u ’ by f b w U
82
L ’ try another change in the Device DB to test the behavior when a template is applied.
➔ Still in site1-1 GUI, browse to System → Setting and check the timezone value we set in the
previous exercise.
➔ Go to FMG → Device Manager → Device & Groups → site1-1 → System Setting and change the
timezone again to any value
o Then click Apply
➔ Like the previous exercise, site1-1 Config status is Modified. So, we run the Install Wizard to apply
the changes.
83
➔ Check the Install Preview
o Why is there no preview?
Quick Challenge: Fix the Devices groups and arrange them in a better way.
➔ We currently have site1-H2, site2-1 and site2-H1 in the same device group (HUBs). Reorganize all
devices in a different structure that makes more sense. See the following screenshot for an
example.
84
➔ Now apply different System Templates to different Device Groups
➔ Finally, unassign the System templates. What happens with the remote device configuration?
Remember: Removing a Template does not remove the configuration from the remote device. If you
need to unset configuration from a Template, then keep the Template assigned to the device and edit
the Template to remove the configuration you want.
➔ We are going to use scripts to make bulk changes to devices. One simple way of creating Scripts is
using the revision history.
➔ Go to Device Manager → Device & Groups → Managed FortiGate → select site1-1 and check
the revision history
o Show the Diff Only with the previous version. You should have the latest changes from the
previous exercise.
85
➔ Select the Save Diff as Script button at the bottom and save the script to your local computer.
86
➔ Complete the Script options to apply the commands we took from the revision history to all devices.
o Use the following screenshot as reference
➔ Make sure to Run the script on Device Database and click OK.
➔ Next select the entries to run the script in the devices or groups you want.
o And click Run Now
87
➔ Review and Confirm with OK
o Close after the Script is completed
➔ Now browse to Device Manager → Managed FortiGate → and check the devices table Config
Status:
➔ This confirms that the Script modified the devices DBs, and now we need to apply the Changes to
Sync the configurations.
o Run the Install Wizard and check the install preview before applying the changes.
88
➔ Edit the Script to remove HTTP, PING and SSH from the allowaccess options.
o Also change to Run the Scripts on remote FortiGate Directly via CLI
➔ Run the Script in all Devices from Region2 or any other group you have.
89
➔ Validate and click OK
➔ You can verify the local device configuration by logging to the devices GUI and see the
90
configuration. Also, check in FMG the configuration revision history.
➔ You can also browse the Configuration and Installation Widget and see the Script Status
o It is in Device Manager → Devices & Groups → Managed FortiGate → Select a device
→ Dashboard: Summary → Config and Installation widget
91
Remember: After running scripts, the same rules apply for resolving synchronization Config Status.
SD-WAN Monitor
➔ You should be able to see the SD-WAN status in Device Manager → Monitors → SD-WAN
Monitor
92
➔ You should be able to drill down on one site and see the Health Check details and SD-WAN History
View
Hint1:
Use a single SD-WAN Template, check inside the template for the installation target column.
93
Hint2:
94
05 Policies and Objects (90 min)
Policy Packages
Policy & Objects enables you to centrally manage policies and any objects used by those policies for
devices that are managed by the FortiManager.
All changes related to policies and objects should be made on the FortiManager Policy Database, and
not on the remote managed devices.
➔ In FortiManager, go to Device Manager → Device & Groups → Managed FortiGate to see the
Table View
o Right Click on site1-1 and select Import Configuration
o This will import all the policies and objects from the remote device and create a Policy
Package in FortiManager assigned to the remote device.
95
➔ Resolve any conflicts and click Next
➔ Check the Device Table View and search for the Policy Package Status column
96
➔ Now, browse to Policy & Objects → Policy Packages → and select site1-1
o Notice the Firewall Policy and Installation Targets sections
➔ Run the Install Wizard and select Install Policy Package & device Settings
o We do this as a sanity measure to see if there is some configuration left to synchronize
o Do not Create an ADOM Revision
➔ As you can see, there was some configuration to purge/set to fully synchronize the remote site with
FMG.
97
➔ Now site1-1 is fully synchronized to FMG (Device DB, Revision History, Policy Package and
Provisioning Template)
98
➔ Login to site1-1 GUI in READ-ONLY mode and check the Firewall Policies
o Navigate the GUI Policy & Objects → Firewall Policy → select by Sequence
o Only the implicit rule is present
➔ Go back to FMG → Policy & Objects → Policy Packages → site1-1 → Firewall Policy
o You will see the same as the local GUI
➔ And complete the New Policy. Make it simple, like the following screenshot
99
➔ Run the Install Wizard to push the new Policy to site1-1
100
➔ After the Wizard is completed, jump to site1-1 GUI to verify the installation of the new policy
➔ In FMG → Device Manager → Device & Groups → Managed FortiGate → check the device table
for site1-1. It should be synchronized.
101
➔ Next, Go to → Policy & Objects → Firewall Policy and delete the new policy
➔ Go back to FMG → Device Manager → Managed Fortigate → And see the device table for site1-1
Config Status
o It will show as Auto-Update
o If you see Out-of-Sync, wait for a few seconds until it updates
➔ T k w …
Question:
Why do you still see the Firewall Policy in FMG Policy Packages?
Why does the device shows as auto-updated in Device Manager?
102
➔ Browse to FMG → Device Manager → Device & Groups → Managed FortiGate → Select site1-1
o Click on CLI configurations
o In this section we can see site1-1 full Device DB
➔ Use the search function or browse through the configuration tree to find the Firewall Policy section
of the configuration.
As you can see, there are no firewall configurations in site1-1 Device DB in FMG, which is why you see
site1-1 is synchronized in Device Manager Table View.
Policy & Objects is a separate objects database that is shared among multiple devices. When a device
auto-updates its configuration, it only updates its Device DB in Device Manager.
➔ If we run the installation Wizard again, we can push the policy again.
o We must run the Wizard from the Policy Package and Device Settings level
103
o Now you see the Firewall Policy back in Device DB
o And of course, the policy is back to site1-1 GUI because it was installed by the wizard.
➔ Did you know that you can use CLI configurations to create a Firewall Policy from Device Manager,
without using Policy & Objects?
o Browse to Device Manager → Device & Groups → Managed FortiGate → select site1-2 →
CLI Configurations
o Search for policy in the search field
➔ Click on + Create New and complete the slide in window for the new policy configuration
➔ Click OK
➔ Now check the Device Table, and verify that site1-2 has Config Status Modified
105
o This is because we just modified the Device DB
➔ Login to site1-2 GUI in Read-Only Mode to check the new Firewall Policy is not present. We only
modified the FMG site1-2 Device DB.
➔ Run the Install Wizard to push the new Firewall Policy to site1-2.
o Run the Wizard from Install Device Settings (only).
o Do you understand why only Device Settings is enough here?
➔ Check the Install Preview for site1-2 and complete the Wizard.
o Site1-2 Config Status will be in Synch again
106
➔ Check site1-2 GUI again to verify the new Firewall Policy has been installed
T b w y f u w …
➔ In FMG, Import site1-2 configuration to create a Policy Package for site1-2, like we did for site1-1
➔ After importing the configuration, the sites will look like this in the Table View
107
➔ Check the new Policy Package in Policy & Objects → Policy Packages → select site1-2
o Notice the FW Policy created from CLI Configuration has been imported.
➔ Run the Install Wizard from the Policy Package level just to make sure everything is installed.
o Check the installation Preview if you are curious, some objects might be synchronized.
➔ First ’ clean the current Policy Package configuration by removing the deny_icmp and the
deny_udp policies from both Policy Packages
108
➔ Run the install Wizard to remove the FW Policies from site1-1 and site1-2.
o You must run the Wizard twice. One for every Policy Package
➔ Now that the policies are clean, edit site1-1 Policy Package to rename it to something more general
and click OK
109
➔ Go to the new Policy Package (Branches) and add site1-2 to the Installation Targets.
o Now both site1-1 and site1-2 will use the same Policy Package
110
➔ Run the install Wizard for the new Policy Package.
o E u f u ’ ,w
policies. So, we need to run the Wizard again to Synch everything.
111
➔ Try to solve the Challenge without using the Hint
Hint:
➔ Browse to Device Manager → Scripts and create two new Scripts, one for the Firewall Objects and
another for the Firewall Policies
o Make sure you select the option to Run the Script on Policy Package or ADOM DB
112
➔ For the FW Policy Script, configure the following
➔ Before running the Scripts, go to Policy & Objects → Firewall Objects → and search for an object
named test123
113
➔ Select the Policy Package you want to run the Script
➔ Once completed, click Close and search for the Firewall Objects again
➔ Now, for the FW Policy we can run the Script like before, or we can do it from the Policy Package
menu.
o Right Click on the Firewall Policy menu in the Branches Policy Package and select Run
Script
114
➔ W u ’ u fu kC
➔ You should see the new Firewall Policy in the Policy Package
➔ We need to Run the Installation Wizard to apply the new Firewall Policy.
o Notice the Policy Package has been modified
115
➔ Run the Wizard
Remember, Policy & Objects uses a different DB than the ones in Device Manager (Device DB), so all
objects must be defined in the Policy & Object DB to be used in Policy Packages, this includes device
Interfaces via the Normalized Interface Dynamic Object.
116
➔ And create a new loopback Interface.
o Name: loopback1
o IP address: 1.1.1.1/32
o Administrative Access: PING
➔ And then right-click site1-H1 from the Table View and Import Configuration to import and create the
policy package.
117
➔ Now Import Configuration for site1-H2 too.
118
➔ L ’ pause for a moment to think about something:
Do you understand why we are running the Install Wizard for both site1-H1 and site1-H2?
• In site1- w ’ y D DB, w ju C f u for
the Policy Package. Running the Wizard is necessary because we just imported the Policy
Package, and the first time we do this it might be necessary to synchronize any Object from the
Policy & Object DB to the remote device. The Wizard will not install anything new from the
Device DB in Device Manager, only Policy & Objects DB.
• In site1-H2 we added a loopback2 interface, so we changed the Device DB and also, we
imported the Policy Package. So, we need to push the new loopback interface along with any
Object from the Policy & Object DB.
➔ Now, browse to Device Manager → Managed FortiGate → select site1-H1 → click on Network:
Interfaces
o Search for the new loopback in the interfaces table.
o Pay attention to the Normalized Interface column.
119
As you can see, the loopback1 interface has already been normalized to an object called loopback1
This is normal and depends on the way we do things in FMG. Some Wizard automatically normalizes
interfaces, but the interface must be already created in the device before the normalization can happen
during the task. For example, during the Import Configuration task to import the Policy Package, you
might notice that there is an option to map the interfaces, and it is enabled by default.
If you did the SD-WAN template challenge you will notice that the SD-WAN Zones are not normalized,
however if you run the Overlay Template Wizard, it will normalize the zones automatically.
➔ L ’ fix the normalization for site1-H2 loopback2. There are different ways to do this, but the
important thing is to understand the concept.
o Go to the menu Policy & Objects → Normalized Interface
o Here you can see all the Dynamic Interface Objects and their mappings
o Search for the object loopback in the search field
As you can see, there is only one dynamic Object with the name loopback1, and it is already mapped to
interface/Zone loopback1
120
➔ Select the loopback1 Object and click Edit
➔ Since this is a dynamic object and the mapping will take different values, we are going to use a
more generic name.
o Change the name from loopback1 to loopback.
o Then Click on Per-Device Mapping → + Create New
121
➔ Now check the mappings for both site1-H1 and site1-H2 from Device Manager → Interface table
Question: W y y y z bu w ’ u y Wz ?
Objects and Dynamic Objects only exist in Policy & Objects DB. FortiManager will translate into CLI the
Object and mappings configuration to the remote device during the Install Wizard. In the previous
exercise we only changed the name of the Object and mapping, and there is no need to send any CLI
command to devices.
122
Ty u Wz yw y, …
➔ Create a new Firewall Policy for site1-H1 or site1-H2 that includes the new loopback interface
as incoming or outgoing interface
o What happened with loopback1 and loopback2
o Does it make sense?
Solving Conflicts
Be careful when creating Objects, because not all of them have Per-Device Mappings, for example the
Security Profiles. This can cause Conflicts when we try to import a working device into FortiManager.
Some conflicts can be fixed during imports; others need configuration changes.
123
config firewall address
edit "test123"
set type fqdn
set fqdn "*.test123.com"
next
end
This FW Address Object is slightly different than the one in FortiManager Policy & Object that we
created earlier. This will create a device mapping during policy import.
➔ Change the default AV profile configuration like disabling Inspected Protocols, and click OK
➔ Since we generally import used policies and object, we are going to create a new Firewall Policy
that uses the test123 object and the default AV Profile
o Go to site2-1 GUI Policy and Objects → Firewall Policy and create the policy using the
screenshots as reference.
124
➔ Go back to FMG → Device Manager → Device & Groups → Managed FortiGates → Select site2-
1 from table view
o Import Configuration (Policy Package) from site2-1
o And check the conflicts (View Conflicts)
➔ FMG Is detecting that the default AV Profile is different between the new site and the one in the
Policy & Object DB. This could be dangerous because the AV Profile Object ’ w -
device mappings and if you “Use Values From FortiGate” it will affect every device using
that profile in FMG.
125
➔ If we select “Use Value from FortiManager” we will impact the new device only.
o Maybe the safest choice is using Value from FortiManager but be careful because ’ not the
default choice.
➔ After resolving the conflict, you select next you will find the following dynamic mapping
➔ Browse to Policy & Objects → Firewall Objects → f “test” and click to Edit the object
o You will see the dynamic mapping in the Per-Device Mapping section
126
Ask yourself: Do we need to run the Install Wizard? Why?
The answer is yes! For two reasons: first we just imported the policy package from site2-1 and we
usually need to run the install wizard to synchronize all FMG Objects to the remote Device. Second, we
just imported the policy package and we chose to ignore the AV profile and use the FortiManagers one
to resolve the conflict. So is necessary to run the Install Wizard to push the AV profile to the remote
Device.
➔ Do it now, run the Install Wizard and check site2-1 AV default Profile to verify it has changed.
Policy Block
Policy Blocks are created to store multiple policies that can be appended to a Policy Package during
Policy creation or edition. This way the administrator can add multiple policies at once.
➔ Show Policy Blocks by going to Policy & Objects → select Tools from the upper menu → Click on
Feature Visibility
127
➔ Browse to Policy Packages → Policy Blocks → and click + Create New
o Type the name: infra_policy_block
➔ Browse inside the Policy Block and create a new Firewall Policy
o For example, block Botnet-C&C.Server, telnet and any other service you want
128
➔ Move to site2-1 Policy Package → Firewall Policy, right click on a firewall entry and select Insert
Policy Block Above
➔ W ’ x?Y u ! u Wz …
o Check the Preview, notice how the Wizard installs the FW Objects used in the FW policies and
also moves the old entries…
129
Using Metadata Variables
Metadata variables are dynamic properties that can be used in various templates, scripts, and objects in
FortiManager. In a metadata variable, you can specify a property value for individual devices, device
groups, or all devices in an ADOMs.
We will assign variables per device and per device groups. So First, make sure you have you devices
organized by region.
➔ O z y u by (fy u ’ y )
130
➔ Click + Create New to create a new Variable
o Variable Name: site_id
o No default Value
o Create Per-Device Mappings for all the lab devices
131
➔ The list of variables will look like this:
➔ Now go to Provisioning Templates and Edit the System Template for Region1
o Find the Host Name field and type the following value: site$(site_region1)-$(site_id)
132
➔ Do the same for the System Template for Region2
o Use Host Name value: site$(site_region2)-$(site_id)
➔ Before running the Install Wizard, check the Device Table View
o Notice the inconsistent hostnames
133
➔ Run the Install Wizard.
o Check the Previews
➔ If you need to adjust a variable mapping, you can right click on any device and select Edit Variable
Mapping from the menu
134
ADOM Revisions
ADOM revision history allows you to maintain a revision of the policy packages, objects, and VPN
console settings in an ADOM.
➔ Browse to Policy & Objects → Select ADOM Revisions from the upper menu
135
➔ You can select the Settings button at the bottom of the page to set the Auto-Delete settings
➔ And Edit the new ADOM to set the Lock from auto deletion.
➔ You can also select a revision to View Revision Diff and Restore it
We are going to enable the new SD-WAN Management Feature. But First, back up your FortiManager,
like we did in the first section.
136
➔ Type a password and click OK
o Save the back up on your local computer.
➔ Now the Left Menu has changed, and we see SD-WAN Manager. However, the sub-menus are
empty
137
➔ We need to select which devices will be managed by SD-WAN Manager
o Go to Table View and Edit site1-1, site1-2 and site2-1 to enable Managed by SD-WAN
Manager
➔ Now go back to SD-WAN Manager → Devices and you will see the sites are now visible from here
too.
138
➔ The SD-WAN Manager → Templates menu shows all related templates except SD-WAN and
System Templates
➔ The SD-WAN Manager → Overlay Orchestration menu shows the Overlay Template Wizard.
139
Questions:
• What happened with the traditional menus?
• In which scenarios would you use the SD-WAN Manager?
• Would you put site1-H1 and site1-H2 in the SD-WAN Manager? Why?
140
06 Global Database ADOM and Central Management (30 min)
Global Objects
➔ Go to Global Database ADOM → Policy and Objects → Firewall Objects → select the Services
Tab
➔ Select + Create New → Service → and complete the information for the QUIC protocol.
o Use Name: gquic
o Protocol: UDP
o Port: 443
141
➔ Go to Global Database ADOM → Policy and Objects → Firewall Header Policy
142
➔ Last, go to Assigment to add the ADOMs to which apply the Header and Footer policies.
o Assign to All Policy Packages
143
➔ Click Finish when complete
➔ To install the Header and Footer Policies, switch to the Normal ADOM and go to Policy & Objects
o Select Policy Packages and you will notice the menus have changed, to include the new
Header and Footer policies in all Packages.
➔ The Device Table View in Device Manager shows all devices have modified policy packages, which
means we have to install all Packages to apply the new Header and Footer policies.
144
➔ Run the Install Wizard from Policy Packages & Device Settings for all packages.
o Check the Install Previews to see what commands are being sent to the remote devices.
145
➔ Login to one of the devices GUI in READ ONLY MODE to check the results.
Questions:
• How would you use Header and Footer policies?
• W ’ ff b w b yB k ?
Central Management
➔ You need to enable Security Fabric to see the Topology in Fabric View.
o We are going to enable Security Fabric in Region2 sites only.
146
➔ Then go to Network Tab and enable Fabric in port10
➔ Run the Install Wizard and check the preview to verify the changes
➔ After this, you will start seeing the Fabric Topology in FortiManager → Fabric View → Physical
Topology and Logical Topology
147
➔ Now we are adding site2-H1 to the Fabric
o Go to Device Manager → Device & Groups → site2-H2 → select CLI Configurations Tab
o Search for csf
➔ If you see an IPAM error during installation, ’ because there is a conflict in the lan pool after
enabling security fabric. Just remove all pools and roles
148
➔ You will have to authorize it from site2-1
➔ You should see both site2-1 and site2-H1 as members of the Fabric
o Go to the Table View in Device & Groups
➔ Finally, the Fabric View → Physical/Logical Topology will show the new added device
149
Fabric View – Security Rating
Nothing to change here, you use this section to review the Security Ratings from all devices
➔ Navigate to Fabric View → Security Rating and explore the Security Controls and Vulnerability
sections for All FortiGate or individual devices
150
07 Diagnostics and Troubleshooting (30 min)
151
➔ Search the site1-1 FortiGate
o C k“ ” bu :D L Y( w w bw
emulation)
152
➔ Wait 15 minutes for FortiGate to reverse the installation changes.
o Note: The FortiManager installation process will fail
o ff …
o After 15 minutes you will see the following message in the Wizard
153
➔ In about 1 minute, you will see the FortiGate connected to FortiManager again and the Config
Status of site1-1 in Modified state.
o From Device Manager, set the correct IP address in port10 and Install the changes.
Rollback-allow-reboot
The default behavior for FortiGate is to apply the set commands, test the FGFM connection and, if the
connection fails, apply the unset commands after 15 minutes.
We can add a second recovery step, to make FortiGate reboot and recover from the previous
configuration revision. For this to work, FortiManager must have the following configuration:
config system dm
set rollback-allow-reboot enable
end
Due to time constraints, we are not doing this lab, just keep in mind that you have this option available
for FortiGate recovery.
154
08 Additional Configurations (20 min)
155
➔ Complete the Install Window (Schedule) and Upgrade Options
➔ Y u ’ y u w, ju x
156
09 SD-WAN Challenge (90 min)
In this section we are going to build a complete and functional SD-WAN network using everything we
learned in this lab.
A few hints will be offered to guide you, but we are not providing a detailed step-by-step process to build
this SD-WAN network. You should be able to do it using what we learned so far.
Network Topology
Objective
Winning conditions
• You must have ping connectivity between site1-1 client and site1-H1 client.
• The SD-WAN strategy should work, tested with the WAN Simulator.
157
Summary:
Notice that each device has two Internet connections (port1 and port2), one MPLS (private) connection
(port4), and connections to the LAN/Client side (port5); however, most of the devices lost their
configuration during the model device registration. So before starting the labs, you must restore the
interfaces IP addresses configurations and routing.
158
➔ Create new Policy Packages for all devices. Remember that IPSEC tunnels do not come up unless
there is a Security Policy applied.
➔ Fix the routing strategy and check client connectivity
➔ Use the wan_simulator to test the SD-WAN strategy
Hints
159
Overlay Template Hint 2:
You must set the IPSEC gateways manually in the IPSEC Template for Branches.
Do you know why?
Policy Hint 3:
Import all policy packages and make sure you normalize/map all interfaces, especially the SD-WAN
Zones.
Fix all conflicts and install all policies after import, to make sure everything is synchronized.
Take your time to make sure everything is synchronized. You can leave each device with its own Policy
160
Package at this time. You can move to common policies later.
Policy Hint 4:
Remember, you must have security policies for the IPSEC tunnels to come up.
You must allow traffic to the loopback interfaces for the SD-WAN Health check and between LAN
interfaces.
161
Routing Hint 5:
Check all devices routing table and fix any missing subnet.
162
Appendix
Configuration Scripts
Site1-1
config system interface
edit "port1"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 1
next
edit "port2"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 2
next
edit "port3"
set vdom "root"
set type physical
set snmp-index 3
next
edit "port4"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 4
set defaultgw disable
next
edit "port5"
set vdom "root"
set ip 10.0.1.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 5
next
edit "port6"
set vdom "root"
set ip 10.0.101.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 6
next
end
Site1-2
config system interface
edit "port1"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 1
next
edit "port2"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 2
next
edit "port3"
set vdom "root"
set type physical
set snmp-index 3
163
next
edit "port4"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 4
set defaultgw disable
next
edit "port5"
set vdom "root"
set ip 10.0.2.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 5
next
edit "port6"
set vdom "root"
set ip 10.0.102.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 6
next
end
Site1-H1
config system interface
edit "port1"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 1
next
edit "port2"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 2
next
edit "port3"
set vdom "root"
set type physical
set snmp-index 3
next
edit "port4"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 4
set defaultgw disable
next
edit "port5"
set vdom "root"
set ip 10.1.0.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 5
next
edit "port6"
set vdom "root"
set ip 10.101.0.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 6
next
edit "port7"
set vdom "root"
set ip 10.12.0.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 7
next
end
164
Site1-H2
config system interface
edit "port1"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 1
next
edit "port2"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 2
next
edit "port3"
set vdom "root"
set type physical
set snmp-index 3
next
edit "port4"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 4
set defaultgw disable
next
edit "port5"
set vdom "root"
set ip 10.2.0.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 5
next
edit "port6"
set vdom "root"
set ip 10.102.0.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 6
next
end
Site2-1
config system interface
edit "port1"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 1
next
edit "port2"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 2
next
edit "port3"
set vdom "root"
set type physical
set snmp-index 3
next
edit "port4"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 4
set defaultgw disable
165
next
edit "port5"
set vdom "root"
set ip 10.4.1.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 5
next
edit "port6"
set vdom "root"
set ip 10.4.101.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 6
next
end
Site2-H1
config system interface
edit "port1"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 1
next
edit "port2"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 2
next
edit "port3"
set vdom "root"
set type physical
set snmp-index 3
next
edit "port4"
set vdom "root"
set mode dhcp
set allowaccess ping
set type physical
set snmp-index 4
set defaultgw disable
next
edit "port5"
set vdom "root"
set ip 10.4.0.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 5
next
edit "port6"
set vdom "root"
set ip 10.104.0.1 255.255.255.0
set allowaccess ping
set type physical
set snmp-index 6
next
end
FortiManager Guides
https://docs.fortinet.com/product/fortimanager/7.6
https://training.fortinet.com/local/staticpage/view.php?page=library_fortimanager-administrator
167