Lab Guide
Lab Guide
0
Use Case: Fortinet Engineered for Remote and Secure Productivity
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Organizations face different potential emergencies, such as illness, floods, hurricanes, and
power outages. Implementing a business continuity plan is essential to ensuring that the
organization can maintain operations in the face of adversity and prepare for potential
disasters.
An important consideration for organizations developing a business continuity plan is that they
may not sustain normal operations onsite. The ability to support remote employees is essential
to ensure both business continuity and security. Fortinet solutions offer an integrated solution
to support telework. FortiGate next-generation firewalls (NGFWs) have built-in support for
IPsec virtual private networks (VPNs), enabling remote workers to connect securely to the
company network. With endpoint protection, provided by FortiClient, and multi-factor
authentication (MFA) with FortiAuthenticator, organizations can securely support remote work
and maintain business continuity.
Index: 1.0 (a)
Use Case: Fortinet Engineered for Remote and Secure Productivity
Objective Title: Topology
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Agenda
In the following lab exercises you will understand how to easy it is to provide remote
teleworkers with secure access to internal corporate resources by completing the following
objectives:
Topic Time
Lab 1: Introduction, Topology and Agenda 1 Minute
Lab 2: Configure Remote User Authentication 5 Minutes
Lab 3: Configure FortiClient IPsec VPN 5 Minutes
Lab 4: Configure Remote User Protection 10 Minutes
Lab 5: Demonstrate Remote User Secure Productivity 5 Minutes
Lab 6: Zero Trust Network Access 10 Minutes
Lab 7: Demonstrate ZTNA Connection 5 Minutes
Lab 8: Deploy FortiGate Firewall at Home 5 Minutes
Lab 9: Configure FortiGate-to-FortiGate IPsec VPN 10 Minutes
Lab 10: Establish Remote Telephony 5 Minutes
Lab 11: Conclusion
NOTE:
Objective 2(a) and 2(b) are optional. More information is provided in the
objective itself.
If you start with use case #2.0, then make sure to complete all the use cases
from #2.0 to #7.0 first, before moving onto use case #8.0
Index: 2.0
Use Case: Configure Remote User Authentication
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
Remote teleworkers including basic, power and super users require secure access to internal
resources at corporate offices to remain productive when off-site. The first step in any remote
worker scenario is ensure that users can be properly authenticated regardless of location.
Background
FortiAuthenticator’s authentication services ensure only the right person at the right time can
access your sensitive networks and data.
1. Remote LDAP server to import Active Directory user/user groups and provide Windows
AD domain authentication using Kerberos.
2. FortiGate-Edge as a RADIUS client so that FortiAuthenticator can accept RADIUS
authentication requests from a FortiGate unit.
Tasks
CAUTION: If you would like to use the 2FA (Two-Factor Authentication) with
FortiClient and are willing to install Fortinet’s FortiToken Mobile app or add
another token to an existing FortiToken Mobile app on your own iOS or Android
smart phone, then follow the instructions outlined in this objective. Otherwise,
skip these steps and proceed to answer the stop and think question.
1. From the Lab Activity: Teleworker tab, access FortiAuthenticator via HTTPS option
using the following credentials:
6. Click OK.
Note: FortiAuthenicator should import two FortiToken Mobile tokens. These tokens
come free with every install.
3. Click Edit.
Note: Token serial number will differ from the one shown in the screenshot
below
5. Expand User Information and make sure the following email address has been
configured:
CAUTION: If there is an error or failure sending the email, go to the Desktop and launch the
‘rebootmailu’ BAT script to reboot the mail server. Now, in FortiAuthenticator, edit user carol,
disable Token-based authentication, click OK. Again edit user carol, enable Token-based
authentication, choose one of the available free FortiTokens and click OK. You may have to run
the ‘rebootmailu’ script once more if it fails for the first time.
Hint: 1 Points: 3
Hint Text:
Hint
Hint: 2 Points: 3
Hint Text:
Hint
Includes two factor tokens through FortiToken Mobile app which simplifies user input to
“click to accept”
Hint: 3 Points: 3
Hint Text:
Hint
Answer: checkbox
Answer Text:
Answer
Centralized Authentication
Multifactor Authentication
Cloud based Token IDaaS Service
Single Sign-on
Guest Management
Device Onboarding
Answer Key:
✔ 1. via FortiAuthenticator
✔ 2. via FortiGate
✔ 3. via FortiToken Cloud
Index: 2.0 (b)
Use Case: Configure Remote User Authentication
Objective Title: Register FortiToken Mobile
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
FortiToken confirms users' identity by adding a second factor to the authentication process
through physical or mobile application-based tokens.
CAUTION: The following steps are only applicable if you have followed all the
instructions outlined in objective 2.0(a) and are willing to install the Fortinet’s
FortiToken Mobile app or add another token to an existing FortiToken Mobile
app on your iOS or Android smart phone. If you have chosen to skip the
objective 2.0(a), click ‘Continue’ and move on to the next objective.
Tasks
Register FortiToken Mobile
1. From the Lab Activity: Telworker tab, access Carol machine via RDP option using the
following credentials:
3. Check Carol’s inbox and open the email with the subject line FortiToken Mobile
Activation.
4. On your internet enabled smart phone, download and install the FortiToken Mobile
application from iOS App Store or Google Play Store depending on the OS platform that
the mobile device supports.
NOTE: If the FortiToken Mobile application is already installed on your mobile device,
then, skip this step.
NOTE: If you have been using the FortiToken Mobile application previously, then you
will see an existing token code already activated. In this case, you won’t be presented
with the SCAN BARCODE option. In such scenario, click + icon located at the top right
NOTE: If the mobile device is unable to take a picture, check your device settings and
make sure the FortiToken Mobile application has been allowed access to the device
camera.
8. The FortiToken should be activated right away.
Introduction
Virtual Private Network (VPN) technology lets remote users connect to private computer
networks to gain access to their resources in a secure way. For example, an employee traveling
or working at home can use a VPN to securely access the office network through the Internet.
Instead of remotely logging into a private network using an unencrypted and unsecured
Internet connection, using a VPN ensures that unauthorized parties cannot access the office
network and cannot intercept information going between the employee and the office. Another
common use of a VPN is to connect the private networks of multiple offices.
Fortinet offers VPN capabilities in the FortiGate Unified Threat Management (UTM) appliance
and in the FortiClient Endpoint Security suite of applications. You can install a FortiGate unit on
a private network and install FortiClient software on the user’s computer.
For the purposes of this lab, we will be focusing on FortiClient IPsec Tunnels. This use case is
more applicable to a basic user.
Background
You will set up FortiAuthenticator to function as a RADIUS server for FortiGate to authenticate IPsec VPN
users with a FortiToken.
Tasks
Configure RADIUS Server on FortiGate
1. From the Lab Activity: Teleworker tab, access FGT-Edge using the HTTPS option
2. On the FortiGate-Edge, click User & Authentication > RADIUS Servers > Create New and use the
following information:
Name: FAC_Server
Secret: Fortinet1!
1. On FortiGate-Edge, click User & Authentication > User Groups > Create New and use the
following information:
Name: IPsec_VPN_Users
Type: Firewall
3. Click OK.
4. Click OK.
Question: To confirm a user’s identity after authentication, which of the following is checked first?
(Choose one)
----------------------- Answer Section -----------------------
Answer: radio
Answer Text:
Answer
In most cases, the FortiGate unit authenticates users by requesting their username and
password. The FortiGate unit checks local user accounts first. If a match is not found, the
FortiGate unit checks the RADIUS, LDAP, or TACACS+ servers that belong to the user group.
Authentication succeeds when a matching username and password are found. If the user
belongs to multiple groups on a server, those groups will be matched as well.
Answer Key:
✘ 1. Radius
✘ 2. LDAP
✘ 3. TACACS+
✔ 4. FortiGate local user accounts
Index: 3.0 (b)
Use Case: Configure FortiClient IPsec VPN
Objective Title: Configure IPsec VPN (FortiClient as Dialup Client)
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Background
In this objective, you will configure IPsec dial up VPN on FortiGate-Edge (HQ) with FortiClient as
a dial up client.
Tasks
Configure IPsec Dialup VPN
1. From the web browser, access the FGT-Edge web console.
2. Click VPN > IPsec Wizard.
3. Use the following information:
Name: Teleworkers
5. Click Next.
6. Use the following Policy & Routing settings:
Leave Subnet Mask, DNS Server, Enable IPv4 Split Tunnel and Allow Endpoint
Registration settings set to default.
Note: By default, IPv4 Split Tunnel is enabled. In this configuration, remote users
are able to securely access the HQ internal network through the HQ firewall, yet
browse the Internet without going through the head office.
7. Click Next.
8. Use the following Client Options settings:
Answer: radio
Answer Text:
Answer
True
Answer Key:
✔ 1. True
✘ 2. False
Index: 4.0
Use Case: Configure Remote User Protection
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
Endpoints are frequently the target of initial compromise or attacks. One recent study found
that 30% of breaches involved malware being installed on endpoints. FortiClient Fabric Agent
strengthens endpoint security through integrated visibility, control, and proactive defense.
With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint
compliance, mitigate risks, and reduce exposure.
FortiClient Enterprise Management Server (FortiClient EMS) is a security management solution
that enables scalable and centralized management of multiple endpoint devices (computers).
FortiClient EMS meets the needs of small to large enterprises that deploy FortiClient Fabric
Agent on endpoints. Some of the benefits of deploying FortiClient EMS include:
Updating profiles for endpoint users regardless of access location, such as administering
antivirus, web filtering, VPN, and signature updates.
Background
EMS connects to the FortiGate to participate in the Security Fabric. EMS
sends FortiClient endpoint information to the FortiGate. The FortiGate can also receive dynamic
endpoint group lists from EMS and use them to build dynamic firewall policies. EMS sends
group updates to FortiOS, and FortiOS uses the updates to adjust the policies based on those
groups. Its tight integration with the Security Fabric enables policy-based automation to contain
threats and control outbreaks. FortiClient Fabric Agent is compatible with Fabric-Ready
partners to further strengthen enterprises’ security posture.
Tasks
Configure EMS Fabric Connector
1. From the Lab Activity: Teleworker tab, access FGT-EDGE using the HTTPS option.
Username: admin Password: Fortinet1!
Name: EMS
IP/Domain: 192.168.0.125
Background
EMS allows admins to update profiles for endpoint users regardless of access location, such as
administering antivirus, web filtering, VPN, and signature updates.
Tasks
Background
Endpoint policies make it simpler to provision endpoints. You can now create and manage
endpoint policies to assign profiles and Telemetry gateway lists to domains, OUs, and
workgroups. You can also create and manage Chromebook policies to assign profiles to Google
domains.
Tasks
Configure Endpoint Policy
1. Click Endpoint Policy & Components > Manage Policies.
2. Click Add.
Endpoint groups: Click Edit > Checkmark acmecorp.net and All Groups > Save
Note: acmecorp.net domain has been pre-configured and added to FortiClient
EMS under Endpoints > Domains.
Profile: Default
Click Save
Stop and Think
Question: Which of the following subnets (pre-configured) determines if the endpoint is
On-Fabric? (Choose One)
----------------------- Hint 1 Section -----------------------
Hint: 1 Points: 4
Hint Text:
Hint
Answer: radio
Answer Text:
Answer
The endpoint has a status of on-net when the endpoint is inside one of the on-net subnets
defined in the FortiClient EMS under Policy Components > On-net Detection Rules. In this case,
On-Net-HQ-172.16.100.0/24 rule (pre-configured) defines any endpoint outside of
172.16.100.0/24 (HQ’s DC_Network) should be considered off-net.
Answer Key:
✘ 1. 100.64.11.0
✔ 2. 172.16.100.0
✘ 3. 127.0.0.1
✘ 4. 192.168.0.0
✘ 5. 0.0.0.0
Index: 5.0
Use Case: Demonstrate Remote User Secure Productivity
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
While working remotely employees need to utilize corporate resources and safely traverse the
internet from a remote location such as their home, a coffee shop, an airport, or customer
location. In the previous exercises you have addressed the need for a secure and private
connection across the public internet, as well as the ability to verify identity to the organization
when connecting to the network, sensitive applications, or protected data.
In the following exercises you will now demonstrate the power and protection these simple
efforts can bring to your organization and remote users.
Background
Using FortiClient and the FortiToken Mobile application, remote users can quickly and securely
connect to the corporate network.
Tasks
1. From the Lab Activity: Telworker tab, access Carol machine using the RDP option
Username: carol Password: Fortinet1!
2. Open FortiClient console on desktop.
Note: Various security profiles such as antivirus, webfilter etc. are missing or have not
been activated yet.
3. Click Zero Trust Telemetry. Enter Server Address 100.65.0.101 and click Connect
Note: Within a few seconds, FortiClient Fabric Agent would sync with the EMS server via
Telemetry and start receiving configuration updates. This EMS synchronization enables
protection profiles such as Web Filter, Vulnerability Scan etc.
4. Click REMOTE ACCESS
6. Click on the lines icon beside it and click View the selected connection to see the VPN
settings.
Note: If you remember, this VPN configuration has been pushed by the EMS via the
endpoint profile configured earlier.
7. Click Cancel
Login into HQ-VPN
Note: If the username/password prompt hasn’t shown up, navigate to any other section
in FortiClient and then click Remote Access
3. Click Connect
Note: If you have followed the instructions set out in objective 2(a) & 2(b), it means you
have enforced two-factor authentication for user Carol using FortiToken, therefore, a
token prompt should come up asking for a token code. Otherwise, skip to step #6.
4. Open the FortiToken Mobile application on your smart phone to view the six-digit code.
Note: If the token code is not visible, click on the eye icon to view the code. If the timer
is about to expire, wait for a new code because, by the time you enter the token code
into FortiClient, it may have already expired.
5. Enter the six-digit token code in FortiClient and click OK
Note: Make sure to use the newly installed FortiToken code. Due to certain limitations
on the hosted cloud environment, if you do not type the FortiToken code in 2 minutes,
you might loose RDP connectivity to Carol. In such scenario, wait for few minutes to
reconnect back to Carol machine via RDP and then repeat instructions #1-5.
6. The VPN connection should be up, and the client should be receiving an IP in the range
specified (10.10.10.1-10.10.10.10). FortiClient console will be minimized and can be
viewed from the system tray.
Index: 5.0 (b)
Use Case: Demonstrate Remote User Secure Productivity
Objective Title: Secure Access to Corporate Resources
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
Once connected, access to remote folders, files, and other network resources is as seamless as
being in the office.
Tasks
1. Now that the VPN is up and running, on Carol machine desktop, click Run icon, type the
path \\172.16.100.10\Marketing.
Note: 172.16.100.10 is the IP address of a Windows Server sitting in the HQ office. Since
you connect to HQ through VPN, you will have access to HQ resources, for example,
SMB file shares and shared folders, in the same manner as you would have while sitting
in your cubicle locally in HQ itself.
2. Click OK.
Background
Working remotely does not mean that users must sacrifice security. Security policies for remote
vs. local users can be the same or adjusted to account for individual work requirements.
Tasks
7. Click Save.
Note: FortiClient EMS will eventually update Carol’s desktop, and there will be a popup
message on the bottom right of carol’s desktop running FortiClient.
Review Endpoint Details
2. Click user Carol and view Summary to see device information, IP address, location,
policy configuration, FortiClient version, events, and much more.
Note: FortiClient EMS provides visibility across the network to securely share
information and assign security profiles to endpoints.
3. Click Vulnerability Events and you will see a list of Critical, High, Medium and Low level
vulnerabilities detected on that machine.
Note: If you don’t see any vulnerability events listed, then click checkmark box for user
carol and click Scan > Vulnerability Scan to enforce a scan on carol’s machine and come
back again to view after few minutes. For more information on patching vulnerabilities
on the endpoint device, please refer to Fortinet NSE training.
Introduction
Zero Trust Network Access (ZTNA) is an access control method that uses client device
identification, authentication, and Zero Trust tags to provide role-based application access. It
gives administrators the flexibility to manage network access for On-net local users and Off-net
remote users. Access to applications is granted only after device verification, authenticating the
user’s identity, authorizing the user, and then performing context based posture checks using
Zero Trust tags.
ZTNA has two modes: Full ZTNA and IP/MAC filtering:
Full ZTNA allows users to securely access resources through a SSL encrypted access
proxy. This simplifies remote access by eliminating the use of VPNs.
IP/MAC filtering uses ZTNA tags to provide an additional factor for identification to
implement role-based zero trust access, typically for local on-net users. For remote
users, IP/MAC filtering is paired with VPNs.
Background
EMS allows to create Zero Trust tagging rules for Windows, macOS, Linux, iOS, and Android
endpoints based on their OS versions, logged in domains, running processes, and other criteria.
EMS uses the rules to dynamically group endpoints.
Tasks
1. From the Lab Activity: Teleworker tab, access FortiClient EMS using the HTTPS option.
Username: admin Password: Fortinet1!
Background
ZTNA server defines the access proxy VIP and the real servers that clients will connect to. The
access proxy VIP is the FortiGate ZTNA gateway that clients make HTTPS connections to. The
service/server mappings define the virtual host matching rules and the real server mappings of
the HTTPS requests.
Tasks
Enable ZTNA Security Feature
1. From the Lab Activity: Teleworker tab, access FGT-Edge using the HTTPS option
4. Click Apply
Configure ZTNA Server
3. Under Service/server mapping, click Create New and use the following information:
Service: HTTPS
Virtual Host: Any Host
Match path by: Substring
Path: /
4. Under Servers, click Create New and use the following information:
IP: 172.16.100.120
Note: 172.16.100.120 is the real HTTPS web server/FortiManager device sitting
behind FGT-EDGE in the DC network
Port: 443
Status: Active
5. Click OK
6. Click OK
7. Click OK
Index: 6.0 (c)
Use Case: Zero Trust Network Access
Objective Title: Configure ZTNA Rules & Full ZTNA Mode Firewall Policy
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
A ZTNA rule is a proxy policy used to enforce access control. ZTNA tags or tag groups can be
defined to enforce zero trust role based access. Security profiles can be configured to protect
this traffic.
Tasks
Introduction
Zero Trust Network Access (ZTNA) is an access control method that uses client device
identification, authentication, and Zero Trust tags to provide role-based application access. It
gives administrators the flexibility to manage network access for On-net local users and Off-net
remote users. Access to applications is granted only after device verification, authenticating the
user’s identity, authorizing the user, and then performing context based posture checks using
Zero Trust tags.
Background
ZTNA differs from traditional SSL VPN or IPsec VPN teleworking solutions in that it simplifies
remote access while adding additional security checks to authenticate the identity of the device
and the user, and to verify the overall security posture of the endpoint. Remote users only need
to register with the EMS server, then access the web resources directly from its browser.
Tasks
3. The browser will prompt for the client certificate to use. Choose the EMS signed
certificate and click OK
Background
The Malware Protection tab contains options for configuring AV, anti-ransomware, anti-exploit,
cloud-based malware detection, removable media access, exclusions list, and other options.
Tasks
5. Click Save
6. Click Zero Trust Tags > Zero Trust Tag Monitor
Note: Carol’s machine should be tagged with AV_Enabled Tag. If you don’t see the correct
tag information, wait for 1-2 minutes as Alice machine’s FortiClient configuration is sync’d
with the EMS server.
Confirm Malware Protection (Carol)
1. From the web browser, access Carol machine using the web console.
2. Open FortiClient console.
Note: Minimize or close the antivirus scan progress, if running. You should see Malware
Protection enabled now.
Index: 7.0 (c)
Use Case: Demonstrate ZTNA Connectivity
Objective Title: Re-Test ZTNA Connection
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
When On-net and Off-net FortiClient endpoints register to FortiClient EMS, device information,
log on user information, and security posture are all shared over ZTNA telemetry with the EMS
server. Clients also make a certificate signing request to obtain a client certificate from the EMS
that is acting as the ZTNA Certificate Authority (CA).
Based on the client information, EMS applies matching Zero Trust tagging rules to tag the
clients. These tags, and the client certificate information, are synchronized with the FortiGate in
real-time. This allows the FortiGate to verify the client's identity using the client certificate, and
grant access based on the ZTNA tags applied in the ZTNA rule.
Tasks
5. Under General tab, you will find the client certificate ID to whom its issued to.
6. Under Details tab, you will find the Serial number (SN) of the certificate.
Review Endpoint Record on FGT-Edge
1. From the web console, access FGT-EDGE using the browser tab.
2. Click >_ icon located at top right to access the CLI console.
3. Type the following command and press enter
# diagnose endpoint record list
4. View the Client cert SN and FortiClient UID fields matching the endpoint record
information for this device.
Review Endpoint Information on EMS
1. From the web console, access FortiClient EMS using the browser tab.
2. Click Endpoints > All Endpoints
3. Click user entry Carol
4. Under Configuration, view the fields FortiClient ID and ZTNA Serial Number displaying
the matching info as the FortiClient and FortiGate.
Index: 8.0
Use Case: Deploy FortiGate Firewall at Home
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
There are certain requirements at the executive user level such as reduce packet loss for
latency dependent applications, connect remote devices or applications that cannot support
client VPN software, provide secure extension of on-premises layer-2 networking to remote
site, support for multicast applications over VPN, end-to-end layer 3-7 security and visibility,
low TCO & easy to deploy.
The certain advantages of deploying a Desktop FortiGate at an executive’s home includes:
Central management
Background
In this objective, you will set up and configure your FortiGate firewall at your home. At the end
of this objective, you will be able to browse the internet with a computer connected directly to
the FortiGate.
Tasks
Confirm an IP address on Ubuntu Desktop (David) in the same subnet as FortiGate's internal
port2 (internal) interface.
1. From the Lab Activity: Teleworker tab, access Ubuntu (David) using the RDP option.
User: David
Password: Fortinet1!
6. Note the IP address given is the first of the DHCP range (192.168.1.100 –
192.168.1.120). Then click Cancel.
Note: By default, FortiOS assigns IP addresses from the 192.168.1.0/24 network. The
last octet of your address might be slightly different.
Note: You will need to accept the security warning presented by your browser on your
first connection due to the FortiGate using a self-signed SSL certificate.
Username: admin
Password: Fortinet1!
Note: When logging into a factory default out of the box FortiGate for the first
time, the password field will be blank. Due to certain limitations on the hosted
cloud lab environment, the password has been changed on this FortiGate
firewall.
Configuring Internet Connectivity on WAN1
Note: The network interface layout on this FortiGate firewall is a little different from an
actual out of the box FortiGate unit. The mgmt interface has already been
pre-configured and assigned an IP address. This has been done only to preserve the
licensing in the hosted cloud lab environment. But the outlined instructions in this
objective would stay same.
3. Note that this firewall has been giving a static IP address, similar to below.
Note: Out of the box, the Addressing mode would be set to DHCP. However, in our
example, we have configured a static IP address. We will configure dialup VPN to work
regardless of which mode (DHCP or static) the WAN port has.
4. On the right-hand side of this same screen, verify that the port2 status for WAN is
connected.
5. Click OK.
Note: Out of the box, FortiOS allows traffic to flow from the internal interfaces out the
WAN1 interface
5. Enable AntiVirus.
6. Click OK.
Verifying Internet Connectivity
1. On Ubuntu (David), click Fortinet browser bookmark and make sure you have internet
connectivity.
Index: 9.0
Use Case: Configure FortiGate-to-FortiGate IPsec VPN
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
Executive/Super users may require access to critical remote devices or applications that cannot
support client VPN software. At times, they may also need to support multicast applications
over VPN.
The problem can be solved by leveraging client VPN software alternatives. Super/Executive
users can use a FortiGate unit to connect to the private HQ or corporate network instead of
using FortiClient software.
Background
Note: FortiGate-Edge (HQ) has been pre-configured to act as an IPsec VPN dialup server. If you
login into FortiGate-Edge, you will see an Executive_VPN already configured to serve as the
dialup IPsec VPN server.
Tasks
1. From the Lab Activity: Teleworker tab, login into Ubuntu David executive desktop via
RDP option using the following credentials:
2. Open the web browser and login into the local FortiGate by typing https://192.168.1.99
and use the following credentials.
Note: Alternatively, you could go to the Lab Activity: Teleworker tab and access
FGT-BR2 using the HTTPS option.
3. Click VPN > IPsec Wizard and use the following information:
Name: Home-to-HQ
Template Type: Site to Site
NAT configuration: This site is behind NAT
Remote Device Type: FortiGate
3. Click Next.
7. Review settings and click Create and view the summary list of created objects.
Index: 9.0 (b)
Use Case: Configure FortiGate-to-FortiGate IPsec VPN
Objective Title: Establish IPsec VPN Secure Connection
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
In this objective, you will initiate the IPsec VPN connection and access critical Acme Corp
resources over a secure VPN connection.
Tasks
2. Enter ping 172.16.100.10 and make sure you are able to successfully ping the
private IP address of Windows Server (HQ).
Note: The very first ping request may time out as the VPN connection is still down. But
the following pings should be successful. Hit control-c to stop pinging.
5. Locate IPsec dashboard widget and click anywhere on the inside of the IPsec widget to
expand it to full screen.
6. Expand Site to Site-FortiGate section and you should see that Home-to-HQ VPN is up.
Access Critical Assets Over Secure VPN Connection
1. On David’s Ubuntu machine, open the files icon (left bar on Ubuntu desktop). IN the left
column, locate and click the Finance on 172.16.100.10 folder.
Note: Finance folder is a shared folder on the Windows Server (HQ). If you are asked for
a password prompt, enter Fortinet1! and click Unlock
Note: Once you have completed the lab objective, click Test. Wait for a few
seconds and click Continue. The Test button will automatically send a phishing
email to David’s email inbox. You will verify the results in the next lab objective.
Index: 9.0 (c)
Use Case: Configure FortiGate-to-FortiGate IPsec VPN
Objective Title: Verify AntiVirus Protection
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
A hacker impersonates himself as CEO at Acme Corp and tries to trick David (our executive user)
into executing a malicious file.
We can stop this phishing attempt with FortiGate’s antivirus profile that we previously applied
on our firewall rule.
Goal or Tasks
1. On Ubuntu David, open Mozilla Thunderbird email client.
2. Click and open the email containing the subject Q4 Meeting Agenda received from
ceo@acmecrop.net
Note: AcmeCrop is an untrusted domain used by the hacker to send a phishing email to
David.
Note: If you don’t immediately see the above FortiGuard block message, hit refresh on
the browser.
Home FortiGates provide consolidated advanced security and networking capabilities to
protect against cyber-attacks in a compact and affordable solution.
Index: 10.0
Use Case: Establish Remote Telephony
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
FortiFone provides unified voice communications with VoIP connectivity that is secured and
managed via FortiGate NGFWs. The FortiFone soft client interface allows users to make or
receive calls, access voicemail, check call history, and search the organization’s directory right
from a mobile device.
In this exercise you will demonstrate how super users can still access their office extension even
when working remotely.
Background
You will configure the softphone extension on FortiVoice.
Tasks
1. From the Lab Activity: Teleworker tab, access FortiVoice using the HTTPS option.
Note: A softphone extension for Alice (ext. 5000) sitting on Windows 2019 (Domain
Controller) has been pre-configured.
3. Click New and use the following information:
Number: 5500
6. Click OK
Verify Soft Phone Registration Settings
1. On FortiVoice, click Extension > Extension > IP Extension.
2. Select the entry with Display Name David and click Edit.
Background
You will now register FortiFone on the executive user machine to the FortiVoice server and test
the setup by dialing a remote phone extension.
Tasks
Note: Make sure HQ-VPN connection is up. If the VPN is down, establish the VPN
connection again before moving onto the next step.
3. Register the FortiFone as follows:
Server: 172.16.100.135
Note: Since the HQ-VPN connects the branch office to HQ, FortiFone can register
to the FortiVoice server’s local IP address in the DC_Network.
Username: 5500
Note: 5500 is the IP extension configured earlier for user David
Password: 12345
5. Click Login.
3. A warning prompt ‘Microphone not detected' will show up on Alice’s FortiFone. Click OK
Note: This error is expected behavior due to certain limitations in the hosted lab
environment.
4. On the top left corner, click the circle icon to reconnect Alice’s FortiFone to FortiVoice
server. The circle icon should turn to green, which means Alice’s FortiFone is now
successfully registered to FortiVoice server as well.
2. Open FortiFone and type Alice’s extension 5000 using the keypad and click the dial
button.
Note: If you decide to pick up the FortiFone installed on Alice machine, the call will drop
and a warning prompt ‘Microphone not detected' will show up on Alice’s FortiFone. This
error is expected behavior due to certain limitations in the hosted lab environment. The
setup should work seamlessly in a real production environment. The whole purpose of
this exercise is just to demonstrate remote telephony with FortiVoice and FortiFone.
Index: 11.0
Use Case: Conclusion
Objective Title: Review
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Review
After completing this Fast Track module, you should understand how to:
Hands-On Lab
Thank You
Please take a moment to complete our short survey located within web portal tab above.