728x90
728x90

'업무이야기 > Security' 카테고리의 다른 글

Juniper SRX(방화벽) 패스워드 초기화  (5) 2024.10.24
DeepFinder (웹방화벽)  (6) 2024.10.23
FortiGate SIP Debug  (1) 2023.05.02
SRX IPSec Tunnel Sample  (0) 2023.05.02
AhnLab Network Solutions  (0) 2022.11.21
728x90

# Windows Server 2016의 AD를 사용

# FortiGate 200D v6.0.14build0457(GA) 사용

# Security Fabric/Fabric Connectors

# 사용자 또는 그룹을 선택

# User & Device\User Group 추가

# FortiGate Policy

# Client OS에서 도메인을 통한 로그인 설정

# FortiGate에서 도메인을 통한 로그인 확인

# 정책 테스트

728x90

'업무이야기 > Security' 카테고리의 다른 글

SRX IPSec Tunnel Sample  (0) 2023.05.02
AhnLab Network Solutions  (0) 2022.11.21
Juniper SRX Cluster configuration  (2) 2021.08.26
Juniper SRX Policy-Based IPSec VPN  (0) 2021.08.26
Juniper SRX Routed-Based IPSec VPN  (0) 2021.08.26
728x90

FortiSandbox Shell mode

Then in cli, run 'fnsysctl shell', login with 'fsa_support/Support@FSA1’

cd /drive0/public/clean/20170623/04/2841/3404914715784600920

sandbox-jobs-move -e3404914715784600920.meta

strings 3404914715784600920.meta

tar -czvf kbbank.gz *

cp kbbank.gz /web/static/

https://FSA_IP/static/파일명

reset-bulidno

Please provide me more information as below ;

  1. Go to FortiView > File Scan Search and click button of customize. You can see menu of "Job View Setting". Then please enable Column Headers for "Job ID".
  2. Please export two type files for FSA as below ;

2-1. CLI of "sandbox-jobs-move -p -j[JOB ID]". It is example as below ;

Step1> # sandbox-jobs-move -p -j3429900306737006651
/Storage/clean/20170710/00/2754/3429900306737006651

Step2> #tar -czvf j3429900306737006651.gz /Storage/clean/20170710/00/2754/3429900306737006651
Step3> #cp j3429900306737006651.gz /web/static/
Step4> On web browser, https://FSA_IP/static/j3429900306737006651.gz

2-2. CLI of " cp /ramdisk/FortiSandboxGUI.db /web/static/"

Step1> On web browser, https://FSA_IP/static/FortiSandboxGUI.db

So, please export 6 job ID files and 1 fortisandboxGUI.db file and attach these files in this case.

 

728x90
728x90

[FortiSandbox Clustering Setting]

Step 1 - Configure the master

  1. Configure the port IP addresses and gateway address with the following commands:
    set port1-ip 192.168.1.99/24
    set port2-ip 192.168.2.99/24
    set port3-ip 192.168.3.99/24
    set default-gw 192.168.1.1
  2. Configure the device as the master node and its cluster fail-over IP for Port1 with the following commands:
    hc-settings -sc -tM -nMasterA -cTestHCsystem -ppassw0rd -iport2
    hc-settings -si -iport1 -a192.168.1.98/24
    See Appendix A - CLI Reference on page 1 for more information about the CLI commands.
  3. Review the cluster status with the following command:
    hc-status -l
    Other ports on the device can be used for file inputs.

Step 2 - Configure the primary slave

  1. Configure the port IP addresses and gateway address with the following commands:
    set port1-ip 192.168.1.100/24
    set port2-ip 192.168.2.100/24
    set port3-ip 192.168.3.100/24
    set default-gw 192.168.1.1
  2. Configure the device as the primary slave node with the following commands:
    hc-settings -s -tP -nPslaveB -iport2
    hc-settings -l
    hc-slave -a -s192.168.2.99 -ppassw0rd
  3. Review the cluster status with the following command:
    hc-status -l

Step 3 - Configure the normal slave

  1. Configure the port IP addresses and gateway address with the following commands:
    set port1-ip 192.168.1.101/24
    set port2-ip 192.168.2.101/24
    set port3-ip 192.168.3.101/24
    set default-gw 192.168.1.1
  2. Configure the device as a slave node with the following commands:
    hc-settings -s -tR -nSlaveC -iport2
    hc-settings -l
    hc-slave -a -s192.168.2.99 -ppassw0rd
  3. Review the cluster status with the following command:
    hc-status -l

 

728x90
728x90

Fortinet euc-kr 한글 지원 설정

CLI>
config system appearance
set fallback-charset EUC-KR
end

Spam Score 96 설정

CLI>
config antispam deepheader-analysis
set confiddence 96.000000
set greyscale-level 7
end

 

 

728x90

'업무이야기 > Security' 카테고리의 다른 글

FortiSandbox Clustering Setting  (0) 2017.08.08
FortiSandbox Custom VM  (0) 2017.08.08
Fortigate Port Restricted  (0) 2015.12.28
Spam test  (0) 2015.12.28
Fortigate SIP ALG / Fortinet SIP ALG  (0) 2015.12.28
728x90

Resetting a lost Fortigate Admin Password

 
If you have lost the admin password for a Fortigate you can reset it if you have physical access to the box.
  • Connect the console cable to the Fortigate and fire up your favorite terminal emulator
  • Reboot the firewall unit.
  • At the console login prompt, type in "maintainer" as the userid.
  • Type in bcpbFGTxxxxxxxxxxxxx as the password. xxxxxxxxxxxxxwill be the S/N of the Fortigate. The serial number is case sensitive so for example you should use FGT60B, not FGT60b.
  • After logging in, change the admin password:
config system admin
edit admin
set password 
next
end

Heads up: You have to type the userid and password within a few seconds of the login prompt first appearing. If you take too much time you should reboot the firewall again.

 

 

 

728x90
728x90

 

 

 

 

728x90
728x90

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

728x90

+ Recent posts