Fortinet Firewall IDS configuration
From Notes_Wiki
Home > Enterprise security devices or applications > Fortigate firewall > Fortinet Firewall IDS configuration
Configuration of IDS on FortiGate Firewall
This guide provides step-by-step instructions for configuring the Intrusion Detection System (IDS) on a FortiGate firewall to enhance network security by monitoring and logging suspicious activities.
Configure the Correct Time Zone
- Setting the correct time zone ensures accurate logging and time synchronization across the network.
- Log in to the FortiGate Web Interface via [1].
- Navigate to System → Settings.
- Locate the Time & Date section.
- Select the correct time zone from the drop-down menu.
- Click Apply to save the changes.
Enable Extended IPS Signature Package
- This step enhances the intrusion prevention system by enabling an extended signature database to detect a wider range of threats.
- Go to Security Profiles → Intrusion Prevention.
- Locate the IPS Database section.
- Enable Use Extended IPS Signature Package.
- Click Apply.
Open Interface Settings
- This step allows configuration changes to be made to network interfaces.
- Navigate to Network → Interfaces.
- Select the interface you want to configure.
Remove Internal 2 from Interface
- Removing an unused or conflicting internal interface ensures proper network segmentation and traffic monitoring.
- In the Interfaces section, locate Internal 2.
- Click Edit and remove it from the assigned interfaces.
- Click Apply.
Configure Interface 2 as a One-Arm Sniffer
- Setting the interface as a one-arm sniffer enables passive traffic monitoring without altering network flow.
- Go to Network → Interfaces.
- Select Interface 2.
- Set the mode to One-Arm Sniffer.
- Enable necessary security features.
- Click Apply.
Enable Logging Options
- Enabling logging allows network traffic and security events to be recorded for analysis.
- Navigate to Log & Report → Log Settings.
- Enable Logging Options for security events and traffic logs.
- Click Apply.
Open the Sniffer Traffic Panel
- This step allows real-time traffic monitoring to detect and analyze network anomalies.
- Go to Network → Packet Capture.
- Click on Sniffer Traffic.
Refresh Sniffer Traffic Data
- Refreshing the traffic capture ensures updated real-time data is displayed.
- In the Packet Capture window, click Refresh to update live traffic logs.
Select Required Columns in Logs
- Selecting the appropriate log columns helps in efficient analysis and troubleshooting.
- In the Packet Capture window, click on Column Settings.
- Select the required columns for better visibility.
Enable Address Logging in Log Settings
- Address logging records the source and destination IPs, providing better visibility into network activity.
- Go to Log & Report → Log Settings.
- Enable Address Logging to capture IP details in logs.
Set ‘All’ for Local Traffic Logging
- Logging all local traffic provides comprehensive monitoring of internal network activity.
- In Log Settings, locate Local Traffic Logging.
- Set logging mode to All.
- Click Apply.
Assign Internal IP 192.168.1.99 to a Device
- Assigning a static IP ensures device accessibility and network stability.
- Navigate to Network → Interfaces.
- Assign 192.168.1.99 to the internal device.
- Click Apply.
Log in to FortiGate Web Interface
- Logging in to the firewall interface allows for configuration changes and monitoring.
- Open a web browser.
- Enter [2](https://192.168.1.99).
- Log in with administrator credentials.
Assign a Free IP to the DMZ
- Assigning an IP to the DMZ isolates public-facing services from internal networks for better security.
- Go to Network → Interfaces.
- Select the DMZ interface.
- Assign a free IP address from the available range.
- Click Apply.
Change DMZ IP to 10.10.10.3/16
- Updating the DMZ subnet improves segmentation and security control.
- In Network → Interfaces, locate DMZ.
- Change the IP address to 10.10.10.3/16.
- Click Apply.
Verify Connectivity by Pinging Syslog Server (10.10.1.51)
- Verifying connectivity ensures logs are correctly transmitted to the Syslog server for analysis.
- Open CLI Console in FortiGate.
- Run the command:
- Ensure the ping is successful.
Assign a Synology Logging IP
- Assigning a dedicated logging IP to Synology ensures proper storage of security logs.
- Go to Log & Report → Log Settings.
- Assign the Synology logging IP to store logs externally.
- Click Apply.
Conclusion
This completes the IDS configuration for the FortiGate firewall. Ensure all settings are correctly applied, and verify logging and traffic monitoring functionalities.
Home > Enterprise security devices or applications > Fortigate firewall > Fortinet Firewall IDS configuration