1,113 163 39MB
English Pages [317]
DO NOT REPRINT © FORTINET
FortiADC Study Guide for FortiADC 6.2
DO NOT REPRINT © FORTINET Fortinet Training https://training.fortinet.com Fortinet Document Library https://docs.fortinet.com Fortinet Knowledge Base https://kb.fortinet.com Fortinet Fuse User Community https://fusecommunity.fortinet.com/home Fortinet Forums https://forum.fortinet.com Fortinet Support https://support.fortinet.com FortiGuard Labs https://www.fortiguard.com Fortinet Network Security Expert Program (NSE) https://training.fortinet.com/local/staticpage/view.php?page=certifications Fortinet | Pearson VUE https://home.pearsonvue.com/fortinet Feedback Email: [email protected]
12/22/2021
DO NOT REPRINT © FORTINET
TABLE OF CONTENTS 01 Introduction and Initial Configuration 02 Virtual Servers and Load Balancing 03 Advanced Server Load Balancing 04 Link Load Balancing and Advanced Networking 05 Global Load Balancing 06 Security 07 Advanced Configurations 08 Monitoring, Troubleshooting, and System Maintenance
4 32 81 118 156 193 250 288
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
In this lesson, you will learn about application delivery networks, features and benefits of FortiADC, and how to configure initial system settings.
FortiADC 6.2 Study Guide
4
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
5
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in understanding the basics of application delivery, the benefits offered by FortiADC, and accessing the FortiADC using the CLI and GUI, you will be able to implement FortiADC and its features in your network.
FortiADC 6.2 Study Guide
6
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
An application delivery network (ADN) is a network infrastructure designed specifically to provide application and web services availability, security, and acceleration to users. Today’s business services, such as global ecommerce and multimedia streaming, are evolving rapidly, causing rigorous demands on ADN availability, performance, and cybersecurity protection. To support this ever-growing digital transformation trend, the ADN in modern data center and cloud environments typically comprises high-end routing and switching equipment, WAN acceleration appliances, next generation firewalls, application delivery controllers (ADCs), storage area networks (SANs), and servers. The example on this slide illustrates an enterprise ADN design using various Fortinet products. At the center of the ADN are the FortiGate and FortiADC devices. FortiGate is the foundation of the Security Fabric that integrates FortiADC and other fabric-ready network devices into a unified security landscape. This greatly streamlines the security management, creating a single-pane-of-glass management structure. A pair of FortiADC devices, the application delivery controller, form a high availability cluster for Layer 4 and advanced Layer 7 server load balancing. FortiADC supports global server load balancing across multiple data centers or cloud environments, and distributes user traffic to the application servers based on data MIME types, session persistence, server health, DNS round robin, or geographical proximity. Besides server load balancing, FortiADC can offload HTTPS SSL decryption and encryption from the application servers to improve server performance. The HTTP compression, QoS, and TCP multiplexing features on FortiADC reduce network bandwidth usage. The SSL offloading and application layer processing are essential for application acceleration.
FortiADC 6.2 Study Guide
7
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
An ADN is composed of a suite of network equipment working seamlessly together to maximize the application performance and security protection. Conducting a detailed ADN requirement analysis before deploying firewalls and ADCs is key to building an adaptive and resilient ADN. The primary function of the application security network is to provide efficient and secure application delivery with the ability to scale, as needed, for any size organization. You can achieve reliability and scalability by managing traffic more efficiently using load balancers. Load balancers also provide health check and redundancy, and can automatically reroute traffic, when needed. You can improve performance by using compression technologies, offloading encryption, and providing content routing. You can enhance security with IP filtering, delayed binding, application firewalls, and SSL encryption. FortiADC offers the features you need to achieve each of these goals.
FortiADC 6.2 Study Guide
8
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
What is an ADC? Traditional load balancers work mostly at Layer 4, balancing TCP/UDP sessions, with very limited Layer 7 support. They usually have very basic health check mechanisms and algorithms to distribute traffic between servers. Some of them have session persistence, but only by source IP address. Today, web servers don’t just deliver static content. They deliver dynamic, content-rich applications. Simple load balancing is no longer sufficient to meet the basic needs of most organizations. An ADC improves what a traditional load balancer does, so you have more control and can make better decisions about what happens at Layer 7. FortiADC is an advanced ADC that optimizes application performance and availability, while securing the application both with its own native security tools, and by integrating application delivery in to the Fortigatecentric security fabric and FortiGuard Cloud Services. FortiADC supports global server load balancing (GSLB), which allows you to load balance traffic among servers at geographically distant locations. FortiADC includes application acceleration, WAF, intrusion prevention system (IPS), SSL offloading, link load balancing, and user authentication in one solution. You can deploy FortiADC as a physical or virtual machine (VM), or as a cloud solution.
FortiADC 6.2 Study Guide
9
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
FortiADC provides enterprise-class application delivery and additional features that make applications reliable, responsive, and easy to manage. First and foremost, FortiADC is a server load balancer that allows applications to scale reliably across multiple servers in a data center. Persistence ensures user connections are routed back to the correct server for seamless and transparent continuity of applications. SSL offloading relieves servers and firewalls from the CPU-intensive tasks of decryption and encryption of secure application traffic. HTTP compression and content caching speed the delivery of content to users and reduce bandwidth needs. Quality of service (QoS) can be used to prioritize traffic by type, to minimize disruptions to applications that are sensitive to latency. Contentbased routing sends traffic to specific servers, based on URL or business rules by traffic type. Global server load balancing provides disaster recovery by spanning applications across multiple data centers or cloud. Link load balancing provides ISP redundancy and increases application bandwidth. Advanced WAF detects zero-day attacks and protects from OWASP top-10 threats. IPS detects and blocks network attacks with signature-based defense.
FortiADC 6.2 Study Guide
10
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
11
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
Good job! You now understand application delivery networks and have an overview of some of the features and benefits of the FortiADC.
FortiADC 6.2 Study Guide
12
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in understanding deployment options, initial network and system configurations, and the management of administrator accounts, you will be able perform an initial FortiADC deployment.
FortiADC 6.2 Study Guide
13
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
There are many deployment options for FortiADC, ranging from a standalone FortiADC that directly connects to the internet, all the way to the globally distributed FortiADC devices in complex enterprise and cloud data center environments. Before deploying FortiADC to a network, the designer should evaluate the requirements, including the servers and type of applications, and the network requirements. The following are important design considerations: • • • •
Network design Performance Security High availability (HA)
Before you deploy FortiADC, conducting a detailed design analysis of your server load balancing objectives and performance requirements, including the network, security, servers, and applications, ensures a robust and scalable network design.
FortiADC 6.2 Study Guide
14
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
There are many deployment options, ranging from a standalone FortiADC that performs basic Layer 4 and Layer 7 load balancing, to globally distributed FortiADC devices in complex enterprise and multi-tenant cloud data center environments. FortiADC is typically deployed behind the firewall and in front of the application servers in an ADC network. The topology shown on this slide illustrates a basic server load balancing setup in a single network path. This is the most standard load balancing deployment mode. It is also called router mode. In this mode, FortiADC is the default gateway of the servers, so all client traffic is sent through FortiADC. Clients send HTTP requests to the FortiADC virtual server IP address or fully qualified domain name (FQDN), which functions as a reverse proxy. And FortiADC load balances the traffic between the Web Servers. The FortiADC network interfaces are connected to a FortiGate, which is the firewall and default gateway for the FortiADC, a subnet for management; a subnet for real servers A, B, and C; and another subnet for real servers D, E, and F. Real servers are hosted in the different subnets for redundancy, or to segregate different application resources. The FortiADC system performs health checks on the real servers, and distributes traffic to the application servers based on the user-configured load balancing algorithms and settings. FortiADC supports additional features, including SSL encryption/decryption, WAF protection, Gzip compression, and NAT routing processes, to enhance application security and performance. This deployment model improves server performance, provides application availability and scalability, and protects servers from the security breaches.
FortiADC 6.2 Study Guide
15
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
The example on this slide illustrates a service provider ADN for a multi-tenant environment. The ADN supports local and global load balancing across multiple data centers. The use case for this model is to build a cost-effective, high-availability, fully-redundant, and secure ADN infrastructure. The key components in each data center are a pair of FortiGate and FortiADC devices running in their HA cluster. FortiGate and FortiADC connection is a mesh topology. HA clusters provide software redundancy and the mesh topology ensures uninterrupted connectivity upon link layer failure. FortiGate protects the data center against sophisticated cyber threats. FortiGate devices have dual-homed connections to the ISP through static routes. In each FortiADC pair, VDOMs are configured for each tenant. A VDOM, analogous to a virtual machine, is a complete FortiADC instance running on the FortiADC device. Each VDOM runs separately and provides complete ADC services for each tenant, thus achieving cost-effective multi-tenant hosting. FortiADC supports DNS-based global server load balancing. The FortiADC in the primary data center is the authoritative DNS server for all virtual servers in the global server load balancer (GSLB) framework. Remote users connect to virtual servers through a DNS query, and FortiADC distributes the traffic to the nearest data center or to the application servers, based on the user-configured load balancing algorithms and settings. Optionally, service providers can leverage the AI-powered FortiSandbox Cloud service to safeguard the network from malware, ransomware, and evolving zero-day attacks.
FortiADC 6.2 Study Guide
16
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
FortiADC-VM is a virtual appliance version of FortiADC. The hypervisor environments that FortiADC-VM supports include VMware ESX/ESXi, Citrix XenServer, Open Source Xen, Microsoft Hyper-V, and KVM. FortiADC-VM also supports AWS, Azure, Google Cloud, and Oracle Cloud deployments. The VM instance has the same Layer 4 and Layer 7 local and global server load balancing, VDOM, HA, and security features as the hardware appliance, except for the ASIC hardware SSL offloading acceleration. The actual performance of FortiADC-VM depends on the host machine hardware. The best practice is to install FortiADC-VM on a bare metal hypervisor to fully utilize the hypervisor and hardware computing resources. FortiADC-VM is suitable for small, medium, and large enterprises deployment. The network diagram on the slide shows FortiADC-VM deployed in VMware, Hyper-V, and KVM hypervisors together with the application server virtual machines in two sites. FortiADC-VM connects to FortiGate and application servers through virtual switches. Clients access application servers through FortiADC virtual servers, and client connections are distributed to the application servers according to user-configured load balancing algorithms and settings. FortiADC-VM requires periodic license validation with FortiGuard services. If the license is not validated for 24 hours, access to FortiADC-VM web UI and CLI are locked.
FortiADC 6.2 Study Guide
17
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
Like many Fortinet devices, FortiADC offers two user interfaces: a GUI and a CLI. You can access the CLI using SSH, Telnet, or the console port, which is usually located on the front panel of FortiADC. You will need to configure a password for the admin user during the initial login. You can also use the console widget located in the upper-right corner of the FortiADC GUI.
FortiADC 6.2 Study Guide
18
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
To access the GUI, use a browser and HTTP or HTTPS. By default, port1 of FortiADC has the IP address of 192.168.1.99. A default administrator user is configured on FortiADC. You cannot delete the default administrator user account. Keep in mind that if the initial login was performed using CLI, the admin user will need to use the password set at that time. Remember to change the default password as soon as possible after deploying the FortiADC.
FortiADC 6.2 Study Guide
19
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
When you log in to the FortiADC GUI for the first time, the GUI will display the System Getting Started Wizard. This wizard will guide you through the basic setup of your FortiADC, including: • • • • • •
Date, time, and NTP server HA management Gateway Interfaces Virtual servers Real servers
FortiADC 6.2 Study Guide
20
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
This slide shows a screen shot of the FortiADC dashboard, which contains multiple widgets and tabs. You can customize the dashboard using the Edit button, or add additional dashboards from the menu on the left side of the window, using the Create Dashboard button. The System Information widgets and header bar display the host name, system time and uptime, serial number and firmware version, as well as shutdown, reboot, and factory reset commands. The License widget displays license status and provides a link to more detailed support information, such as service contract expiry dates. The Log Event widget displays recent activity. The Resource Usage widget allows an administrator to monitor CPU, RAM, and disk usage, as well as system metrics. To launch the console widget, in the upper-right corner of the header bar, click the console icon.
FortiADC 6.2 Study Guide
21
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
One of the first settings you must configure for any FortiADC is the network interface configuration. You can assign an IP address to each FortiADC interface, and specify the permitted administrative access protocols for each interface. To create a VLAN interface, click Create New.
FortiADC 6.2 Study Guide
22
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
Any FortiADC must have at least one default gateway and one default static route. On the Routing screen, which is shown on this slide, you can add the default route and gateway, as well as create static routes to the subnets in your network.
FortiADC 6.2 Study Guide
23
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
On the Settings view, you can configure a primary and a secondary DNS server. FortiADC uses the primary DNS server until the primary DNS server fails to respond. Then, FortiADC switches to the secondary DNS server. You can configure other top-level FortiADC settings from this view, including: • Hostname • Interface language • Idle timeout • TCP ports used for administrative access, which you can change from their default settings • Primary DNS and secondary DNS • Virtual domain
FortiADC 6.2 Study Guide
24
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
If you don’t have access to the GUI, you can use the CLI to configure a network interface. The command shown on this slide allows you to access interface configuration subcommands. Using the edit subcommand and substituting the interface name, such as port1, as an argument allows you to configure various interface options for that interface. You can then use the set subcommand to configure individual parameters available for the network interface. In the example shown on this slide, the set ip address subcommand and object specify which IP address and subnet mask to use. You can also use the set allowaccess subcommand to specify which administrative access protocols to permit over that interface.
FortiADC 6.2 Study Guide
25
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
Using FortiADC, you can aggregate multiple physical interfaces into a single logical interface known as a link aggregation. Link aggregations are used most often to combine the bandwidth of two interfaces to increase throughput or to add redundancy to a network connection. You can configure link aggregations using only the CLI, not the GUI. This slide shows the commands you use to configure an aggregated link. After you configure the link aggregation, you can assign a single IP address to it. Link aggregation technology is based on the Link Aggregation Control Protocol (LACP), which is part of the IEEE 802.3ad specification, and is commonly referred to as port trunking, bonding, or teaming.
FortiADC 6.2 Study Guide
26
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
Each administrator account is assigned an access profile in which you specify the level of access the administrator has for commands and configuration sections. For example, you could create a special administrator access profile to delegate security permissions, allowing personnel to manage the device’s security settings, while also denying them the right to modify router, server load balancing, link load balancing, and global load balancing features, which the organization could be using to provide a chargeable service to their clients.
FortiADC 6.2 Study Guide
27
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
This slide shows the screen you use to create an administrator account. You can set up an administrator account to allow the administrator to access FortiADC only from a specific trusted host subnet. In an administrator account, you can set permissions to allow or disallow the administrator to change global system settings. You can associate a specific administrator access profile with the administrator account. If VDOMs are enabled on FortiADC, you can assign VDOMs to an administrator account, limiting the their administrative capabilities to just the selected VDOMs.
FortiADC 6.2 Study Guide
28
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
29
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
30
Introduction and Initial Configuration
DO NOT REPRINT © FORTINET
This slide shows the objectives you covered in this lesson. By mastering the basics of FortiADC, you can identify how FortiADC would benefit your network, and deploy a FortiADC in your network.
FortiADC 6.2 Study Guide
31
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
In this lesson, you will learn about virtual servers, their components, and the basic settings necessary to configure FortiADC to load balance.
FortiADC 6.2 Study Guide
32
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
33
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in understanding virtual servers and application delivery control, you will be better able to design a FortiADC deployment.
FortiADC 6.2 Study Guide
34
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Virtual servers are positioned between connecting clients and pools of real servers to perform application delivery control (ADC). The clients are likely not aware the virtual server is not the actual server they receive content from. This architecture allows the incoming traffic to be evaluated and processed for security control, performance, and load balancing. Server pools are assigned to virtual servers, and each server pool contains one or more real servers. Three types of virtual servers can be configured on the FortiADC for application delivery control, depending on the desired capabilities. The three types are: Layer 7, Layer 4 and Layer 2.
FortiADC 6.2 Study Guide
35
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
With Layer 7 virtual servers, application traffic decisions are made more intelligently. However, more packets are required for the decisions to be made, so making the decisions takes more time than it does on Layer 4 virtual servers. HTTP content can be inspected and modified, and load balancing decisions can be made based on content. IPv4 and IPv6 are supported on Layer 7 virtual servers.
FortiADC 6.2 Study Guide
36
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
When you use Layer 4 virtual servers, traffic is processed using the first packet of any new session. This method is the fastest option, and it supports IPv4 and IPv6. Destination NAT (DNAT) is the default method used for packet forwarding with Layer 4 virtual servers, and it should be noted that if the FortiADC is not the default gateway for the real servers, asymmetric routing issues can occur.
FortiADC 6.2 Study Guide
37
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
When you use Layer 2 ADC, traffic is balanced among multiple next hop gateways. Like Layer 7 ADC, Layer 2 also supports the inspection and modification of HTTP content. However, only IPv4 is supported with Layer 2 virtual servers. Layer 2 can be used to balance traffic among multiple gateways or links when the real server IP addresses are not known.
FortiADC 6.2 Study Guide
38
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
When you use Layer 4 ADC, FortiADC simply forwards traffic to the real server, which is why it is the fastest of the three methods. When you use Layer 2 and Layer 7 ADC, FortiADC proxies the TCP traffic to the real server. This means that the three-way handshake happens first between the client and FortiADC. Once the TCP session is up, FortiADC establishes a new TCP session with the server by performing another three-way handshake. This means that a FortiADC using Layer 2 and Layer 7 ADC splits the TCP session into two parts: one between the client and the FortiADC device, and one between the FortiADC device and the server.
FortiADC 6.2 Study Guide
39
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
When you configure virtual servers on FortiADC, you configure many objects: some are mandatory and some are optional. The mandatory objects are the real servers, server pool, application profile, and load balancing method. This slide shows a summary of the objects that you can create in a FortiADC configuration. It also shows which objects are mandatory, or are the minimum required for configuration of FortiADC. In this lesson, you will learn how each of the mandatory objects is created, as well as a server health check, one of the most common optional objects used.
FortiADC 6.2 Study Guide
40
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
There are two options for virtual server configuration in FortiADC: basic mode and advanced mode. Basic mode is intended for less experienced FortiADC users. You only need to specify the basic settings needed to configure a virtual server. More advanced parameters are automatically set using default values. Advanced mode is intended for experienced users. In this mode, advanced options and settings are available for configuration.
FortiADC 6.2 Study Guide
41
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
42
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Good job! You now understand the concepts of virtual servers and application delivery control. Now, you will learn about health checks, real servers and server pools.
FortiADC 6.2 Study Guide
43
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in understanding real server health checks, server pools, and real servers, you will be able to deploy virtual servers with the appropriate capabilities.
FortiADC 6.2 Study Guide
44
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Real server health checks are one of the most commonly used optional components of a virtual server. Servers are polled frequently to determine the server state as defined in the health check. The server is considered down or unresponsive to the polls within the timeout period. The server is considered up when it responds to a user-specified number of consecutive polls.
FortiADC 6.2 Study Guide
45
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
There are many different methods that you can use to perform a health check with FortiADC. The most basic method is to send an ICMP or TCP echo request. Using this method, the FortiADC sends an ICMP or TCP echo request to the server, and waits for a reply. The sending of a GET or HEAD request can be used to validate HTTP or HTTPS servers. The response content from the server can be evaluated, allowing for a more granular determination of health. The completion of a three-way TCP handshake to a specific port can be used to validate that the server supports TCP. If the server is a domain name system (DNS) server, FortiADC can send a DNS A record request to the server and wait for a specific IP address as a response to confirm that DNS is running correctly. If the server is a RADIUS, SMTP, POP3, or IMAP4 server, you can configure FortiADC to log in to the server to confirm that the service is running.
FortiADC 6.2 Study Guide
46
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
If the server is an FTP server, you can configure FortiADC to log in to the FTP server to check that a specific file is there. FortiADC can use SNMP to poll the server using the SNMP protocol to get the current CPU, memory, and disk usage. The server is assumed to be unresponsive if it doesn’t reply, or if any of those usage values goes above a preconfigured threshold. FortiADC can also perform a TCP half open check. FortiADC sends the sync and waits for the sync acknowledge. As soon as the sync acknowledge is received, FortiADC sends a reset to close the session. For protocols based on SSL over TCP, FortiADC can establish an SSL connection to check if the service is up. The result of the SSL connection will verify the status of the server.
FortiADC 6.2 Study Guide
47
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
The physical servers that exist in the application delivery network are represented by objects called real servers in the FortiADC.
FortiADC 6.2 Study Guide
48
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Server pools are groups of real servers. A FortiADC virtual server will use these server pools for load balancing and can monitor the state of the member servers using health checks.
FortiADC 6.2 Study Guide
49
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
When adding real servers to a server pool, they can be selected from a list of existing real servers, or they can be created and added directly from within the server pool configuration. Real servers that have been added as members to a server pool can be further configured with settings for things like connection limits, warm up times, rates, and so on.
FortiADC 6.2 Study Guide
50
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
For each server, you can configure a maximum number of concurrent connections. That maximum rate is used under normal operating conditions. You can also configure a lower rate than FortiADC uses while the server is rebooting or is finished rebooting, but isn’t ready to operate at full capacity. This is called the warm rate. When you configure a Warm Rate setting, FortiADC uses it during a warm-up period, specified in the Warm Up setting, when the server is back online after a health check, or when the status of the server is set to Enabled, from Maintain, or Disabled.
FortiADC 6.2 Study Guide
51
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
52
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Good job! You now understand health checks, real servers, and server pools. Now, you will learn about application profiles.
FortiADC 6.2 Study Guide
53
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objective shown on this slide. By demonstrating competence in configuring and using application profiles, you will be able to effectively utilize them as part of a virtual servers configuration.
FortiADC 6.2 Study Guide
54
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Application profiles specify the protocol of the traffic to be load balanced. There are many different profile types, and not all of them are supported by the three different virtual server types. This table shows some of the profiles, and which ones are supported by each type of virtual server. FortiADC supports nearly 20 predefined profiles, as well as the ability to create custom profiles.
FortiADC 6.2 Study Guide
55
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
TCP, UDP, and FTP profiles require the configuration of session timeout and the TCP session timeout after FIN. The Timeout TCP Session setting specifies how long a TCP session without traffic remains in memory. The TCP session time out after FIN setting specifies how long a session remains in memory after a FIN packet has been sent, and while no FIN acknowledge packets have been received.
FortiADC 6.2 Study Guide
56
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
The images on this slide show the HTTP profile. If the Client Address setting is enabled, FortiADC uses the client IP address to set up the connection to the back-end server, so it will not change the source IP address of the packets. If the client traffic contains the X-Forwarded-For field, FortiADC gets the client IP address from there. If the setting is disabled, FortiADC uses its own IP address to connect to the back-end server so it will be doing source NAT.
FortiADC 6.2 Study Guide
57
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
The HTTPS profile is the same as the HTTP profile, allowing for configurations including IP reputation, compression, caching, Geo IP options and so on. However, when a virtual server is assigned an HTTPS profile, a resources option is displayed for selection of a client SSL profile. Within the client SSL profile, you specify the digital certificate that is presented to clients that want to connect to the server.
FortiADC 6.2 Study Guide
58
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
The X-Forwarded-For Header field is the standard that identifies the original client IP address. It’s appended by some devices that change the source IP address such as web proxies, or load balancers, or devices doing source NAT. FortiADC can add this field or can use it to make decisions related to load balancing.
FortiADC 6.2 Study Guide
59
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
HTTP turbo is similar to the HTTP profile except that it doesn’t support advanced ADC features, such as caching, compression, content rewriting, rate limiting, Geo IP blocking, or source NAT (SNAT). You can use it with content routing and DNAT, as long as the HTTP request is contained in the first data packet. It enables packet-based forwarding, which reduces network latency and system CPU usage. However, HTTP turbo is not recommended if you anticipate dropped or out-of-order packets.
FortiADC 6.2 Study Guide
60
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
61
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Good job! You now understand the concepts of virtual server application delivery control. Now, you will learn about basic load balancing and FortiView analytics.
FortiADC 6.2 Study Guide
62
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in describing the different load balancing configuration objects and methods, you will be able to apply them to FortiADC to balance the traffic load in your network.
FortiADC 6.2 Study Guide
63
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
There is a predefined list of load balancing configurations, including options for all methods. Additional configurations can be created; however, the created configurations will work the same as the pre-existing ones, but with user-specified names. This may be desirable to leverage a specific naming convention. This table shows which methods are supported by each type of virtual server. The dynamic load method relies on the use of an SNMP health check. The check evaluates the CPU, memory, and disk usage of a server, and compares the results to defined thresholds.
FortiADC 6.2 Study Guide
64
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
A list of load balancing methods is shown on this slide, and these methods work as follows: • Round robin: The traffic load is balanced by rotating through the servers in sequence. For example, server 1, then server 2, then server 3, and so on. • Least connections: Selects the server with the fewest connections. • Fastest response: Selects the server with the fastest response to health check tests. • Destination IP hash: Selects the next hop based on a hash of the destination IP address. This method is only available when you are using a Layer 2 virtual server. • Dynamic load: Selects the server based on SNMP health check results. Weight is assigned based on CPU, memory, and disk usage.
FortiADC 6.2 Study Guide
65
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
This slide shows a list of the Layer 4 packet forwarding methods. Multiple methods for packet forwarding are available for Layer 4 virtual servers. These methods are: • Direct routing • DNAT • Full NAT • Tunneling • NAT46 • NAT64
FortiADC 6.2 Study Guide
66
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Using the direct routing packet forwarding method, known elsewhere as direct server return, FortiADC doesn’t change the IP addresses in the packets coming from the client. Instead, FortiADC forwards packets to the server keeping the same source IP address and the same destination IP address. This means that the virtual server IP address must match the real server IP address. Server replies can go either through FortiADC or directly to the client without passing through the FortiADC device. The direct routing method is often configured on a single VLAN or subnet, where the cluster IP and the server IP addresses are all on the internal interface. It can also be used in multiple VLAN configurations, although this is less common. For FTP profiles, you must use a persistence method.
FortiADC 6.2 Study Guide
67
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Using DNAT, FortiADC changes the destination IP address of the packets coming from the client. When configuring DNAT, you should note that the real server will respond to the client requests using their default gateway. If the FortiADC is not also the default gateway for the real server, asymmetric routing issues can be introduced.
FortiADC 6.2 Study Guide
68
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Using full NAT, FortiADC changes both the source IP address and the destination IP address. In order to specify the NAT IP addresses for the source IP address, you have to create a source pool. This is often used when the real server gateway is not the load balancer and you want to avoid asymmetric traffic. You would use Full NAT primarily when you are using FortiADC in a one-arm configuration.
FortiADC 6.2 Study Guide
69
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
FortiADC also supports tunneling. This allows FortiADC to send client requests to real servers through Layer 4 IP tunnels. FortiADC encapsulates the original packet, with the client to virtual server IP addresses, and routes the packets to the real server. The real server will decapsulate the packet (containing the client IP to virtual server IP) and respond to the client. The real servers will be configured with a secondary IP that is the same as the virtual server.
FortiADC 6.2 Study Guide
70
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Using NAT46, FortiADC replaces both the destination and source IP addresses, translating IPv4 addresses to IPv6 addresses. The source IP address is replaced by an IP address from the pool you specify. The destination IP address is replaced with the IP address of the back-end server selected by the load balancer.
FortiADC 6.2 Study Guide
71
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Using NAT64, FortiADC replaces both the destination and source IP addresses, translating IPv6 addresses to IPv4 addresses. The source IP address is replaced by an IP address from the pool you specify. The destination IP address is replaced with the IP address of the back-end server selected by the load balancer.
FortiADC 6.2 Study Guide
72
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
The FortiView pages display important information about FortiADC, which includes the logical topology of real server pools and their members within each virtual server, server load balancing information, security, and some other system events and alerts.
FortiADC 6.2 Study Guide
73
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
The server load balance logical topology page uses a tree view format to show the internal configuration of each virtual server on FortiADC. Depending on the configuration, the diagram may show content routing, schedule pools, real server pools, and real server pool members configured on a virtual server. Clicking on a virtual server will give you the ability to edit the server configuration, delete the virtual server, or view detailed server analytics.
FortiADC 6.2 Study Guide
74
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Clicking on a server pool provides you with the ability to edit the server pool configuration or view detailed analytics about the server pool.
FortiADC 6.2 Study Guide
75
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Clicking on individual real servers will provide you the ability to change the current server status (enable, disable, maintain), edit the current settings, delete the server, or view detailed analytics for the server.
FortiADC 6.2 Study Guide
76
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
The virtual servers dashboard allows you to monitor all of the virtual servers on FortiADC, and access the real server dashboard for each virtual server. The real server dashboard provides a live, up-to-date view of the individual real server pool members underpinning the virtual server.
FortiADC 6.2 Study Guide
77
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
78
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
79
Virtual Servers and Load Balancing
DO NOT REPRINT © FORTINET
This slide shows the objectives that you covered in this lesson. By mastering server load balancing, you learned how to deploy FortiADC in your network and improve the efficiency of your resources.
FortiADC 6.2 Study Guide
80
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
In this lesson, you will learn about advanced server load balancing.
FortiADC 6.2 Study Guide
81
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
82
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objective shown on this slide. By demonstrating competence in understanding server persistence and the available persistence methods, you will be able to leverage this capability in your environment.
FortiADC 6.2 Study Guide
83
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
In the Virtual Servers and Load Balancing lesson, you learned how to create and use many of the most common objects associated with virtual servers. In this lesson, you will learn how to create several of the optional objects, many of which can be used to enhance application delivery performance.
FortiADC 6.2 Study Guide
84
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Persistence rules identify traffic that should not be load balanced, but instead forwarded to the back-end server that has seen requests from that source before. Persistence rules are often needed to support server transactions that depend on an established client-server session, such as e-commerce transactions or SIP voice calls. FortiADC maintains persistence session tables to forward client traffic to back-end servers based on persistence rule matches. FortiADC provides a set of predefined persistence rules to simplify configuration, and supports a large number of persistence rule types for custom rule creation.
FortiADC 6.2 Study Guide
85
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
The different persistence rule types allow you flexibility when choosing the best option for any given environment. Most persistence rules have timeout settings to provide further customization. The rule types listed on this slide are evaluated in the following ways: Source Address: Persistence is based on the source IP address of the client. Source Address Hash: Persistence is based on a hash of the source IP address of the client making an initial request. Address-Port Hash: Persistence is based on a hash of both the source IP address and TCP/UDP port number. HTTP Header Hash: Persistence is based on a hash of the HTTP header. HTTP Request Hash: Persistence is based on a hash of the specified URL parameters in the initial client request.
FortiADC 6.2 Study Guide
86
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
The insert cookie rule type takes advantage of the browser’s cookie caching behavior. When the user connects for the first time and sends the first HTTP GET request, FortiADC uses the load balancing method to send the GET request to any of the servers available in the pool. When a server replies with the web content, FortiADC inserts a cookie in the content that is forwarded to the user. From this point on, each time the client issues a GET request, the browser includes the cookie, and FortiADC uses that cookie to determine which server the HTTP GET should go to. This rule type allows you to set a timeout for the server-side session, so that after the specified timeout period elapses, FortiADC won’t forward the request based on the cookie, and will instead select the server using the method specified in the virtual server configuration.
FortiADC 6.2 Study Guide
87
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
With the embedded cookie rule type, FortiADC waits for the reply from the server and searches for a specific cookie in the server reply. Once FortiADC finds that cookie, FortiADC adds the server ID as a prefix to the cookie. After that, the client sends the cookie with the server ID prefix and FortiADC uses that prefix to identify which server the traffic should be forwarded to.
FortiADC 6.2 Study Guide
88
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
The rule types listed on this slide are evaluated in the following ways: Cookie Hash: Persistence is based on a hash of the cookie provided by the server. RADIUS Attribute: Persistence is based on selected RADIUS attribute information. SSL Session ID: Persistence is based on the SSL session ID. Persistent Cookie: The persistent cookie method is similar to the insert cookie method, but if the real server produces a cookie with the same name, then FortiADC won’t modify it. Like the insert cookie method, the persistent cookie method also supports specifying a session time out. Rewrite Cookie: Using this rule type, the cookie is provided by the real server and FortiADC modifies its value.
FortiADC 6.2 Study Guide
89
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
90
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Good job! You now understand persistence rules. Now, you will learn about HTTP(S) delivery optimization.
FortiADC 6.2 Study Guide
91
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in advanced load balancing features, you will be able to configure Layer 7 content routing and rewriting, set up web caching and compression, and import digital certificates in order to configure SSL offloading.
FortiADC 6.2 Study Guide
92
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Page speed profiles can be configured to optimize the delivery of HTML, CSS, and image content. The HTML and Move CSS to Head will move any link or style tag content to the head section of the page. This reduces the number of times a browser must reflow the document because the styles are parsed before the elements in the body are introduced. Using the CSS and Combine CSS options combine multiple CSS elements into one. This can reduce the number HTTP/HTTPS requests that a browser makes during page refresh. You can reduce the size of image files or the JPEG sampling to reduce the amount of data that is transferred when a page is loaded. You select these profiles when you configure page speed.
FortiADC 6.2 Study Guide
93
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Page control allows you to specify if FortiADC will process a web page or not, based on specified URI patterns using regular expressions. You define the cache limits, page speed profile, page control, and resource control in the page speed configuration.
FortiADC 6.2 Study Guide
94
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
TCP multiplexing provides enhanced web server and application performance by using existing TCP connections between FortiADC and the real servers. This capability is available only on Layer 7 virtual servers. Connection pools are defined and assigned to the virtual servers using the CLI commands shown on this slide.
FortiADC 6.2 Study Guide
95
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Compression offloading is another FortiADC capability. Compression of content on high traffic sites impacts server performance. Removing the need for the server to perform this function will lessen demand on the server. Using compression offloading, FortiADC compresses data being sent to clients, if the browser supports GZIP. FortiADC receives the web content from the server in uncompressed form. If the content supports compression, the FortiADC compresses the web content and sends it to the users. Web pages that support compression include HTML, JavaScript, CSS, and other MIME types.
FortiADC 6.2 Study Guide
96
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Configuration of a compression profile is necessary to leverage compression offloading. The profile is used to define which content to include or exclude from compression. URI rules are used to match page requests and must use regular expression. The content type section is used to build a list of types to compress or not compress depending on the rule type. The compression configurations are then assigned to application profiles.
FortiADC 6.2 Study Guide
97
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Content caching is another FortiADC performance enhancing feature. Cached content is maintained locally on FortiADC and delivered directly to the requesting host without the need to query the server for it. If a client requests content that is not yet in cache memory, FortiADC forwards the request to the server to get that content. FortiADC then caches the content locally in its cache memory, and sends it to the client.
FortiADC 6.2 Study Guide
98
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
After that, if a client requests that same content (that is now in cache memory), FortiADC does not connect to the server again. It sends the cached content to the client on the server’s behalf. This capability reduces server workload as well as the bandwidth utilization between FortiADC and the back-end servers.
FortiADC 6.2 Study Guide
99
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
You configure caching by defining the maximum values for object size, cache size, entries, and age. Content that matches entries in the URI Exclude List is never cached. Content that matches entries in the Dynamic Cache Rule List is cached. The URI Exclude List takes precedence over the Dynamic Cache Rule List. You select the caching configuration type in the HTTP or HTTPS virtual server application profile.
FortiADC 6.2 Study Guide
100
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
With Layer 4 content routing, FortiADC routes traffic to a specific server pool based on literal or regular expression matches of the client’s source IP address. For example, all traffic from a particular subnet could be load balanced to a specific server pool.
FortiADC 6.2 Study Guide
101
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Using Layer 7 content routing, FortiADC can make smarter load balancing decisions. With Layer 7 content routing, decisions are made based on URL. For example, requests for a specific file or file type, such as media content, can be forwarded to server pools built to better handle that specific content type.
FortiADC 6.2 Study Guide
102
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Using Layer 7 content rewrite, FortiADC can modify the host field in the HTTP header, the URL, or the referrer field. It can also be configured to reply with an HTTP redirect, or it can be configured to reply with a forbidden error. For example, a client connecting to webmail.example.com could be redirected to webmail.example.com/owa.
FortiADC 6.2 Study Guide
103
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
This slide shows an overview of a Layer 7 content rewrite configuration. On the Content Rewriting screen, you specify the action and a set of rules. Each time the traffic matches any of those rules, the action is taken.
FortiADC 6.2 Study Guide
104
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
You can configure FortiADC to present an error page to clients when all the servers are unavailable. Error pages can only be used with Layer 7 virtual servers. After you’ve created an error page configuration object, you can select it in the virtual server configuration. To configure an error page configuration object, copy the error message file to a location you can reach from your browser. The error message file must be named index.html and must be contained in a ZIP file. You must have read-write permission for load balance settings.
FortiADC 6.2 Study Guide
105
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
106
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Good job! You now understand HTTP(S) delivery optimization. Now, you will learn about SSL offloading, acceleration, and SSLi.
FortiADC 6.2 Study Guide
107
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in SSL offloading and understanding SSLi and its use cases, you will be able to take advantage of these features in your environment.
FortiADC 6.2 Study Guide
108
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
FortiADC supports SSL offloading and acceleration. SSL offloading moves the SSL encryption and decryption from the servers to the load balancer. Because the SSL encryption is terminated in the FortiADC device, the system can inspect and make decisions based on SSL content. In order to do that, the server’s signed digital certificate and private key must be installed on FortiADC.
FortiADC 6.2 Study Guide
109
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
When you use SSL offloading, a single device is used for SSL and HTTPS management, so all the certificates are stored on one device. This lowers the SSL management and operational costs. More importantly, when you use SSL offloading, the server doesn't have to run expensive crypto tasks, so the workload on the servers is lower because the SSL traffic is moved to a dedicated ASIC processor on hardware-accelerated FortiADC devices. This also reduces the bandwidth utilization between FortiADC and your back-end servers.
FortiADC 6.2 Study Guide
110
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Using SSL re-encryption, FortiADC can decrypt the data coming from the user and re-encrypt it before sending it to the server. Two separate SSL sessions are established: one from the client to FortiADC and another one from FortiADC to the server. Both SSL sessions terminate at FortiADC. FortiADC can still inspect and make decisions based on the content inside the HTTPS traffic. Different sized keys can be used on each side of the FortiADC. For example, a smaller key size could be used between FortiADC and the real servers as a means to reduce processing overhead.
FortiADC 6.2 Study Guide
111
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
As more and more traffic is becoming encrypted traffic, the process of encryption and decryption can weigh heavily on the CPU resources of security devices. This, coupled with the immense possibility of cyber threats propagating through encrypted traffic, makes it essential for organizations to inspected this traffic. When configured in SSLi mode, FortiADC is dedicated to the encryption and decryption of SSL traffic for the purpose of offloading that task from a dedicated security device. Enabling SSLi mode on FortiADC reverts the FortiADC to factory defaults. This can only be done through the CLI with the command shown on this slide. When you configure it this way, the SSLi Proxy menu option becomes available in the GUI. All SSLi configurations are performed through the GUI. The following features are not supported when in SSLi mode, and menu options are removed: • Global load balancing • Link load balancing • IP reputation • Geo IP Protection • Central management • User authentication
FortiADC 6.2 Study Guide
112
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
When deployed in SSLi mode, FortiADC works as an SSL proxy between the client and the server. Real server objects are created on FortiADC for both the security device and the gateway. Two virtual servers are created and static routes are configured for traffic flow. The traffic flow process is as follows: 1. Traffic is passed from the client to the client side virtual server for decryption. 2. FortiADC passes the decrypted traffic to the security device. 3. The security device inspects the traffic and forwards it to the server side virtual server. 4. The server side virtual server encrypts and forwards the traffic to the gateway. It should be noted that SSLi mode is not a requirement for decryption and encryption of traffic for inspection by an external security device. However, it can provide some performance advantages.
FortiADC 6.2 Study Guide
113
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
To use SSL offloading or SSL encryption, you have to install the signed digital certificates and private keys for your servers. There are two ways of doing this. You can do it manually by importing the certificate files, or you can submit a certificate signing request to a CA.
FortiADC 6.2 Study Guide
114
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
115
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
116
Advanced Server Load Balancing
DO NOT REPRINT © FORTINET
This slide shows the objectives that you covered in this lesson. By mastering server load balancing, you can deploy FortiADC in your network and improve the efficiency of your resources.
FortiADC 6.2 Study Guide
117
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
In this lesson, you will learn about link load balancing and advanced networking.
FortiADC 6.2 Study Guide
118
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
119
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in link load balancing, you will be able to configure link load balancing, create virtual tunnels, and link groups.
FortiADC 6.2 Study Guide
120
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Using link load balancing, FortiADC balances traffic among multiple upstream links. If the primary link fails, traffic is seamlessly redirected through a backup link. You can configure link load balancing for inbound traffic, outbound traffic, or both. Outbound link load balancing is the most commonly used configuration. Link load balancing provides reduced risk of outages, additional bandwidth, and potentially reduced ISP costs.
FortiADC 6.2 Study Guide
121
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Many of the optional objects are configured as system-wide shared resources. Examples of optional objects include schedule, address, service, and health check. Link policies apply to either link groups or virtual tunnels.
FortiADC 6.2 Study Guide
122
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Link policies specify the traffic to be balanced by each link group and virtual tunnel. The example on this slide shows a table containing three link policies. These policies specify that: • • •
All the traffic that comes from 172.16.1.0/24 and goes to 172.16.2./24 uses Virtual Tunnel 1. All the traffic that goes to 172.16.3.0/24 uses Link Group 2. All the traffic that goes to the Internet uses Link Group 1 .
Link policies can match on more than simple source and destination address. For example, a link policy can balance based on a service, such as HTTP or HTTPS. You can also apply schedules to define when policies are enforced.
FortiADC 6.2 Study Guide
123
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Using outbound link load balancing, FortiADC balances traffic that leaves the network among the links that are part of the same link group.
FortiADC 6.2 Study Guide
124
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
You can configure persistence for outbound link load balancing so FortiADC can maintain the same outgoing gateway for packets with the same source or destination IP address. There are four types of outbound LLB persistence: • Source destination pair: • Based on the source and destination IP addresses • Source destination address: • Based on the source subnet and the destination subnet • Source address: • Based on the source subnet only • Destination address: • Based on the destination subnet only
FortiADC 6.2 Study Guide
125
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Configure FortiADC to do outbound link load balancing based on proximity route dynamic detection. Dynamic detection of proximity routes uses a proximity cache. The proximity cache contains the delay from all the links to all the destination subnets (/24). For example, If a client sends a new connection to the IP address 10.10.1.1, FortiADC checks if subnet 10.10.1.0/24 is in the cache table. If the subnet isn’t in the table, the packet is routed normally, based on the specified balancing algorithm. In addition, FortiADC sends ICMP ping packets to the destination IP address through each of the links that are part of the link group.
FortiADC 6.2 Study Guide
126
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Next, the round-trip delay for each ping through each link is recorded in the proximity cache table. So, next time there is a packet to the same /24 subnet from the same user or from a different user, FortiADC uses the link with the smallest delay to the destination. All entries in the cache table are aged out after their inactivity timeout expires.
FortiADC 6.2 Study Guide
127
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
There are three methods FortiADC uses to select proximity routes: • Dynamic detect only: • Uses the proximity route cache table to select the link with the lowest delay • Static table only: • Uses a static table that is manually configured by the administrator instead of using the proximity route cache table • Static table first: • Checks if there is a matching destination in the static table that was manually configured by the administrator • If there is no matching destination in the static table, FortiADC uses the proximity route cache table
FortiADC 6.2 Study Guide
128
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Outbound link load balancing for FortiADC allows virtual tunneling. You can build IP tunnels between two FortiADC devices. These tunnels use a generic routing encapsulation (GRE)-based proprietary protocol that allows data to travel unencrypted. You can group all the IP tunnels you create into virtual tunnels. You can also balance outbound traffic among tunnels that are part of the same virtual tunnel. Next, you will learn how to configure load balancing algorithms for outbound link load balancing virtual tunneling.
FortiADC 6.2 Study Guide
129
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Outbound link load balancing virtual tunneling routes traffic based on one of two load balancing algorithms: • Weighted round robin: • Means links with more weight receive more traffic • Source-destination hash: • Based on consistent hashing of both the source and the destination IP addresses • Traffic between the same two IP addresses is always routed through the same link
FortiADC 6.2 Study Guide
130
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Now you will learn about the steps to configure link load balancing. First, you should add addresses, address groups, services, service groups, and schedule groups that can then be used to match traffic to link policy rules. If you do not add these, your policy will not use matching criteria and will not have granularity. Next, you configure optional features. You should configure health check rules before you configure gateway links, and you should configure persistence rules or proximity routes before you configure a link group. Next, you configure the gateway links. Then, you will configure either a link group or virtual tunnel as required. Finally, you configure the link policy, in which you set the source/destination/service matching criteria for your link groups or virtual tunnels.
FortiADC 6.2 Study Guide
131
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Using the GUI, you can configure addresses in the system’s shared resources. You will use these addresses when you need to create link policies that apply to more than one address object. For example, if you subscribe customer one and customer two to a group of links, then you can create rules that match the customer one or customer two address space, and load balance the set of gateways assigned to them.
FortiADC 6.2 Study Guide
132
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
You can use service and service groups to specify the service to be matched in policies. The Protocol field identifies the protocol by number, such as 1 (ICMP), 6 (TCP), or 17 (UDP). For example, if a client requires a policy for link load balancing web services, you can add HTTP and HTTPS as services, and then aggregate those services into a group called web services.
FortiADC 6.2 Study Guide
133
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
You can use schedule groups to create time-bound link load balancing policies. The options are one-time, daily, weekly, or monthly. One-time link load balancing policies can be very useful for special events requiring a specific link load balancing policy to handle the extra surge in traffic, for example.
FortiADC 6.2 Study Guide
134
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
The gateway link configuration enables you to specify bandwidth rate thresholds, and spillover threshold behavior for the gateway links you will add to link groups. You can also enable health checks, to make better load balancing decisions in the link policy.
FortiADC 6.2 Study Guide
135
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Link groups are used to group the gateways that will be used for link load balancing. When you add each gateway, you configure its weight. Links with a higher weight receive more traffic.
FortiADC 6.2 Study Guide
136
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
When you configure a virtual tunnel group, you set the list of tunnel members, as well as load balancing options like algorithm and weight. When you add members to a virtual tunnel configuration, you specify a local and remote IP address. These addresses are IP addresses assigned to a network interface on the local and remote FortiADC appliance. After you configure a virtual tunnel configuration object, you can select it in the link policy configuration.
FortiADC 6.2 Study Guide
137
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
The link policy uses information from all created objects to create a table of link policy rules. The link policy rules specify the traffic to be balanced by each link group. FortiADC searches the table from top to bottom and uses the first rule that matches the traffic. For each rule, you must configure an ingress interface, source address, destination address, service, schedule, and the link group or virtual tunnel the FortiADC uses to route the traffic. The link group is mandatory in a link policy configuration.
FortiADC 6.2 Study Guide
138
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
139
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Good job! You now understand basic link load balancing. Now, you will learn about advanced networking and routing.
FortiADC 6.2 Study Guide
140
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objective shown on this slide. By demonstrating competence in advanced networking and routing, you will be able to configure advanced networking and routing options such as policy routing, quality of service (QoS), and NAT.
FortiADC 6.2 Study Guide
141
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
You can configure a SNAT table, which contains the rules for translation of the source IP address. The SNAT table works in a similar way to the firewall policy tables. FortiADC searches the table from top to bottom and uses the first rule it finds that matches the traffic. The source address is then mapped to a defined IP address or an address from the SNAT pool.
FortiADC 6.2 Study Guide
142
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Another NAT table on FortiADC is the one-to-one NAT table, which contains the rules for one-to-one static bidirectional NAT translation. This slide shows an example of port forwarding, or PAT. PAT works in a similar way to VIPs on FortiGate devices.
FortiADC 6.2 Study Guide
143
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
FortiADC has limited support for QoS. With FortiADC, you can limit the available bandwidth for non-priority traffic. For example, you might want to limit available bandwidth so traffic that is sensitive to bandwidth and delay can receive a higher priority.
FortiADC 6.2 Study Guide
144
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
To configure QoS, you must first configure the queues that define the different bandwidth limits. Then, you assign the queues to the filters that specify the traffic limited by each queue. In the QoS filter shown on this slide, HTTPS traffic with an ingress interface of port3 and an egress interface of port1 would be limited to the bandwidth defined in the OneGig QoS queue.
FortiADC 6.2 Study Guide
145
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
This slide presents an overview of how FortiADC determines how to route a packet. When processing an incoming packet, the first table that FortiADC checks is the content route table. FortiADC checks if the URL or host matches any rule in the content route table. If there is a match, the packet is routed based on that content route rule. If there is no match, FortiADC checks the source and destination IP address for a match in the policy route table. If there is a match in the policy route table, the packet is routed based on that rule. If there is no match in the policy route table, then FortiADC checks the destination IP address for a match in the routing table. The routing table contains static routes and OSPF routes. If there is a match, FortiADC routes the packet. If there is no match, the packet is dropped because FortiADC doesn’t know how to route it.
FortiADC 6.2 Study Guide
146
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Typically, routing is done based on the destination IP address. FortiADC can use policy routing to route traffic based on the source IP address. In the table shown on this slide, FortiADC is configured to route all traffic coming from 172.16.1.0 and going to the internet to use the first gateway on the left. For traffic that comes from the IP address 172.17.1.1, FortiADC is configured to route that traffic through the middle link. And finally, traffic from subnet 172.17.1.0 is routed through the link on the right. In this way, traffic is routed based on the source IP address, using three different links.
FortiADC 6.2 Study Guide
147
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
The policy routing configuration table contains the rules that specify the source IP address, the destination IP address, and the gateway to use for traffic that matches those settings. FortiADC searches the table from top to bottom and uses the first rule that matches the traffic. If there is no match, FortiADC uses the regular routing table to route the packet.
FortiADC 6.2 Study Guide
148
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
FortiADC uses OSPF to communicate with other OSPF routers, and to advertise its routes and dynamically populate its routing table.
FortiADC 6.2 Study Guide
149
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
You can define subnets and their associated OSPF areas.
FortiADC 6.2 Study Guide
150
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
This example on this slide shows where you define interfaces and their respective metrics.
FortiADC 6.2 Study Guide
151
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
When you read about BGP, often you see exterior BGP (EBGP) or interior BGP (IBGP) mentioned. These are both BGP routing, but BGP used in different roles. EBGP involves packets crossing multiple autonomous systems (AS) whereas IBGP involves packets that stay within a single AS. For example, the AS_PATH attribute is only useful for EBGP where routes pass through multiple ASs. These two modes are important because some features of BGP are used for only one of EBGP or IBGP. For example, confederations are used in EBGP, and route reflectors are only used in IBGP. Also, routes learned from IBGP have priority over EBGP learned routes. Before you begin, you must : • Know how BGP has been implemented in your network; that is, you must know the configuration details of the implementation • Have read-write permission for system settings • Have configured all the needed access (IPv6) lists and prefix (IPv6) lists
FortiADC 6.2 Study Guide
152
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
153
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
154
Link Load Balancing and Advanced Networking
DO NOT REPRINT © FORTINET
This slide shows the objectives that you covered in this lesson. By mastering link load balancing and advanced networking, you will be able to configure link load balancing, and create virtual tunnels and link groups. You will also be able to configure advanced networking and routing options, such as policy routing, QoS, and NAT.
FortiADC 6.2 Study Guide
155
Global Load Balancing
DO NOT REPRINT © FORTINET
In this lesson, you will learn about global load balancing.
FortiADC 6.2 Study Guide
156
Global Load Balancing
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
157
Global Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in understanding how global load balancing works, you will be able to implement it on your FortiADC.
FortiADC 6.2 Study Guide
158
Global Load Balancing
DO NOT REPRINT © FORTINET
When a user wants to contact a website, for example, www.fortinet.com, the browser first contacts its local DNS server to get the IP address for that fully qualified domain name. If that IP address is not in the local DNS cache, the local DNS goes to one of the root name servers on the internet to get the IP address. The root name server replies with the IP address of the DNS server for that domain which, in this case, is fortinet.com. So, the local DNS contacts that domain name server. The domain name server for the domain fortinet.com replies with the IP address of the DNS server that is the authoritative DNS server for that fully qualified domain name www.fortinet.com. The local DNS contacts that DNS server, gets the IP address from there, and forwards the IP address to the client. Now the browser can go directly to that IP address to get the web content stored there.
FortiADC 6.2 Study Guide
159
Global Load Balancing
DO NOT REPRINT © FORTINET
Global load balancing is a DNS-based solution that enables you to deploy redundant resources around the globe. You can use these redundant resources to keep your business online when a local area deployment experiences unexpected spikes in traffic, or downtime. Global load balancing is a two-layer technique consisting of global server load balancing and server load balancing. Global server load balancing refers to a global balancing of traffic across multiple, geographically diverse FortiADCs, while server load balancing refers to the load balancing performed by the individual FortiADC across the local data center.
FortiADC 6.2 Study Guide
160
Global Load Balancing
DO NOT REPRINT © FORTINET
Global server load balancing is a fully-featured DNS solution based on a customized and hardened BIND 9 DNS implementation. You can deploy global load balancing as the authoritative name server for the DNS zones you configure. Using FortiADC global load balancing, you create a global load balancing framework that accounts for location, health, and round-trip time (RTT). When a global load balancing framework is in place, DNS sends direct client requests to a virtual server that is close, available, and has low latency.
FortiADC 6.2 Study Guide
161
Global Load Balancing
DO NOT REPRINT © FORTINET
FortiADC implements security features in global load balancing and DNS, including DNSSEC, response rate limits, and DNS forwarding. DNSSEC are a set of extensions to DNS that provide for DNS clients (known as resolvers) origin authentication of DNS data, authenticated denial of existence, and data integrity. Response rate limits help to mitigate DNS DoS attacks by reducing the rate at which the authoritative DNS responds to high volumes of malicious queries. DNS forwarding works by sending requests for remote resources to another DNS server known as a forwarder. The internal server then caches those results, which optimizes further lookups and reduces the number of DNS servers communicating over the internet.
FortiADC 6.2 Study Guide
162
Global Load Balancing
DO NOT REPRINT © FORTINET
Server availability is identified by FortiADC using real-time connectivity checking. FortiADC redirects client sessions based on server availability. If there is availability in the local pool, FortiADC replies with its virtual IP address. In the example shown on this slide, FortiADC has to be the authoritative DNS server for the fully qualified domain name that the customer is trying to reach.
FortiADC 6.2 Study Guide
163
Global Load Balancing
DO NOT REPRINT © FORTINET
If the local pool is not available, FortiADC replies to those DNS requests with the remote peer virtual IP address instead.
FortiADC 6.2 Study Guide
164
Global Load Balancing
DO NOT REPRINT © FORTINET
The example on this slide shows a global load balancing deployment with redundant resources at data centers in China and the United States. FortiADC-1 is the local server load balancer for the data center in China. FortiADC-2 is the local server load balancer for the data center in the United States. FortiADC-3 is a global server load balancer. It hosts the DNS server that is authoritative for www.example.com. When a client clicks a link to www.example.com, the local host DNS resolver commences a DNS query that is ultimately resolved by the authoritative DNS server on FortiADC-3. The set of possible responses includes the virtual servers on FortiADC-1 or FortiADC-2. The global load balancing framework uses location and health status to determine the set of responses that are returned. For example, you can use the global load balancing framework to direct clients located in China to the virtual server in China, or, if the virtual server in China is unavailable, then to the redundant resources in the United States. The virtual server IP addresses and ports can be discovered by the FortiADC global load balancer from the FortiADC local server load balancers. The global load balancing DNS server uses the discovered IP addresses in the DNS response. The framework also supports third-party IP addresses and health checks for those addresses.
FortiADC 6.2 Study Guide
165
Global Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
166
Global Load Balancing
DO NOT REPRINT © FORTINET
Good job! You now understand the principles of global load balancing. Now, you will learn how to configure global load balancing.
FortiADC 6.2 Study Guide
167
Global Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in configuring global load balancing, you will be able to ensure that all elements of global load balancing are configured correctly for your network.
FortiADC 6.2 Study Guide
168
Global Load Balancing
DO NOT REPRINT © FORTINET
Global load balancing uses mandatory and optional configuration objects. Some mandatory objects are predefined, and include the ability to add more objects or customize existing ones. Others, such as the zone, are auto generated but can be created and customized by the administrator. Optional objects are not required, or are preset, such as the general settings and response rate limit objects.
FortiADC 6.2 Study Guide
169
Global Load Balancing
DO NOT REPRINT © FORTINET
When you deploy a global load balancing solution, you configure DNS server and global load balancing details on the global FortiADC instance only. The configuration framework allows for granular administration and fine tuning of both DNS server and global load balancing frameworks. The order of configuration is important for initial configurations because complex objects, like policies, rely on simple objects, like remote DNS servers or DNS64 rules; however, simple elements must be configured first. Fortunately, some objects are preconfigured and you can fine tune them later, if necessary. Auto-generated zones rely on numerous other objects, so make sure to customize your deployments where required. Many objects are optional. You can configure optional objects and add them to existing policies later. To configure a DNS server solution, do the following: 1. Review and configure the address groups to use in your DNS policy matching rules. You can use the predefined any and none address groups. 2. Configure remote DNS servers, or forwarders, and the DSSET list (optional). A complete zone configuration occurs. Zones, including FortiADC virtual servers, auto generate; however, you can add additional zones manually. 3. Configure DNS64 and response rate limits (optional). 4. Configure DNS policies and DNSEC. 5. Configure remaining general DNS settings.
FortiADC 6.2 Study Guide
170
Global Load Balancing
DO NOT REPRINT © FORTINET
When you configure global load balancing, many objects require that components of your underlying infrastructure are up and running so that you can test the solution. For example, virtual servers, and their corresponding back-end servers should be in place before you create virtual server pools in global load balancing. Step 1 is configuring dynamic proximity, data centers, servers, virtual server pools, and hosts. These are required for FortiADC to generate a working DNS zone configuration and resource records. Step 2 is reviewing the auto-generated DNS zone configuration. Finally, step 3 is creating the DNS policy.
FortiADC 6.2 Study Guide
171
Global Load Balancing
DO NOT REPRINT © FORTINET
Use the address group object to specify the source and destination IP addresses that will be used as matching criteria in your DNS policies. You can use the predefined any and none groups, or you can add your own groups.
FortiADC 6.2 Study Guide
172
Global Load Balancing
DO NOT REPRINT © FORTINET
Remote DNS servers are optional. You can use remote DNS servers to create a list of DNS forwarders, which you can use when you don’t want the local DNS server to connect to internet DNS servers. For example, if your local DNS server is behind a firewall and you don’t want to allow DNS through that firewall, you can implement DNS forwarding to a remote server deployed in a DMZ, or similar network region, that can contact internet DNS servers. You can use remote DNS servers in DNS zones and DNS policy configurations.
FortiADC 6.2 Study Guide
173
Global Load Balancing
DO NOT REPRINT © FORTINET
If DNSSEC is enabled, secure communication between the FortiADC DNS and any child DNSs is based on keys contained in DSSET files. DSSET files are generated automatically, once the zone is signed by DNSSEC.
FortiADC 6.2 Study Guide
174
Global Load Balancing
DO NOT REPRINT © FORTINET
It’s optional to configure DNS64 for FortiADC. DNS64 is used to map IPv4 addresses to AAAA queries when there are no AAAA records. You can use DNS64 for segments using NAT64 to support IPv6 client communication with the back-end servers.
FortiADC 6.2 Study Guide
175
Global Load Balancing
DO NOT REPRINT © FORTINET
The response rate limit keeps the FortiADC’s authoritative DNS server from being used in an amplifying reflection DoS attack. The default response rate limit is 1000 responses per second, but you can set this limit to any value between 1 and 2048 responses per second. You can create up to 256 different response rate limits to use in DNS policies.
FortiADC 6.2 Study Guide
176
Global Load Balancing
DO NOT REPRINT © FORTINET
The general DNS settings allow you to specify which interfaces listen for DNS requests. By default, FortiADC listens for DNS requests on all configured addresses and interfaces. Other settings apply when traffic does not match a global DNS policy. Key elements of the general DNS settings include enabling or disabling global DNS, recursion, and DNSSEC and DNSSEC validation. You can also set the default forwarding behavior and response rate limit in the general DNS settings.
FortiADC 6.2 Study Guide
177
Global Load Balancing
DO NOT REPRINT © FORTINET
You can use the Dynamic Proximity setting to order DNS lookups results based on the RTT of ICMP or TCP probes sent by the local SLB to the DNS resolver that sent the DNS request. FortiADC calls the RTT results for the specified timeout. For any subsequent requests from IP addresses in the specified netmask, FortiADC takes the RTT from the results table, instead of issuing a new real-time probe. This reduces DNS response time.
FortiADC 6.2 Study Guide
178
Global Load Balancing
DO NOT REPRINT © FORTINET
The data center is a required component of a global load balancing configuration. Configuring the data center allows you to set key properties, such as Location, ISP, or both, and ISP State/Province. The global load balancing algorithm uses these properties to select the FortiADC that is closest to the client.
FortiADC 6.2 Study Guide
179
Global Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
180
Global Load Balancing
DO NOT REPRINT © FORTINET
Good job! You now understand how to configure global load balancing. Now, you will learn how to configure zones and servers.
FortiADC 6.2 Study Guide
181
Global Load Balancing
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in configuring servers and zones, you will be able to set up servers, virtual server pools, zones, and DNS policies.
FortiADC 6.2 Study Guide
182
Global Load Balancing
DO NOT REPRINT © FORTINET
Servers are another required component of a global load balancing configuration. Use servers to specify the local server load balancers, either FortiADC instances or third-party servers, that are to be load balanced. For FortiADC instances, the global load balancing feature checks the status and synchronizes configurations from the local server load balancers, so that it can learn the set of virtual servers that can be included in the global load balancing virtual server pool. For the discovery feature to work, you must first create the data center objects associated with the local SLB as well as the virtual server configurations on the local FortiADC server load balancers to be included in the global load balancing virtual server pools. If you want to configure a gateway health check, you must also create gateway objects on the local FortiADC server load balancers. After you meet these requirements, and you add a server to global server load balancing, you can click Discover to allow FortiADC to discover the local virtual servers and populate the members list.
FortiADC 6.2 Study Guide
183
Global Load Balancing
DO NOT REPRINT © FORTINET
The virtual server pool configuration is also mandatory. It defines the set of virtual servers that can be matched in DNS resource records, so it should include all the virtual servers that can be answers for DNS requests to resolve a domain, such as www.example.com. The virtual server pool also specifies key parameters of the global load balancing algorithm, including proximity options, status checking options, load balancing method, and weight. You specify virtual server pools in the global load balancing host configuration. You can add up to 256 servers to a virtual server pool.
FortiADC 6.2 Study Guide
184
Global Load Balancing
DO NOT REPRINT © FORTINET
The DNS response to the client is an ordered list of answers, which excludes unavailable virtual servers. The available servers are ordered based on the following priorities: 1. Geographic proximity 2. Dynamic proximity 3. Weighted round robin A client receiving the DNS response as a list of answers tries the first answer and only proceeds to the next answers, if the first answer is unreachable.
FortiADC 6.2 Study Guide
185
Global Load Balancing
DO NOT REPRINT © FORTINET
Use host settings to form the zone configuration and RRs in the generated DNS zone used for global load balancing. Host settings are mapped to zone settings and RRs. The system uses the Domain Name and Host Name settings in both the configuration and the generated configuration name. The system derives the IP address and weight from the virtual server pool.
FortiADC 6.2 Study Guide
186
Global Load Balancing
DO NOT REPRINT © FORTINET
The DNS zone configuration is key to the global load balancing solution. It contains key DNS server settings, such as domain name and name server details, type (whether master or forwarder), and whether DNSSEC is enabled or not. It also contains the DNS resource records that are used to resolve DNS queries. Each zone can have different DNS server settings. For example, the DNS server can be a master for one zone and a forwarder for another zone. You can create up to 256 zones for use in DNS policies.
FortiADC 6.2 Study Guide
187
Global Load Balancing
DO NOT REPRINT © FORTINET
This slide shows an example of a zone auto generated by the creation of a host object. Because FortiADC is now an authoritative DNS server, you can add A and Quad A records, CName records, and NS records. You can also add MX and TXT records to the zone.
FortiADC 6.2 Study Guide
188
Global Load Balancing
DO NOT REPRINT © FORTINET
The global DNS policy is a rule base that matches traffic to DNS zones. Traffic that matches a zone, source, and destination criteria is served by the global DNS policy. Traffic that does not match any specific policy is served by the DNS general settings. You can create up to 256 different global DNS policies.
FortiADC 6.2 Study Guide
189
Global Load Balancing
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
190
Global Load Balancing
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
191
Global Load Balancing
DO NOT REPRINT © FORTINET
This slide shows the objectives that you covered in this lesson. By mastering the objectives covered in this lesson, you learned how to implement these global load balancing, servers, and zones on your FortiADC.
FortiADC 6.2 Study Guide
192
Security
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the security options on FortiADC.
FortiADC 6.2 Study Guide
193
Security
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
194
Security
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in describing and configuring a WAF and WVS, you will be able to ensure that your FortiADC is OWASP-compliant for secure transactions.
FortiADC 6.2 Study Guide
195
Security
DO NOT REPRINT © FORTINET
This slide shows the relationships among WAF configuration elements. A WAF profile is made up of a web attack signature policy, a URL protection policy, an HTTP protocol constraint policy, a SQL/XSS injection detection policy, and a bot detection policy. This WAF profile is, in turn, applied to a load balancing virtual server, so all traffic routed to the virtual server is subject to the WAF rules set out in the profile. You can apply WAF profiles to HTTP and HTTPS virtual servers, but not to HTTP Turbo virtual servers. The WAF module offers enhanced security configuration options for FortiADC. It should be noted that FortiWeb offers these enhanced security options as well, and combining the FortiWeb and FortiADC solutions provides enhanced security and performance.
FortiADC 6.2 Study Guide
196
Security
DO NOT REPRINT © FORTINET
A WAF is a security policy enforcement point that you can set up between the client and a web application. Its main purpose is to prevent attacks against the web servers. You deploy it separately from the web application so that processes used to perform security scanning do not affect the web server’s performance. A WAF uses methods that complement perimeter security, such as perimeter security provided by the FortiGate next-generation firewall (NGFW).
FortiADC 6.2 Study Guide
197
Security
DO NOT REPRINT © FORTINET
A WAF scans a request at four checkpoints: the HTTP request header, the HTTP request body, the HTTP response header, and the HTTP response body. When the WAF completes the scan, it enforces policy rules. If the HTTP request header violates a rule, and the action is Deny, the attempted session is dropped, and scanning for the transaction stops. If the action is Alert, the event is logged and rules processing continues.
FortiADC 6.2 Study Guide
198
Security
DO NOT REPRINT © FORTINET
WAF policies allow the WAF to detect and respond to different types of threats. For example, the web attack signature policy allows the WAF to scan the traffic for signatures that detect known attacks and exploits. URL protection policies allow the WAF to filter HTTP requests that match specific character strings and file extensions. HTTP protocol constraint policies allow the WAF to create rules that filter traffic containing invalid HTTP request parameters and methods, or to drop packets with specified server response codes. SQL and cross site scripting (XSS) injection detection policies inspect user-supplied data for requests that can cause SQL queries to be run directly against the web application’s database, or XSS injection attacks that can cause a web browser to run a client-side script. WAF SQL and XSS detection is complementary to, and much faster than, the web attack signature method.
FortiADC 6.2 Study Guide
199
Security
DO NOT REPRINT © FORTINET
WAF profiles refer to the various WAF policies to be enforced. A profile can define six different protection categories: • • • • • •
Standard Protection: Provides web attack signature and HTTP protocol constraint protections. Sensitive Data Protection: Provides cookie security, data leak prevention, and HTTP header security protection. Input Protection: Provides SQL/XSS injection detection and input validation policy protections. Access Protection: Provides brute force attack detection, URL protection, bot detection, and credential stuffing defense. API Protection: Provides JSON detection, XML detection, OpenAPI detection, and API gateway protections. Advanced Protection: User-defined advanced protection configurations from the Common Attacks Detection view, and CSRF protection.
You can apply WAF profiles to a load balancing virtual server, so that traffic routed to that VS is subject to those rules. You can apply WAF profiles to both HTTP and HTTPS virtual servers, but not to HTTP Turbo virtual servers. You can use existing predefined profiles or create your own. The maximum number of profiles per VDOM is 255.
FortiADC 6.2 Study Guide
200
Security
DO NOT REPRINT © FORTINET
FortiADC provides an OWASP Top 10 wizard to assist administrators in protecting against OWASP Top 10 application security risks. The wizard automatically creates WAF profiles that can be assigned to virtual servers. For more information about the OWASP Top 10 project, as well as details about the top 10 list, visit the OWASP website.
FortiADC 6.2 Study Guide
201
Security
DO NOT REPRINT © FORTINET
The WVS is a set of automated tools that perform black box tests on web applications, to look for security vulnerabilities such as cross-site scripting, SQL injection, command injection, source code disclosure, and insecure server configuration. FortiADC supports the following: • Full reporting on vulnerability risks • Automatic policy generation While testing for vulnerabilities FortiADC could negatively impact the systems being tested. For this reason, the WVS should not be used to test systems in production. Performing scans across the internet could cause other security systems to identify the traffic as real and active malicious behavior.
FortiADC 6.2 Study Guide
202
Security
DO NOT REPRINT © FORTINET
WVS profiles define the real server pool to target and the type of scan to perform. The WVS can perform the following types of scans: • Mime scan • File scan • Message scan • Apps scan • Context scan • HTTP cookie The crawl limit will define the number of requests sent to each server during scanning. The total number will be divided equally across the server pool members. A WVS exceptions configuration can exempt specific URLs from being scanned based on a regular expression pattern.
FortiADC 6.2 Study Guide
203
Security
DO NOT REPRINT © FORTINET
WVS tasks define the profile that will be used and the schedule for scanning. If targeted server pools contain real servers that have failed health checks, those servers will still be scanned. Reports are generated when a scan completes. A maximum of 50 tasks can be defined. WVS tasks do not support HTTP/2 or IPv6.
FortiADC 6.2 Study Guide
204
Security
DO NOT REPRINT © FORTINET
Scan result details are reported on the WVS Scan History page. Each report can be downloaded, deleted, previewed, or have a policy generated from the results.
FortiADC 6.2 Study Guide
205
Security
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
206
Security
DO NOT REPRINT © FORTINET
Good job! You now understand the WAF. Now, you will learn about network security.
FortiADC 6.2 Study Guide
207
Security
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in network security, you will be able to ensure that the various security features of FortiADC are correctly configured to help protect your network.
FortiADC 6.2 Study Guide
208
Security
DO NOT REPRINT © FORTINET
The best approach to sound security is a layered approach. The first layer is made up of firewall policies. A firewall policy is a set of rules that are applied to traffic that passes through FortiADC and defines whether a new client connection is allowed. By default, all new connections are accepted. Blocking or allowing traffic based on ports and IP addresses is your first line of defense when implementing security within your network. For example, if you don’t need to allow the use of the File Transfer Protocol (FTP), you can block the FTP port. You can create firewall policies for both IPv4 and IPv6 traffic for FortiADC. When a packet arrives at an interface, FortiADC analyzes the packet and checks its routing table to see where the packet should be sent. If it’s a routable packet, FortiADC searches the firewall policies for a match. To find a policy match, FortiADC checks the ingress and egress interfaces, source and destination IP addresses, and the service. After FortiADC finds a policy match, it applies the rules for the policy.
FortiADC 6.2 Study Guide
209
Security
DO NOT REPRINT © FORTINET
FortiADC firewall policies make use of system-shared resources such as firewall addresses and services. Addresses and services can be further aggregated into address groups and service groups, for ease of management. You configure IP address ranges and subnets for firewall addresses, and IP protocols and TCP/UDP port numbers for service objects.
FortiADC 6.2 Study Guide
210
Security
DO NOT REPRINT © FORTINET
To create a firewall policy in FortiADC, you must configure the inbound interface, outbound interface, source address, destination address, service, and action (which can be either accept or deny). You also have the option to specify the default action, which is the action to be taken by FortiADC for traffic that doesn’t match any of the firewall policies. By default, the action is Accept, but you can change it to Deny. FortiADC uses the first match for the traffic that it finds in the policy in a search from top to bottom. Because of the system resources required by the firewall function, overall FortiADC performance will be impacted. It is important to be aware of this when deciding to implement the firewall feature.
FortiADC 6.2 Study Guide
211
Security
DO NOT REPRINT © FORTINET
The connection limit table contains a set of rules that you can use to limit the number of concurrent connections. In the example shown on this slide, the number of concurrent connections is limited for each destination IP address and for each source IP address.
FortiADC 6.2 Study Guide
212
Security
DO NOT REPRINT © FORTINET
The IPS leverages signature-based detection and prevention, as defined in FortiADC IPS profiles. You associate IPS profiles with Layer 4 virtual servers. As traffic destined for the servers defined in the associated server pool arrives at the virtual server, it is inspected using the defined IPS signatures and IPS filters. There is a list of predefined profiles, configured for detection of threats against some of the most common services, such as email and web servers. You can rapidly apply IPS security using these predefined profiles.
FortiADC 6.2 Study Guide
213
Security
DO NOT REPRINT © FORTINET
You can create IPS profiles to defend against specific types of attacks. Individual signatures can be added, as well as filter-defined signatures. When using an IPS filter, all scans that match the filter criteria are included. For example, you could define a filter to select all signatures that detect attacks on Linux systems and Apache services.
FortiADC 6.2 Study Guide
214
Security
DO NOT REPRINT © FORTINET
FortiADC is the first ADC solution on the market with support for sandbox service integration. This means that FortiADC supports Security Fabric integration for advanced threat detection. The feature on FortiADC supports HTTP, HTTPS, and SMTP protocols. Web application file uploads that are cleared by the FortiADC antivirus scanner are then sent to FortiSandbox for further analysis. FortiADC first conducts some basic analysis by antivirus engine and then submits all suspicious files to FortiSandbox for further analysis. FortiSandbox will then drop or quarantine the malicious traffic and forward healthy traffic segments to the back-end servers. A log is generated whenever a file is uploaded to FortiSandbox.
FortiADC 6.2 Study Guide
215
Security
DO NOT REPRINT © FORTINET
Malware and advanced persistent threats (APT) can cause significant damage to the business of any organization. Malicious codes are commonly used to steal valuable data, gain unauthorized access to networks, or cause products to degrade. Using a suite of integrated security technologies, antivirus solutions provide protection against a variety of threats, including both known and unknown malicious codes (malware) and advanced targeted attacks (ATA). Integrated with the FortiOS antivirus engine, FortiADC provides an industry-class malware and APT detection and mitigation solution to our customers. This slide illustrates how the FortiADC antivirus module works: 1. Automatically updates the latest attack signatures from FortiGuard to ensure real-time protection. 2. Submits all files, including suspicious files, to an on-premises device (FortiSandbox) or cloud-based service (FortiCloud Sandbox) for further analysis, after performing basic antivirus processing. 3. FortiSandbox or the cloud-based service drops or quarantines malicious files and forwards healthy files to the back-end servers.
FortiADC 6.2 Study Guide
216
Security
DO NOT REPRINT © FORTINET
You must configure antivirus profiles to use the antivirus service module. You can create antivirus profiles either on the GUI or the CLI. After you create antivirus profiles, you can include them when creating advanced virtual server profiles that use the HTTP or HTTPS protocol.
FortiADC 6.2 Study Guide
217
Security
DO NOT REPRINT © FORTINET
The quarantined daemon manages the infected or suspicious files. This is a multi-process daemon, which receives quarantine requests from the antivirus daemon and then processes the requests in child processes. It can work in tandem with remote devices to complement the antivirus service, such as sending suspicious files to FortiSandbox for deeper inspection or uploading the archive package onto FortiCloud. In addition, it also manages the use of the storage space, listing the quarantined files, deleting expired files, overriding old files, or dropping new files when there is not enough storage space available.
FortiADC 6.2 Study Guide
218
Security
DO NOT REPRINT © FORTINET
The FortiADC antivirus service relies on the system's antivirus engine and signature databases. The antivirus engine is upgraded whenever new functions are added. The updated daemon is responsible for updating the antivirus engine and the signature databases. The system offers three types of antivirus signature databases: normal, extended, and extreme. • Normal: Includes “In the Wild” viruses and most commonly seen viruses. • Extended: Includes “In the Wild” viruses and a large collection of zoo viruses that are no longer seen in recent virus studies. • Extreme: Includes “in the Wild” viruses and all known zoo viruses that are no longer seen in recent virus studies. In order for FortiADC to provide you with the level of antivirus service that you desire, you must choose the appropriate signature database.
FortiADC 6.2 Study Guide
219
Security
DO NOT REPRINT © FORTINET
FortiGuard IP Reputation is another feature for FortiADC that can prevent malicious connections to your servers. FortiGuard is a worldwide distributed server network that provides, among many other services, an up-to-date list of IP addresses that could threaten your network. You must purchase a subscription to use the FortiGuard IP Reputation service.
FortiADC 6.2 Study Guide
220
Security
DO NOT REPRINT © FORTINET
Using FortiGuard IP Reputation, you can configure FortiADC to periodically download the latest list of blacklisted IP addresses from FortiGuard. If FortiADC does not have internet access, you can download the list from FortiGuard and upload it manually to FortiADC.
FortiADC 6.2 Study Guide
221
Security
DO NOT REPRINT © FORTINET
After you enable FortiGuard IP Reputation, FortiADC blocks any traffic coming from an IP address that has a poor reputation or has been blacklisted by the FortiGuard IP Reputation list. Alternatively, in the case of HTTP and HTTPS, FortiADC can redirect users to a different URL.
FortiADC 6.2 Study Guide
222
Security
DO NOT REPRINT © FORTINET
The Geo IP database is a FortiGuard security service that maps IP addresses to countries, satellite providers, and anonymous proxies. Similar to the FortiGuard IP Reputation database, the Geo IP database is updated periodically. The Geo IP service allows FortiADC to respond in one of four ways to a request from an IP address that is on the block list: • Pass the packet along. • Deny and drop the packet. • Redirect the packet to another destination. • Respond to the packet with an error message of “403 Forbidden”.
FortiADC 6.2 Study Guide
223
Security
DO NOT REPRINT © FORTINET
This slide shows the Geo IP Protection configuration screen. You can create up to 256 Geo IP policy objects. Each object can contain up to 256 distinct countries.
FortiADC 6.2 Study Guide
224
Security
DO NOT REPRINT © FORTINET
You can configure exceptions to Geo IP Policies by adding entries to the Geo IP allowlist, which is based on the IP subnet.
FortiADC 6.2 Study Guide
225
Security
DO NOT REPRINT © FORTINET
In the example shown on this slide, you can see Geo IP at work in the GEO security logs, where source IP addresses can be mapped to their country of origin. In this example, because they are private IP addresses, the countries show as Reserved.
FortiADC 6.2 Study Guide
226
Security
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
227
Security
DO NOT REPRINT © FORTINET
Good job! You now understand network security. Now, you will learn about DoS protection.
FortiADC 6.2 Study Guide
228
Security
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in denial of service (DoS) protection options, you will be able to ensure that FortiADC are correctly configured to help protect your network and applications.
FortiADC 6.2 Study Guide
229
Security
DO NOT REPRINT © FORTINET
Attackers use denial of service attacks to overwhelm systems or networks to the point that the supplied services become unavailable to legitimate users. These types of attacks can be orchestrated across many different systems, and these systems work in parallel to achieve the attacker’s goal. This is known as a distributed denial of service attack (DDoS) because the source of the attack has been distributed across multiple systems. DoS and DDoS attacks generally use the following methods to overwhelm, or flood, an application server: Buffer overflow: The method attempts to send more traffic to a server than it has been designed to handle, ultimately overflowing defined buffers and slowing or crashing the system. • ICMP flood: This method attempts to generate a ping flood by hitting a system with large numbers of ICMP packets, without waiting for replies. • SYN flood: This method rapidly initiates connections to the server by sending a SYN (synchronize) message but never finishes the handshake, leaving ports on the server waiting for a response and ultimately exhausting available ports. A successful DoS or DDoS attack will result in legitimate users being unable to access the resources.
FortiADC 6.2 Study Guide
230
Security
DO NOT REPRINT © FORTINET
FortiADC defends against DoS attacks by attaching a DoS protection profile to the virtual server. The DoS protection profile contains application protections such as HTTP access limits and/or networking protections such as TCP connection access flood protection.
FortiADC 6.2 Study Guide
231
Security
DO NOT REPRINT © FORTINET
The application protection policy options are: • HTTP Access Limit: This policy limits the speed of HTTP requests from a source IP address. • HTTP Connection Flood: This policy limits HTTP connections based on a cookie. • HTTP Request Flood: This policy limits the speed of HTTP requests based on a cookie. The networking protection policy options are: • TCP Slow Data Flood Protection: This type of attack sends legitimate application layer requests, but reads the responses very slowly. This can consume valuable system resources on the application server. This policy can detect and disable the connections. • TCP Connection Access Flood Protection: This policy limits the number of TCP requests from a certain IP address. Actions can be performed on policy matches for both application and networking policies.
FortiADC 6.2 Study Guide
232
Security
DO NOT REPRINT © FORTINET
An IP fragmentation DDoS attack uses standardized fragmentation settings to send a data gram so large that buffers are overrun on your router as it attempts to buffer all the data gram fragments for reassembly. You can configure FortiADC to stop fragment reassembly when a designated maximum memory size is reached. When the designated minimum memory threshold is reached FortiADC will resume fragmentation reassembly. A timeout setting defines when FortiADC will drop all packets in a fragmentation queue.
FortiADC 6.2 Study Guide
233
Security
DO NOT REPRINT © FORTINET
FortiADC offers a mechanism to protect your servers against SYN flood attacks. In many servers, the information about each TCP connection is stored in the TCB that is a part of the memory in the server. During a SYN flood attack, an attacker sends a large amount of SYN packets from spoofed IP addresses to the server. An entry is created in the TCB each time a SYN packet arrives to store the information contained in the SYN packet fields. A SYN flood attack is effective when it exhausts the available memory in the TCB. After the TCB table is exhausted, legitimate users can’t connect to the server.
FortiADC 6.2 Study Guide
234
Security
DO NOT REPRINT © FORTINET
To protect the servers from SYN flood attacks, FortiADC offers a feature called SYN cookie protection. Here’s how it works. FortiADC sends a SYN/acknowledge with a cookie value in the TCP sequence field for each packet that it receives, and then it waits for the acknowledge packet. If it receives an acknowledge packet containing the right cookie, the device proxies the TCP connection to the server. Consequently, SYN packets from an attacker never arrive at the server. The SYN packets go to the server after FortiADC confirms the sender is a legitimate user.
FortiADC 6.2 Study Guide
235
Security
DO NOT REPRINT © FORTINET
Finally, you assign a DoS protection profile to a virtual server on the virtual server security tab.
FortiADC 6.2 Study Guide
236
Security
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
237
Security
DO NOT REPRINT © FORTINET
Good job! You now understand DoS protection. Now, you will learn about user authentication.
FortiADC 6.2 Study Guide
238
Security
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in user authentication, you will be able to set up authentication policies on your FortiADC.
FortiADC 6.2 Study Guide
239
Security
DO NOT REPRINT © FORTINET
FortiADC allows you to set conditions for authentication and identify the user group that can access a resource controlled by FortiADC. This slide shows the client-server communications authentication process. The prerequisites for the authentication process are as follows: • The virtual server must be Layer 2 or Layer 7. • The profile type must be HTTP or HTTPS. • The once-only profile option must be disabled. If the prerequisites are met, the authentication process occurs as follows: 1. The client sends an HTTP request to FortiADC for a URL belonging to a FortiADC virtual server that has an authorization policy, in this case www.example.com. 2. FortiADC replies to the client with an HTTP 401 message to request authorization. On the client device, the user may be prompted to enter credentials. 3. The client reply is sent, which includes an authorization header that passes the credentials to FortiADC. 4. FortiADC sends a request to the server, whether local, LDAP, or RADIUS, in order to authenticate the user. 5. The authentication server sends its response to FortiADC, which can be cached according to your user group configuration. 6. If authentication is successful, FortiADC continues to process the traffic and forwards the request to the real server. 7. The real server responds with an HTTP 200 OK message. 8. FortiADC processes the traffic and forwards the server response to the client.
FortiADC 6.2 Study Guide
240
Security
DO NOT REPRINT © FORTINET
User accounts for authentication can be created as local FortiADC users, or the authentication can be performed against a backend authentication server. Local user accounts are created in the Local User view and integration with remote authentication services is performed in the Remote Server view.
FortiADC 6.2 Study Guide
241
Security
DO NOT REPRINT © FORTINET
User groups are created to organize users for the purpose of authentication. Users, both local and remote are added to FortiADC user groups. Finally, these user groups are used in the creation of authentication policies that control access to the application servers.
FortiADC 6.2 Study Guide
242
Security
DO NOT REPRINT © FORTINET
You create authentication policies in the Authentication Policy view. To maintain granular control of user authentication, you can create multiple policies, and define multiple members.
FortiADC 6.2 Study Guide
243
Security
DO NOT REPRINT © FORTINET
After you create the authentication policy, you can select it in the settings for the virtual server, in the Auth Policy drop-down menu.
FortiADC 6.2 Study Guide
244
Security
DO NOT REPRINT © FORTINET
FortiADC supports the use of two-factor authentication with FortiToken Cloud to provide added security for application server access.
FortiADC 6.2 Study Guide
245
Security
DO NOT REPRINT © FORTINET
Security assertion markup language (SAML) allows for the exchange of security information between online business entities. It is the most commonly used protocol for providing Web SSO. FortiADC provides support for service provider (SP) and identity provider (IDP) metadata, as well as a single sign-on experience for virtual server resources. When configured as a SP FortiADC will support the following IDPs: • FortiAuthenticator • Shibboleth • OpenAM/OpenSSo
FortiADC 6.2 Study Guide
246
Security
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
247
Security
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
248
Security
DO NOT REPRINT © FORTINET
This slide shows the objectives that you covered in this lesson. By mastering security concepts, you will be able to ensure the FortiADC and your network are effectively protected from a variety of threats.
FortiADC 6.2 Study Guide
249
Advanced Configurations
DO NOT REPRINT © FORTINET
In this lesson, you will learn about FortiADC advanced configuration options.
FortiADC 6.2 Study Guide
250
Advanced Configurations
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
251
Advanced Configurations
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in these configuration tasks, you will be able to understand the key benefits and use cases for FortiADC VDOMs.
FortiADC 6.2 Study Guide
252
Advanced Configurations
DO NOT REPRINT © FORTINET
VDOMs allow you to split a single physical FortiADC device into multiple virtual FortiADC devices. VDOMs allow FortiADC to support multi-tenant deployments. A VDOM is a complete FortiADC instance that runs on the FortiADC platform (physical device or VM). Each VDOM has its own interfaces and routing tables that are completely independent from other VDOMs. When you create a VDOM, an administrator account is assigned to the VDOM. In this way, each VDOM can be controlled by a different administrator. VDOM administrators must log in to the GUI by connecting to an interface assigned to their VDOM that has administrative access configured.
FortiADC 6.2 Study Guide
253
Advanced Configurations
DO NOT REPRINT © FORTINET
When you enable VDOMs, the GUI divides settings into two groups: •
Global settings are settings that affect FortiADC and all VDOMs, such as hostname, SNMP, system time, HA, and certificates. You assign physical interfaces and administrative accounts to VDOMs from the Global menus.
•
The settings of each VDOM are unique, so each VDOM has its own static routes, firewall policies, and load balancing objects.
FortiADC 6.2 Study Guide
254
Advanced Configurations
DO NOT REPRINT © FORTINET
You enable VDOMs from the FortiADC Settings view. Once enabled, a drop-down list will be displayed providing access to global settings or VDOM-specific settings. Initially, a single root VDOM is created. The root VDOM cannot be deleted or renamed, and all self-generated management traffic will come from the root VDOM. This includes FortiGuard communications, SNMP, email, and so on. A new menu option, Virtual Domain, will appear in the FortiADC System menu.
FortiADC 6.2 Study Guide
255
Advanced Configurations
DO NOT REPRINT © FORTINET
The Virtual Domain view is where you add and manage virtual domains. Dynamic and Static resources can be modified for each VDOM individually. After you log in to a VDOM, the VDOM’s name is displayed at the top of the GUI. As additional VDOMs are created, they will appear in the drop-down list with the original root VDOM. You access and manage VDOM settings by selecting the VDOM in the drop-down list.
FortiADC 6.2 Study Guide
256
Advanced Configurations
DO NOT REPRINT © FORTINET
To review, each VDOM behaves like it is on a separate FortiGate device. With separate FortiADC devices, you would normally connect a network cable and configure routing and policies between them. A more efficient means of passing traffic between VDOMs is to use inter-VDOM links. An inter-VDOM link is a pair of connected virtual interfaces that routes traffic between VDOMs. This removes the need to loop a physical cable between two VDOMs.
FortiADC 6.2 Study Guide
257
Advanced Configurations
DO NOT REPRINT © FORTINET
VDOM links are created in the Global settings with the creation of a virtual interface in each of the VDOMs that will form the two ends of the link. In the example shown on this slide, the virtual interface for the acme-co VDOM will have an IP address of 192.168.80.1 and the abc-inc VDOM interface will have an IP address of 192.168.80.2. The administrator of the acme-co VDOM could then create a route defining the default gateway for traffic destined for abc-inc to be 192.168.80.2.
FortiADC 6.2 Study Guide
258
Advanced Configurations
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
259
Advanced Configurations
DO NOT REPRINT © FORTINET
Good job! You now understand virtual domains. Now, you will learn about high availability (HA).
FortiADC 6.2 Study Guide
260
Advanced Configurations
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in these configuration tasks, you will be able to implement FortiADC in your network, and configure two devices in an HA cluster to provide redundancy.
FortiADC 6.2 Study Guide
261
Advanced Configurations
DO NOT REPRINT © FORTINET
You can configure two FortiADC devices to form an HA cluster. The HA cluster maintains the availability of the service in case one of the FortiADC devices fails. Every cluster has a primary (or active) device that processes the traffic and handles IP addresses, while one or more secondary (or standby) devices monitor the status of the active device.
FortiADC 6.2 Study Guide
262
Advanced Configurations
DO NOT REPRINT © FORTINET
If a problem is detected with the active FortiADC, a standby FortiADC takes over as the active device and begins processing traffic and handling IP addresses. This event is known as a failover.
FortiADC 6.2 Study Guide
263
Advanced Configurations
DO NOT REPRINT © FORTINET
When the FortiADC devices are configured in HA active-passive mode, the active device handles all the traffic under normal circumstances. If something fails on the active device, the passive device becomes active and handles all the traffic instead. The example on this slide shows the HA active-passive mode deployment. Normally, the passive device doesn’t handle traffic; all traffic is handled by the active, whether for the client side or the server side. However, the passive device can always sync data from the active device, such as: • Incremental configuration changes • Layer 4 session/persistence table • Layer 7 persistence • Health-check status When there is something wrong with the current active device, for example, the monitored interfaces are down (in this case the monitored interfaces are usually directly connected to an ISP), or even if the physical device is failing, the passive device will become the new active device and handle all the traffic. HA active-passive mode is the most stable deployment mode, and you can deploy it on any platform. In this mode, the FortiADC interface is assigned a virtual mac address; once the HA peer takes over the active role, the new active FortiADC will inherit the virtual MAC address on the interfaces. This can reduce the traffic failing time, while failover is happening. Another benefit is that HA active-passive mode is compatible with the firewall’s MAC address binding.
FortiADC 6.2 Study Guide
264
Advanced Configurations
DO NOT REPRINT © FORTINET
In HA active-active mode, both the primary and secondary FortiADC devices are able to handle the traffic normally. There is one thing that should be noted: certain limitations exist. For incoming and outgoing traffic, it is useful to sync sessions between primary and secondary, but the FortiADC syncs only Layer 4 virtual server sessions. This has the following benefit: if the inbound/outbound traffic is different, this is no issue, as long as it is Layer 4 traffic, thanks to the syncing feature. The primary will accept the inbound traffic, then send it to the real servers; and because of the sync function, the secondary can handle the outbound traffic and send it back to the client. Although this traffic can be handled, it will decrease performance. Ideally, then, you should have a routing device between FortiADC and the real servers; this routing device must have the ability to send the return traffic to its original FortiADC devices. This is called reverse routing. For the Layer 7 virtual server, this does not matter; the traffic can be returned to itself natively, because the FortiADC establishes the session to the real servers by its own interface IP address—unless you enable source-address. The example on this slide shows that, if one of the monitored links is down, or the entire device fails, its HA peer can take over all the traffic.
FortiADC 6.2 Study Guide
265
Advanced Configurations
DO NOT REPRINT © FORTINET
The HA-VRRP mode, on the other hand, divides the resources into groups, so that you can create multiple VRRP groups, and then assign the public IP resources to those groups. In this way, you can enable another type of active-active mode called HA VRRP, instead of HA active-active. In this mode, every HA node has its own interface IP. The floating IP is a virtual IP address that works only on the active VRRP traffic group. In general, the connected devices or servers point the gateway to the floating IP of the VRRP group. If failover happens, the floating IP will work with the new VRRP primary; this makes sure that the floating IP is always online. This slide shows an example of HA-VRRP mode. Typically, you create two VRRP groups: for example, VRRP Group1 and VRRP Group2. FortiADC1 is the primary of VRRP Group1, and the secondary of VRRP Group2; while FortiADC2 is the secondary of VRRP Group1, and the primary of VRRP Group2. Then, you divide the real servers into these two groups. The servers in group1 point the default gateway to the VRRP Group1 floating IP, while the servers in group2 point the default gateway to the VRRP Group2 floating IP. Then, normally, FortiADC1 handles the traffic to VRRP Group1, and FortiADC2 handles the traffic to VRRP Group2. If one of the monitored links or devices is down, the HA peer can take over the traffic.
FortiADC 6.2 Study Guide
266
Advanced Configurations
DO NOT REPRINT © FORTINET
This slide shows the requirements for configuring FortiADC devices in an HA cluster. Both FortiADC devices must be the same hardware model and have the same firmware. Each FortiADC must be licensed. If you use FortiADC-VM, the licenses must be paid; trial licenses won’t function. You must connect the equivalent interfaces in both devices to the same LAN segments. For example, on both the active and passive devices, you must connect port2 to the same LAN segment that faces the server pool. Also, you must connect at least one physical port on each FortiADC to its peer for heartbeat and configuration synchronization traffic. You can do this using a crossover cable or a switch and normal patch cables. As a best practice, ensure no other data flows over the heartbeat interfaces. FortiADC-VM supports HA. However, if you do not want to use the native FortiADC HA, you can use your hypervisor or VM environment manager to install VMs over a hardware cluster to improve availability. For example, VMware clusters can use vMotion or VMware HA.
FortiADC 6.2 Study Guide
267
Advanced Configurations
DO NOT REPRINT © FORTINET
In an HA cluster, most of the configuration synchronizes with the passive device. However, some of the information doesn’t synchronize. For example, host names, SNMP system information, RAID settings, and HA settings don’t synchronize. Log messages and generated reports also don’t synchronize across the cluster.
FortiADC 6.2 Study Guide
268
Advanced Configurations
DO NOT REPRINT © FORTINET
In active-active HA deployments, where a cluster spreads out the workload over multiple FortiADC devices simultaneously, you can synchronize persistence tables and session information across the members of the cluster. You can synchronize Layer 7 and Layer 4 persistence tables, as well as Layer 4 TCP connection states, across the cluster members. Note that enabling any of these synchronization options could impact the performance of the HA solution because it causes more data to flow across the heartbeat interfaces.
FortiADC 6.2 Study Guide
269
Advanced Configurations
DO NOT REPRINT © FORTINET
You can configure an HA cluster to monitor the physical and link status of one or more interfaces. Two events can trigger an HA failover: an interruption in the heartbeat, or a change in the status of one of the monitored interfaces. After a failover occurs, the new active device notifies the network with a GARP message to redirect traffic to its own interfaces.
FortiADC 6.2 Study Guide
270
Advanced Configurations
DO NOT REPRINT © FORTINET
How do you decide which device is the active device? The answer depends on whether device priority override is enabled or disabled. If override is disabled, the primary device is the device with, in order of importance, the most available monitored interfaces, the highest uptime value, the smallest device priority number, and finally, the highestsorting serial number. If override is enabled, the order is almost identical, except that the priority changes to the smallest device priority number over the highest uptime value.
FortiADC 6.2 Study Guide
271
Advanced Configurations
DO NOT REPRINT © FORTINET
This slide shows where you configure HA. The Group Name and Group ID must be the same for any two devices that are members of the same cluster. If you intend to locate two clusters within the same LAN segment, the clusters must have different names and group IDs. The members of both clusters must still share the same group name and group ID, but the group names and IDs must be different between the two clusters. You can enable the device priority Override option, which will elect a primary device by using the device priority value over the device uptime. You can also specify how frequently a heartbeat packet is sent and how many times FortiADC retries sending a heartbeat packet before FortiADC assumes the other member of the cluster is down.
FortiADC 6.2 Study Guide
272
Advanced Configurations
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
273
Advanced Configurations
DO NOT REPRINT © FORTINET
Good job! You now understand HA. Now, you will learn about scripting.
FortiADC 6.2 Study Guide
274
Advanced Configurations
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in the scripting capabilities of FortiADC, you will be able to configure scripts for use with your virtual servers.
FortiADC 6.2 Study Guide
275
Advanced Configurations
DO NOT REPRINT © FORTINET
You can leverage Lua scripts to perform tasks that are not available in the built-in feature set. Scripts are associated with virtual machines and are event driven. Scripts are triggered when the virtual server receives an HTTP request or response. For example, a script could be used to check a request URI and forward the user to different web pages. FortiADC includes a long list of pre-created scripts and commands that can be used or modified.
FortiADC 6.2 Study Guide
276
Advanced Configurations
DO NOT REPRINT © FORTINET
You can create scripts by directly adding the script in the script creation window, or by importing. When you create or import a script, FortiADC validates the script and will not allow a misconfigured script to be saved.
FortiADC 6.2 Study Guide
277
Advanced Configurations
DO NOT REPRINT © FORTINET
You assign the scripts in the general tab of the virtual server configuration. Scripts assigned to a virtual server will be run from lowest to highest priority. The priority can be assigned in the script, with the default being 500. Scripts with the same priority number are executed in the order they are listed in the Selected Items window.
FortiADC 6.2 Study Guide
278
Advanced Configurations
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
279
Advanced Configurations
DO NOT REPRINT © FORTINET
Good job! You now understand scripting. Now, you will learn about the REST API.
FortiADC 6.2 Study Guide
280
Advanced Configurations
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in using the REST API, you will be able to perform and automate administrative tasks through the API.
FortiADC 6.2 Study Guide
281
Advanced Configurations
DO NOT REPRINT © FORTINET
The REST application programming interface (API) allows you to create your own management tools or to integrate FortiADC management tasks with your existing application infrastructure. The FortiADC REST API allows you to integrate FortiADC with existing third-party management platforms such as CISCO ACI, VMware, OpenStack, and so on.
FortiADC 6.2 Study Guide
282
Advanced Configurations
DO NOT REPRINT © FORTINET
The REST API works by passing client HTTP requests to FortiADC in order to manipulate configurations. Only the JSON format is supported. Supported REST clients include: Postman Chrome app, Mozilla Firefox RESTClient, and Curl.
FortiADC 6.2 Study Guide
283
Advanced Configurations
DO NOT REPRINT © FORTINET
This slide shows the HTTP methods supported by the FortiADC REST API: • GET, which is used to retrieve a list of all resources or a specific resource • POST, which creates a new resource • PUT, which allows the update of an existing resource • DELETE, which deletes an existing resource The REST API provides powerful configuration, administration, and visibility capabilities, refer to the REST API guide for complete details.
FortiADC 6.2 Study Guide
284
Advanced Configurations
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
285
Advanced Configurations
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
286
Advanced Configurations
DO NOT REPRINT © FORTINET
This slide shows the objectives you covered in this lesson. By mastering the objectives covered in this lesson, you learned about FortiADC advanced configuration options.
FortiADC 6.2 Study Guide
287
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
In this lesson, you will learn about configuring FortiADC for logging and alerts, troubleshooting some common issues, and performing basic system maintenance.
FortiADC 6.2 Study Guide
288
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
In this lesson, you will learn about the topics shown on this slide.
FortiADC 6.2 Study Guide
289
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in logging and alerts, you will be able to configure local logging, remote logging, and alert emails. You will also be able to use the SNMP protocol to monitor FortiADC.
FortiADC 6.2 Study Guide
290
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
FortiADC can send logs to multiple destinations. FortiADC can store the logs in local RAM and on the local hard disk. FortiADC can also send logs to remote servers, such as a third-party syslog server, or a FortiAnalyzer.
FortiADC 6.2 Study Guide
291
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
FortiADC can generate four types of logs. Traffic logs provide traffic flow information for traffic served by FortiADC during load balancing. Security logs provide information about FortiADC security features, such as IP reputation, DoS events, the Geo IP block list, and so on. Script logs provide information relating to scripts used as part of server load balancing configurations. Event logs provide information about administrative actions or system events, such as device reboots or user logins.
FortiADC 6.2 Study Guide
292
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
For each logging destination a severity threshold is defined. Only logs equal to or exceeding the selected level are generated. There are eight different log severity levels on FortiADC. The highest, or most severe, is level 0, which is used for emergency events. The lowest, or least severe, is level 7, which is used for debug information events.
FortiADC 6.2 Study Guide
293
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
When you enable local logging, FortiADC stores the logs on the hard disk. If you disable local logging, logs are stored in the memory of the device. You also have to select what level of logs you want to store. When you enable logs, you can specify which event types you want to generate logs for.
FortiADC 6.2 Study Guide
294
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
You can also configure FortiADC to send logs to multiple FortiAnalyzer devices and third-party syslog servers. For each of the destinations, you must configure the types of logs that you are going to generate.
FortiADC 6.2 Study Guide
295
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
This slide shows a sample event log. All the logs include the date, the time that the log was generated, an ID, the type of log, the severity level, and a message that describes the event. You can select a filter from the drop-down list at the top of the screen and set a time frame to greatly narrow down the number of events displayed. In the example shown on this slide, the events displayed are limited to configuration events generated in the defined time range. The message indicates that the event is related to the administrator user making a change to a system interface.
FortiADC 6.2 Study Guide
296
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
FortiADC supports SNMP, so you can use this protocol to monitor the device. FortiADC supports versions 1, 2, and 3 of the SNMP protocol. FortiADC MIB files can be downloaded directly from the FortiADC device.
FortiADC 6.2 Study Guide
297
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
You can run FortiADC reports both on demand and as scheduled events. Reports are generated using predefined or user-created query sets. You can enable a scheduled interval or use the run report option for on-demand report generation. If you select the pdf option in the Email Format field, FortiADC sends the report as a PDF attachment to all addresses on the recipient list.
FortiADC 6.2 Study Guide
298
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
You can send reports as email attachments only if you configure an email server in the Services view of FortiADC. You create the email recipients list in the Report Email view.
FortiADC 6.2 Study Guide
299
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
After you generate a report, you can delete it, download it, or view it on the FortiADC GUI. FortiADC will format the report neatly with a cover page, table of contents, detailed tables and graphs, and present it in a PDF file format.
FortiADC 6.2 Study Guide
300
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
301
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
Good job! You now understand logging, SNMP, and reports. Now, you will learn about troubleshooting.
FortiADC 6.2 Study Guide
302
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in using CLI utilities, you will be able to use the diagnostic commands available on the CLI, and identify some of the most common issues.
FortiADC 6.2 Study Guide
303
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
The CLI offers three basic network utilities for troubleshooting. You can run a ping command using the command execute ping, you can run a traceroute using the command execute traceroute, or you can do an nslookup using the command execute nslookup name. These three commands will help you to troubleshoot networking problems or DNS problems.
FortiADC 6.2 Study Guide
304
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
One of the most useful troubleshooting tools in the CLI is the built-in sniffer. FortiADC has a built-in sniffer that you can use to sniff and capture all the traffic that’s crossing the device. To enable the sniffer, use the command diag sniffer packet then specify the interface name. To sniff the traffic on all interfaces, specify any, instead of a specific interface name. You must also specify a filter and a verbosity level. The verbosity level ranges from 1 to 6. The example on this slide shows what information is displayed for each verbosity level. Verbosity level 4 is often used to gain an understanding of how traffic flows because it shows the incoming interface and outbound interface and the IP headers only. Verbosity levels 3 and 6 are used to capture the whole packet, including the payload. The verbosity level 3 and 6 captures can be exported to a PCAP file using two scripts. You can analyze the file later, using Wireshark. The script file for converting data output to a PCAP file is available in the Fortinet Knowledge Base.
FortiADC 6.2 Study Guide
305
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
This slide shows three examples of how to use the sniffer. The examples shown use three different filters. In the first example, the diag sniffer command is capturing all the UDP packets on the internal interface whose source IP address or destination IP address is port 53. The filter supports using logic statements so you can build very complicated sniffs in order to try and narrow down the output. This is more important if you are supporting large networks with lots of traffic; otherwise, the output may be overwhelming.
FortiADC 6.2 Study Guide
306
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
FortiADC also features a GUI-based packet capture tool, as well as the traditional CLI commands. Before using this tool, you should have a good understanding of tcpdump and filter expressions. Capture results are collected in a PCAP format file, which you can download and open in any tool supporting PCAP format, such as Wireshark See tcpdump.org for more information on the tcpdump utility.
FortiADC 6.2 Study Guide
307
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
So, what are some of the most common issues that affect FortiADC? The most common problem is clients or customers being unable to connect to the server. When this occurs, the first thing that you should do is to use the FortiADC built-in sniffer to sniff the traffic and check that the traffic from the client is reaching the virtual server IP address. If the traffic is reaching the server, the next step is to check that a server is available in the pool. Then, you can check if the traffic is arriving at the server by running a sniffer on the server. Another step is to check the default gateway in the servers to be sure that the servers are pointing to the FortiADC device. Another common problem is a server being down because of a health check failure. You can use the sniffer to troubleshoot this problem by sniffing the health check traffic to see if FortiADC is sending that traffic to the server, if that traffic is arriving at the server, and where in the server the reply is coming from.
FortiADC 6.2 Study Guide
308
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
309
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
Good job! You now understand troubleshooting. Now, you will learn about system maintenance.
FortiADC 6.2 Study Guide
310
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
After completing this section, you should be able to achieve the objectives shown on this slide. By demonstrating competence in backing up and restoring system configuration files, and upgrading the FortiADC firmware, you will be able to perform these important system maintenance tasks in your environment.
FortiADC 6.2 Study Guide
311
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
You can back up and restore the FortiADC configuration from the Backup&Restore view. You can store the configuration files on the local PC performing the backup, or directly on FortiADC. An automatic back-up option allows for the scheduling of backups and for the automatic storage of the configuration files locally or on a network attached server.
FortiADC 6.2 Study Guide
312
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
This slide shows a screen shot of the Maintenance view where you perform upgrades or boot alternate firmware. Note that downgrading to a previous firmware version is possible, but could cause specific settings to reset to their factory default values. This is another reason to back up your configuration before upgrading or downgrading the device firmware. Be sure to read and follow the release notes before performing any upgrade or downgrade, to make sure you follow all necessary steps.
FortiADC 6.2 Study Guide
313
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
FortiADC 6.2 Study Guide
314
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
Congratulations! You have completed this lesson. Now, you will review the objectives that you covered in this lesson.
FortiADC 6.2 Study Guide
315
Monitoring, Troubleshooting, and System Maintenance
DO NOT REPRINT © FORTINET
This slide shows the objectives that you covered in this lesson. By mastering the objectives covered in this lesson, you learned how to monitor, troubleshoot, and maintain FortiADC.
FortiADC 6.2 Study Guide
316
DO NOT REPRINT © FORTINET
No part of this publication may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from Fortinet Inc., as stipulated by the United States Copyright Act of 1976. Copyright© 2021 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.