Firewall Authentication Flashcards

(23 cards)

1
Q

To monitor authenticated users:

A

Can see on the GUI after enabling the Firewall User monitor

On CLI, use diagnose firewall auth list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Session flag that states the used has been authenticated

A

authed

next to the may_dirty flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Real Time debug for Authentication:

A

diagnose debug application authd -1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three methods (or binds) that FGT can use to access LDAP:

A

simple

anonymous

and regular (most common, versatile, and complex)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four steps of Regular Bind Flow for LDAP

A
  1. Bind Request: FortiGate logs into (binds to) the LDAP server using an LDAP admin account. FortiGate only knows the username, but not where the branch is located.
  2. Search Request: FortiGate does a search query in the LDAP database to find the user’s location or DN. Once successful, Fortigate logs out of (unbinds from) the LDAP server
  3. Another bind request, but this time with the user credentials by sending the DN obtained from the previous step
  4. Bind Response success: Obtain user group information. Generally done by an LDAP query
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Commands to check what DN is correct on Active Directory Server:

A

dsquery user -name (full_user_name)
or
ds query user -samid (login_username)

Example:
dsquery user -samid jsmith
“cn=John Smith, cn=users, dc=california, dc=fortinet, dc=com

correct DN would be:
dc=californica,dc=fortinet, dc=com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Bind DN?

A

AKA the user DN. It is the full DN of the LDAP admin account.

can use the dsquery user commands and get the FULL DN with the admins username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Windows AD Regular Bing Config on FGT

A

Common Name identifier: CN (John Smith) or sAMAccountName (jsmith)

Distinguished Name is found by querying the user’s DN using commands on the server.

Username is the FULL DN from the query for admin on the server

Password is the password of the admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Test Command for LDAP

A

diagnose test authserver ldap (server_name) (user) (password)

can be run as soon as LDAP config is set up, even before adding and users or groups or auth policies to FGT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Real-time debug command for both LDAP and RADIUS

A

diagnose debug application fnbamd -1

FOR LDAP:
in the output, you can see message start_search_dn, which indicates FGT is performing step two of the Bind. Message Found DN followed by the user’s full DN means the LDAP server found the user.

Then you can see step three and four in the output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If problem with step 1 or 3 with LDAP process, you can

A

sniff the traffic.

diagnose sniffer packet any “port 389” 3

If bind fails, the LDAP server will return error code:
0x525 - user not found
0x52e - invalid credentials
0x530 - not permitted to logon at this time
0x531 - not permitted to logon from this workstation
0x532 -password expired
0x533 - account disabled
0x701 - account expired
0x773 - user must reset password
0x775 - account locked out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAP Real Time Debug message: No More DN left

A

means that LDAP server couldn’t find the user in the tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LDAP Real Time Debug message: Auth Denied

A

Either user creds are wrong or user account is not active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LDAP Real Time Debug message: get_member_of_groups-attr=(attribute name) - found 0 values

A

Means that a problem occurred in step four.

User creds are correct, but no user group information was found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RADIUS overview

A

Provides Authentication, Authorization, and Accounting (AAA) services

Begins with Access-Request and responses are:
Access-Accept
Access-Reject
Access-Challenge (if MFA is enabled)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Testing RADIUS command

A

diagnose test authserver radius (server_name) (scheme) (user) (password)

17
Q

Supported Schemes for RADIUS

A

chap, pap, mschap, and mschap2

18
Q

Result for RADIUS request in Real-Time Debug

A

0: Authentication Successful

1: Authentication failed

19
Q

Sniffing RADIUS Traffic

A

UDP port 1812 for authentication or port 1813 for accounting

diagnose sniffer packet any “port 1812” 3

Can capture various types of data such as:
user creds
RADIUS Attributes
Authentication requests, responses, and accounting information
Timing and frequency of authentication requests and responses

20
Q

SAML is supported for these features:

A

On FGT:
Admin Login
SSL VPN
Outbound Firewall Authentication
Proxy Policies
Wireless (captive portal)
IPsec VPN

21
Q

Checking SAML Metadata commands

A

diagnose vpn ssl saml-metadata

diagnose sys saml metadata

22
Q

SAML Real-Time Debug command

A

diagnose debug application samld -1

better used in combination with the feature that is using SAML:
sslvpnd
iked
cw-acd (wireless)
was (Proxy policies)

23
Q

Useful sections of Real-Time debug output for SAML:

A

SP Login Dump section: contains the client’s request based on information provided by the SP.

Assertion Dump: Provides the client authentication request to FGT acting as the SP based on information received from the IdP