Security Profiles Flashcards

(39 cards)

1
Q

FortiGuard DNS lookups:

A

service.fortiguard.net: UDP and worldwide servers

securewf.fortiguard.net: HTTPS and worldwide server

usservice.fortiguard.net: UDP and USA-based-only servers

ussecurewf.fortiguard.net: HTTPS and USA-based-only servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How long does FGT wait for response from FortiGuard server before moving on to next one in the list?

A

2 Seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OCSP Stapling Check

A

Online Certificate Status Protocol - involved appending a time-stamped OSCP status of the server certificate.

This process guarantees that FGT can efficiently validate FDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pull Method Steps

A
  1. FGT contacts DNS server to resolve the name: update.fortiguard.net
  2. FGT gets a list of server IP addresses that it can contact
  3. FGT periodically connects to one of the servers to check for pending updates
  4. If there is an update, FGT downloads it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Persistent Connection Method Steps

A

Same first two steps as pull method

  1. FGT contacts DNS server to resolve the name: update.fortiguard.net
  2. FGT gets a list of server IP addresses that it can contact
  3. FGT forms persistent secure connection to FortiGuard
  4. FortiGuard notifies that there is a new update
  5. FGT forms a separate secure connection to download update.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command to list servers for web filtering and antispam queries

A

diagnose debug rating

The server list columns -

RTT - Round Trip Delay

TZ - Server Time Zone

Curr Lost - Consecutive requests sent with no reply

Total Lost - Historical requests sent with no reply, resets upon device reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FortiGuard Weight Calculation

A

FGT uses this to determine which server to send rating requests to:

FGT initially uses the delta between the server time zone and FGT system time zone, multiplied by 10. (To lower possibility of using a remote server, the weight is not allowed to drop below the initial weight.)

Weight increases with each packet lost

Weight decreases over time if there are no packets lost

FGT uses the server with the lowest wight as the one for rating queries. If two or more servers have the same weight, FGT uses the one with the lowest RTT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ports for FortiGuard traffic (Webfiltering/Antispam)

A

53 or 8888

Some ISP’s block traffic based on source port, can configure using:

config sys global
set ip-src-port-range 1031-4999
end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FortiGuard Flags

A

I - Initial: Server contacted for requesting contract information and updates

D - Default: IP addresses of servers received from DNS resolution

S - Serving: IP addresses of servers received from FortiManager

T - Timing: Actively timing this connection. Server remains in this state for 15 seconds (default) before being considered as failed

F - Failed: Server connection has failed. FGT pings every 15 minutes to check if server is active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T or F: When connecting through a web proxy, FGT can access FortiGuard without DNS resolution

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ports for AV and IPS

A

TCP 443

can also be configured to connect through web proxy:

config system autoupdate tunneling
set address (proxy address)
set password (password)
set port (proxy port)
set status (enable|disable)
set username (name)
end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

command to show summary of FortiGuard config on FGT

A

dianose autoupdate status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Difference between Automatic and manual updates (AV and IPS)

A

Automatic downloads portions of the database that changes since last update.

Manual downloads the whole database if a new version is available. (this can be useful is database is corrupted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Command to list FortiGuard database and engines installed

A

diagnose autoupdate versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Real-Time Debug command for AV and IPS

A

diagnose debug application update -1
diagnose debug enable

to force a manual update:
execute update-now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Life of a Packet: Ingress Stage

A

The packet arrives at the FGT

Bandwidth limit check

DoS check

RPF Check

IP header integrity check

Does traffic terminate at the FGT?

If yes, that means it is Inbound VPN, Web Proxy, DNS, or Admin Access. Traffic is then sent to the necessary daemon

If no, move onto second stage.

17
Q

Life of a Packet: Routing and Firewall Policy Stage

A

From Ingress:

Destination NAT

Route to destination? (No = dropped)

Allowed by firewall policy? (No = dropped)

Requires Authentication? (if auth fails = dropped)

if no auth needed or auth is success, identify traffic session helper

18
Q

Life of a Packet: Protection Profile Inspection Stage

A

From routing and firewall policy stage

Is SSL inspection required? If yes, then handle SSL.

Once SSL done or if not needed, profiles are checked in this order:

IPS , Application Control , VoIP , DLP , Antispam , Web Filtering , AV

19
Q

Life of a Packet: Egress

A

From protection profile stage

Traffic Shaping

Source NAT

Outbound IPsec?

If yes, encryption. Skip if not.

Egress

20
Q

Web filter Real Time Debug Command

A

diagnose debug urlfilter src-addr (source_IP)
diagnose debug application urlfilter -1
diagnose debug enable

21
Q

FortiGuard Web Filter Cache Dump command

A

diagnose webfilter fortiguard cache dump

displays FortiGuard Category in Hexadecimal

get web filter categories command to show category numbers in Decimal

22
Q

Command to check global settings for FortiGuard

A

get system fortiguard

23
Q

SSL Certificate Inspection Summary

A

Doesn’t decrypt the traffic, only inspecting the server digital certificates and SNI fields (because they are interchanged before encyption)

It first tries to extract the FQDN of the URL from the SNI (TLS extension) or the SSL certificate common name (CN)

24
Q

Full SSL Inspection Summary

A

Decrypts and re-encrypts the SSL traffic.

FGT requires a private key to decrypt and inspect SSL traffic: intercepts traffic coming from the server and re-signs it with its certificate and key

The certificate that FGT provides must be issued to the destination domain name

25
How to fix Certificate warning during Full SSL inspection:
Use the Fortinet_CA_SSLProxy certifiate, and install the FGT CA root certificate on all browsers or Generate a new SSL proxy certificate using a private CA, and install the respective root CA certificate on all browsers
26
Some clients have specific SSL requirements
Like Public Key Pinning (PKP) or HTTPS Strict Transport Security (HSTS) which are designed to detect Man-in-the-middle attacks. Full inspection can trigger this and cut off the SSL handshake. Have to exempt sites from full inspect or go back to certificate inspection
27
Antivirus Order of inspection
Virus Scan - Grayware Scan - Machine-learning detection
28
Anti-Virus Extended Database
Default Currently spreading virus plus recent viruses that are no longer active Available on all models
29
Anti-Virus Extreme Database
Includes the extended database, plus a large collection of zoo viruses Available on higher end models
30
Anti-virus inspection restrictions
SSL requires deep inspection Archives are examined to certain limits (max number of subdirectories and nested archives) Password-protected archives cannot be scanned
31
Learn Mode
config system settings set ngfw-mode policy-based end enhances file detection capabilities by using the scanunit robust file detection. Works by allowing all traffic and logging everything to gather security infromation. It generates a learning report using the info, and helps detect malicious files more accurately
32
IPS daemons
ipsengine handles inspection and detection tasks ipshelper handles actions whose results can be shared by different daemones, to reduce load. Also monitors config changes that impact IPS
33
IPS Fail Open
Triggered when one of these happens: IPS socket buffer is full and new packets can't be added for inspection or FGT is in conserve mode The action that IPS takes depends on config: config ips global set fail-open (enable|disable) ... end enable: passthrough without inspection disabled: new packets dropped
34
IPS fail open events can be seen in
crash logs and event logs can also see when IPS exits fail open mode
35
IPS and Identifying Protocols
For proxy based inspection: When you enable Any setting for a protocol, IPS engine inspects all destination ports to determine whether the traffic is truly that protocol This will create more CPU load and can affect how FGT processes traffic when fail open occurs
36
IPS and High CPU usage
Temporary Spikes are normal. Usually caused by config change. Continuous high usage by IPS engines might be caused by infinite loop in packet parsing FGT VMs with 8 or more vCPUs can use the extended database, which delivers better protection and performance. config ips global set database regular | extended set ips-reserve-cpu enable | disable
37
IPS application command flags
diagnose test application ipsmonitor ? Main ones are 2, 5, and 99 1: Display IPS engine information 2: Toggle IPS engine enable/disable status (sets whether traffic goes to IPS or not) 3: Display Restart Log 4: Clear Restart Log 5: Toggle Bypass Status 6: Submit Attack characteristics now 10: IPS queue length 11: Clear IPS queue length 12: IPS L7 socket stats 13: IPS session list 14:IPS NTurbo stats 15: IPSA stats 97: Start all IPS engines 98: Stop all IPS engines 99: Restart all IPS engines and monitor
38
False Positives
Use IP exemptions for temporary bypass Check IPS signature database is up to date Determine the signature triggering the false positive If everything seems correct, then submit sniffer samples to FortiGuard team (support.fortinet.com)
39
False Negatives
verify that: signature database is up to date traffic is hitting correct policy/IPS profile IPS using high CPU or mem? crashing? is signature action set correctly?