LAB 09 IPS and Application Control
LAB 09 IPS and Application Control
Sumário
Lab 4: Firewall Authentication .......................................................................... Erro! Indicador não definido.
Objectives ................................................................................................... Erro! Indicador não definido.
2
Lab 9: IPS and Application Control
In this lab, you will set up and monitor intrusion prevention system (IPS) profiles. Next, you will configure and
use application control in profile-based mode to apply an appropriate action to specific application traffic.
Finally, you will analyze the generated logs.
Objectives
• Protect your network against known attacks using IPS signatures
Time to Complete
Estimated: 40 minutes
3
Exercise 1: Blocking Known Exploits
In this exercise, you will configure and monitor IPS inspection on Local-FortiGate.
7. In the search bar, type medium, and then click SEV to select the medium-severity filter.
4
10. In the search bar, delete high, and then type critical.
12. In the search bar, delete critical, and then type Server.
15. In the search bar, delete Server, and then type Apache.
Because FortiGate adds all signatures that match the filters to the IPS sensor, you must
configure the filters as specifically as possible.
In this exercise, FortiGate protects an Apache server, and takes the default action for the
corresponding signatures.
5
Apply an IPS Sensor to a VIP Firewall Policy
You will apply the new IPS sensor to a firewall policy that allows external access to the web server running on
the Local-Client VM.
• Configure a new virtual IP to map the external IP address 10.200.1.200 to the internal
IP address 10.0.1.10, using port1 as the external interface. Name the virtual IP VIP-
WEB-SERVER.
• Create a new firewall policy to allow all inbound traffic to the virtual IP, and enable
the WEBSERVER IPS sensor. Name the firewall policy Web_Server_Access_IPS.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Generate Attacks From the Linux Server on page 1
To create a virtual IP
1. Continuing on the Local-Fortigate GUI, click Policy & Objects > Virtual IPs.
Field Value
Name VIP-WEB-SERVER
Interface port1
4. Click OK.
6
To configure a firewall policy
1. Continuing on the Local-FortiGate GUI, click Policy & Objects > Firewall Policy.
2. Click Create New, and then create a new firewall policy using the following settings:
Field Value
Name Web_Server_Access_IPS
Source all
Destination VIP-WEB-SERVER
Schedule always
Service ALL
Action ACCEPT
NAT disabled
3. In the Security Profiles section, enable IPS, and then in the IPS field, select WEBSERVER.
7
Using full SSL inspection would significantly increase the time required to
complete this lab. Therefore, for the purposes of this exercise, you will not
configure full SSL inspection.
5. Click OK.
8
Generate Attacks From the Linux Server
You will run a Perl script to generate attacks from the Linux server located in front of Local-FortiGate.
4. Leave the PuTTY session open (you can minimize it) so that traffic continues to generate.
Do not close the LINUX PuTTY session or traffic will stop generating.
2. Locate and review the relevant log entries for the detected and dropped attacks.
Are the signatures matching the product currently installed on the Local-Client VM? This
information is important to make a note of before you tune the WEBSERVER IPS sensor. If
the signatures do not apply to your product, is it really necessary to inspect those packets?
9
Troubleshoot IPS Activity
You will troubleshoot and monitor IPS activity.
If you then enter the diagnose test application ipsmonitor 1 command, the last line shows
the new bypass status of enable.
On the Local-FortiGate GUI, you can also verify in Log & Report > Security
Events > Intrusion Prevention that no new log entry is generated.
10
Because you have restarted the IPS engine, the corresponding process ID has changed and
the bypass mode resets to the disable status.
11
Exercise 2: Controlling Application Traffic
In this exercise, you will create a profile-based application control profile in flow-based inspection mode. Flow-
based and proxy-based inspection modes share identical configuration steps for application control.
You will also view the application control logs to confirm that FortiGate identifies applications. Then, you will
monitor the traffic that matches the application control profile.
There are 113 cloud-based application signatures available in the application control
signatures database that require deep inspection. This number of cloud-based application
signatures can vary.
The number beside the cloud icon in each category represents the number of cloud
application signatures in a specific category. The number of cloud applications increases as
new applications are added to this list.
4. In the Application and Filter Overrides section, click Create New to add a filter override.
5. On the Add New Override page, in the Type field, select Filter.
12
The Excessive-Bandwidth setting blocks many applications that are known to be bandwidth
intensive. Applications can belong to different categories, but they may be part of this
behavior filter if they are bandwidth intensive.
8. Click OK.
The configuration should look similar to the following image with the Action set to Block.
9. Click OK.
13
Apply the Application Control Profile to the Firewall Policy
Now that you have configured the application control profile, you will apply it to the firewall policy.
On the Local-FortiGate GUI, edit the existing Application_Control firewall policy and do the
following:
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Test the Application Control Profile on page 1.
1. Continuing on the Local-FortiGate GUI, click Policy & Objects > Firewall Policy.
3. In the Security Profiles section, enable Application Control, and then select default.
If the FortiGate self-signed, full-inspection certificate has not been imported into the
browser, end users see a certificate warning message. In this lab environment, the FortiGate
self-signed SSL inspection certificate has been imported into the browser.
6. Click OK to confirm.
14
Test the Application Control Profile
You will test the application control profile by going to the application that you blocked in the application
override configuration.
You should see that you cannot connect to this site—it times out.
2. Return to the Local-FortiGate GUI, and then click Security Profiles > Application Control.
4. In the Options section at the bottom of the page, enable Replacement Messages for HTTP-based
Applications.
5. Click OK.
6. On the Local-Client VM, open a new browser tab, and then go to the following URL: http://abc.go.com.
FortiGate should display a block message—it can take up to 2 minutes for the Application Blocked page to
appear because of the change in configuration.
If the Application Blocked page does not appear after 2 minutes, close all browser tabs,
and then restart the browser.
15
Configure Application Overrides
You will configure application overrides. The application overrides take precedence over filter overrides and
application categories.
• Add Application Overrides for the ABC.Com application signature, and set the
action to Allow.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Test Application Overrides on page 1.
4. On the Add New Override page, in the Type field, select Application.
8. Click OK.
9. Drag the ABC.Com application filter and place it above the Excessive-Bandwidth filter.
16
10. Click OK.
View Logs and Traffic Matching With the Application Control Profile
You will view the logs and traffic that matched the test you just performed.
To view logs
1. Return to the Local-FortiGate GUI, and then click Log & Report > Security Events.
3. Use the Application Name log filter, and then search for ABC.Com.
You will see log messages with the action set to block.
The details include application sensor name, application name, category, policy ID, and the action that
FortiGate took.
5. Click Log & Report > Forward Traffic, and then search and view the log information for ABC.Com.
You can see more details about the log, including translated IP address, bytes sent, bytes received, action, and
application.
17
2. Click the line including ABC.Com to select it, and then click Drill down.
3. Click Policies.
You now have the information (bytes, sessions, and policy ID) regarding the
traffic that matched the application ABC.Com.