Category: Education

Microsoft AZ-700: Connect Remote Resources by Using. Azure Virtual WANs

Reading Time: 2 minutes

Notes from MS Learn AZ-700 Module 2: Design and Implement Hybrid Networking – Unit 6: Connect Remote Resources by Using. Azure Virtual WANs

Organizations are exploring options enabling employees, partners, customers to connect to resources from anywhere. This often happens across national and regional boundaries as well as time zones. This is where Virtual WANs can help

  • What is Azure Virtual WAN
    • Networking services bringing networking, security, routing functionalities into a single interface
    • Some features
      • Branch Connectivity
        • Through connectivity automation from partner devices such as SD-WAN or VPN CPE)
      • Site-to-Site VPN Connectivity
      • Remote user VPN Connectivity (Point-to-Site)
      • Private Connectivity (ExpressRoute)
      • Intra-cloud Connectivity (transitive for VNets)
      • VPN ExpressRoute inter-connectivity
      • Routing, Azure FW, Encryption for private connectivity
    • Configuration for end-to-end virtual WAN requires
      • Virtual WAN
      • Hub
      • Hub VNet connection
      • Hub-to-Hub connection
      • Hub route table
  • Choose Virtual WAN SKU
    • virtualWAN resource is a virtual overlay of Azure network
    • Collection of many resources
    • Contains links to all virtual hubs desired within the virtual WAN
    • Isolated from each other
      • Cannot have a common hub
    • Virtual hubs in different virtual WANs don’t communicate
    • Two types: Basic and Standard (table below from MS Learn)
  • Hub Private Address Space
    • Virtual Hub is MS managed virtual network
    • Hub contains various service endpoints for connectivity
    • From on-prem (vpnsite) connect
      • To a VPN gateway inside virtual hub
      • ExpressRoute circuit to virtual hub
      • Mobile users to Point-to-Site gateway within virtual hub
    • Hub is core of network in region. Multiple hubs possible in same region
    • Min address space is /24
    • Anything /25-/32 kicks error during creation
    • No need to specify as Azure creates subnets in virtual hub for different gateways/services it needs
  • Gateway Scale
    • Hub gateway not the same as virtual network gateway used for ExpressRoute and VPN Gateway
    • Virtual WAN you don’t create Site-to-Site from on-prem direct to VNet
    • Create Site-to-Site to the hub
      • Traffic goes through hub gateway
    • In Virtual WAN VNets take advantage of easy scaling through virtual hub and virtual hub gateway
  • Connect Cross-Tenant VNets to a Virtual WAN Hub
    • Ability to use Virtual WAN to connect VNet to virtual hub in diff tenant
      • Useful if client workloads must be connected to same network but exist on diff tenants
    • Configuration but be already in place before cross-tenants VNet connectivy to Virtual WAN Hub
      • Virtual WAN and Virtual Hub in parent subscription
      • VNet in subscription of remote tenant
      • Non overlapping addr space in remote tenant and any other VNet connected to parent Virtual Hub
  • Virtual Hub Routing
    • Provided by a route managing all routing between gateways using BGP
    • Virtual Hub can contain multiple gateways
      • Site-to-Site VPN Gateway
      • ExpressRoute Gateway
      • Point-to-Site Gateway
      • Azure FW
    • Route also provides transit connecivity between VNets connected to a virtual HUB
      • Support an aggregate throughput of 50 Gbps
    • Capabilities apply to Standard Virtual WAN customers
    • MS Link to more configuration details on routing: https://learn.microsoft.com/en-us/azure/virtual-wan/how-to-virtual-hub-routing
  • Hub Route Table
    • Create a virtual Hub Route and apply to Virtual Hub Route Table
    • Can apply multiple route to table
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-connect-remote-resources-by-using-azure-virtual-wans/

Microsoft AZ-700: Connect Devices to Networks with Point-to-Site VPN Connections

Reading Time: 2 minutes

Notes from MS Learn AZ-700 Module 2: Design and Implement Hybrid Networking – Unit 5: Connect Devices to Networks with Point-to-Site VPN Connections

Point-to-Site (P2S) allows secure connection to VNet from an individual client. Connection started from client. Use for telecommuters or minimal amount of clients that need to connect.

  • Point-to-Site Protocols
    • OpenVPN
      • SSL/TLS based. Can penetrate firewall as most have TCP port 443 open outbound
      • Useful for:
        • Android
        • iOS 11 and up
        • Windows
        • Linux
        • Mac (macOS 10.13 and up)
    • Secure Socket Tunneling. Protocol (SSTP)
      • Proprietary TLS-based. Can penetrate most FW as TCP 443 based
      • Only supported on Windows
      • Azure supports all versions of Windows with SSTP (Windows 7 and up)
    • IKEv2
      • Standards based
      • Can be used for Macs (macOS 10.11 and up)
  • Point-to-Site Auth methods
    • Native Azure Certificate Auth
      • Client certificate on device used to auth user
      • Certificates generated from trusted root cert and installed on each client
      • Use root cert generated using Enterprise solution or generate self-signed cert
      • Validation of client cert happens during connection establishment
      • Root cert is required for validation, needs to be uploaded to Azure
    • Native MS Entra ID Auth
      • Native auth users connect using MS Entra ID Creds
      • Only supported for OpenVPN and Windows 10
      • Requires use of Azure VPN Client
      • Conditional access and MFA can be used
      • High Level Steps
        • Configure tenant
        • Enable auth on gateway
        • Download-Configure Azure VPN client
    • Auth using ADDS (Active Directory Domain Services)
      • Useful as it allows users to connect with Azure using org domain creds
      • Requires a RADIUS server (new or existing)
      • RADIUS Server on-prem or in Azure VNet
      • Azure VPN Gateway passes auth back and forth between RADIUS and connecting device
        • Gateway must have communication with RADIUS
        • If RADIUS on-prem a Site-to-Site VPN between Azure and on-prem required
      • RADIUS can integrate with certificate services
        • Integration means no need to upload root or revoked certs to Azure
      • RADIUS can also integrate with other external ID e.g. MFA
  • Configure Point-to-Site Clients
    • Utilize native Windows or Mac clients
      • Azure offers VPN client config zip with required settings
        • Zip provides values of some important settings on Azure side used to create own profile. Values:
          • VPN gateway address
          • Tunnel types
          • Routes
          • Root Cert
    • Windows
      • VPN config consists of installer package
      • Client must have admin rights on client device to initiate VPN to Azure
    • Mac
      • VPN config consists of mobileconfig file
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-connect-devices-to-networks-with-point-to-site-vpn-connections/

Microsoft AZ-700: Connect Networks with Site-to-Site VPN Connections

Reading Time: < 1 minute

Notes from MS Learn AZ-700 Module 2: Design and Implement Hybrid Networking – Unit 4: Connect Networks with Site-to-Site VPN Connections

Site-to-Site VPN Gateway Connection creates a secure connection to VNet from another VNet or physical network

Diagram from MS Learn

  • Info based on diagram
    • On-prem network has on prem services such as AD
    • Gateway sends encrypted traffic to virtual IP when using public connection
    • VNet contains cloud apps and VPN Gateway components
    • Azure VPN Gateway provides encrypted tunnel to on-prem
      • Virtual Network Gateway
      • Local Network Gateway
      • Connection
      • Gateway Subnet
    • Internal load balance handles routing cloud traffic to proper cloud app or resource
  • Benefits
    • Simplified config and maintenance
    • Secure encrypted data/traffic from on-prem and Azure gateways
    • Allow for future network requirements
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-connect-networks-with-site-to-site-vpn-connections/

Microsoft AZ-700: Exercise – Create and Configure a Virtual Network Gateway

Reading Time: 2 minutes

Notes from MS Learn AZ-700 Module 2: Introduction to Azure Virtual Networks – Unit 3: Exercise – Create and Configure a Virtual Network Gateway

Tasks (taken from MS Learn: Items without “Task” in front of them are personal additions)

  • Task 1: Create CoreServicesVnet and ManufacturingVnet
    • Open Azure PowerShell (button next to Azure Portage Search Bar)
    • Upload ARM Template and Parameters File (Upload/Download button in cloud shell menu bar)
      • Azuredeploy.json
      • Azuredeploy.parameters.json
      • View and set subscription
        • Az account show –output table
        • Az account set –subscription “Subscription Name”
      • Set new resource group variable
        • $RGName = “NewResourceGroupName”
        • New-AzResourceGroup -Name $RGName -Location “eastus” – Tag value1 -Force
      • Deploy ARM template for subnets and resources needed
        • New-AzResourceGroupDeployment – ResourceGroupName $RGName – TemplateFile armtemplatename.json -TemplateParameterFile armtemplatename.parameters.json
  • Task 2: Create CoreServicesTestVM
    • Upload ARM Template and Parameters File (Upload/Download button in cloud shell menu bar)
      • Azuredeploy.json
      • Azuredeploy.parameters.json
    • Deploy ARM template for subnets and resources needed
      • New-AzResourceGroupDeployment – ResourceGroupName $RGName – TemplateFile armtemplatename.json -TemplateParameterFile armtemplatename.parameters.json
  • Task 3: Create ManufacturingTestVM
    • Upload ARM Template and Parameters File (Upload/Download button in cloud shell menu bar)
      • Azuredeploy.json
      • Azuredeploy.parameters.json
    • Deploy ARM template for subnets and resources needed
      • New-AzResourceGroupDeployment – ResourceGroupName $RGName – TemplateFile armtemplatename.json -TemplateParameterFile armtemplatename.parameters.json
    • Verify VM Created
      • Search Virtual Machines in Azure Portal
      • Select Virtual Machines
  • Task 4: Connect to the Test VMs using RDP
    • Select VM and note Private IP
    • Return to VMs page
    • Select the second VM
      • Select Connect > RDP
      • Select Download RDP File
      • In right panel select Open File to connect to VM
      • Select Connect
        • Enter credentials
        • Select OK
  • Task 5: Test the connection between the VMs
    • Search for PowerShell on VM in RDP Session and open
    • Verify no connectivity to other VM
      • Test-NetConnection X.X.X.X (noted IP of other VM) -port 3389
      • Output should contain TcpTestSucceeded : False
      • Close RDP Session
  • Task 6: Create CoreServicesVnet Gateway
    • Search and Select Virtual Networks in Azure Portal
    • Select first VMs VNet
      • Under Settings select Subnets
        • Note ARM template created GatewaySubnet
    • Search and select Virtual Network Gateway in Azure Portal
      • Select Create
        • Enter Name
        • Select Region
        • Select SKU and Generation
        • Select Virtual Network
        • Enter Gateway subnet address range
        • Enter Public Ip address name
        • Enable or Disable active-active mode per desired deployment
        • Select Review and Create
        • Select Create
  • Task 7: Create ManufacturingVnet Gateway
    • ManufacturingVnet does not have a GatewaySubnet and will be created while creating the gateway
    • Navigate to virtual network gateways in Azure Portal
    • Select Create
  • Task 8: CoreServicesVnet to ManufacturingVnet
    • Navigate to Virtual Network Gateways in Azure Portal
    • Select the first VNet used earlier
      • Select Connections under settings
      • Select Add
        • Enter Name
        • Chose the Second Virtual Network Gateway
        • Enter PSK
        • Select OK
  • Task 9: Connect ManufacturingVnet to CoreServicesVnet
    • Navigate to Virtual Network Gateways in Azure Portal
    • Select the second VNet used earlier
    • Select Connections under settings
    • Select Add
      • Enter Name
      • Chose the Second Virtual Network Gateway
      • Enter PSK
      • Select OK
  • Task 10: Verify that the connections connect
    • Search for and select Connections in Azure Portal
    • Click Refresh
    • Both show Connected
  • Task 11: Test the connection between the VMs
    • Navigate to Virtual Machines in Azure Portal
    • Select Second VM created
      • Select Connect > RDP
      • Test connectivity in PowerShell
        • Test-NetConnection X.X.X.X (IP of first VM) -port 3389
        • Output should show TcpTestSucceeded : True
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-exercise-create-and-configure-a-virtual-network-gateway/

Microsoft AZ-700: Design and Implement Azure VPN Gateway

Reading Time: 6 minutes

Notes from MS Learn AZ-700 Module 2: Design and Implement Hybrid Networking – Unit 2: Design and Implement Azure VPN Gateway

VPN provides secure, encrypted connections across another network. Often eployed. To connect 2 or more trusted private networks over an untrusted network (e.g. Internet) One option for connecting on-prem networks to an Azure VNet is VPN. A VPN Gateway is used as an endpoint for incoming connections to Azure VNet

  • Azure VPN Gateways
    • Specific type of virtual network gateway used to Tx/Rx encrypted traffic between Azure and On-Prem Networks
    • Can also be used to connect separate VNets encrypting over the MS network backbone
    • Made up of 2 or more special VM’s deployed to a specific subnet called the “gateway subnet”
    • Can take some time to complete so proper planning is important
    • When creating a Virtual Network Gateway the gateway VMs are created and deployed to the gateway subnet
      • VMs then have setting to configure on the gateway
  • Plan a VPN Gateway
    • Architectures to consider
      • Point-to-Site over internet
      • Site-to-Site over internet
      • Site-to-Site over dedicated network (e.g. Azure ExpressRoute)
  • Planning Factors
    • Factors to cover during planning
      • Throughput
        • Mbps
        • Gbps
      • Backbone
        • Internet
        • Private
      • Availability of public IP Address
      • VPN device compatibility
      • Multiple client connections vs Site-to-Site link
      • VPN Gateway type
      • Azure VPN Gateway SKU
  • Gateway SKU’s and Generations (Table
    • When creating you select the SKU that meets your requirements (Table taken from MS Learn)
      • Workload
      • Throughput
      • Features
      • SLA’s
  • (*) Virtual WAN used if more than 30 Site-to-Site VPN tunnels required
  • Resizing on VpnGw SKU’s allowed in same Gen but not the Basic SKU
    • Basic SKU is legacy with feature limitations
    • To move from Basic to VpnGw SKU deletion of Basic and rebuild with other Generation and SKU size combo required
  • Connection limits are separate
    • E.g. can have 128 @@TP connections and 250 IKEv2 connections on a single VpnGw1 SKU
  • Single tunnel
    • Max of 1Gbps
    • Aggregate Throughput Benchmark on VPN Gateway is Site-to-Site + Point-to-Site
    • Multiple Point-to-Site connection can negatively impact Site-to-Site due to throughput limitations
    • Aggregate Throughput Benchmark isn’t guaranteed due to Inet traffic conditions and app behavior
  • VPN Gateway Types
    • When creating a Virtual Network Gateway for a VPN Gateway config type must be specified
    • VPN type depends on connection topology desired
    • For example of above
      •  Point-to-Site requires RouteBased VPN Type
    • VPN type selected must meet all connection requirements for desired solution
    • For example of above
      • Create a Site-to-Site VPN & Point-to-Site VPN gateway connections on same VNet use RouteBased
        • This is due to Point-to-Site requiring RouteBased VPN type
        • Would also require VPN device supports RouteBased VPN connections
    • PolicyBased type
      • Previously called “static routing gateways” in classic deployment model
      • Encrypt and direct packets through IPsec tunnels based on IPsec policies
      • Policy (traffic selector) defined as ACL in VPN device config
      • Value for PolicyBased VPN type is PolicyBased
      • Limitations
        • Support IKEv1 protocols and used with Basic Gateway SKU only
        • Only 1 tunnel can be used
        • Only use for Site-to-Site connections & only certain configs
        • Most VPN Gateway configs require RouteBased type
    • RouteBased
      • Previously called “Dynamec routing gateways” in classic deployment model (Table taken from MS Learn)
      • Table below (Table taken from MS Learn) applies to both Resource Manager and Classic deployment models
      • For classic model, PolicyBased VPN are the same as Static Gateways & Route-Based are the same as Dynamic Gateways
      •    
      • (*) No BGP in classic deployment model
  • Create VPN Gateway
    • VPN Settings chosen critical in successful connection
      • Name
      • Region
      • Gateway Type
        • VPN
        • ExpressRoute
      • VPN Type
        • Most are Route-Based for Point-toSite, Inter-virtual network, or multiple Site-to-Site
        • Route-based
          • Most are Route-Based for Point-toSite, Inter-virtual network, or multiple Site-to-Site
          • Also for ExpressRoute or if IKEv2 required
        • Policy-based
          • Only supports IKEv1
      • SKU
        • Affects number of tunnels
        • Can have the “aggregate throughput benchmark”
          • Based on multiple tunnels aggregated through single gateway – not guaranteed due to Inet traffic and app behavior
      • Generation
        • Gen 1 or 2
        • Cannot change generations or SKU’s across generations
        • Basic and VPNGw1 SKU only supported in Gen1
        • VpnGw4 and VpnGw5 SKU only in Gen2
      • Virtual Network
        • VNet able to Tx/Rx traffic through a virtual network gateway
        • Cannot associate with multiple gateways
      • Active-Active mode
        • Enabled
        • Disabled
      • BGP ASN
        • Enabled
        • Disabled
    • Gateway should appear as a connected device – can view IP address assigned to gateway
  • Gateway Subnet
    • Required for VPN. Gateways
    • Can create before you create the gateway
    • Contains IP addresses the VNet gateway VMs and Services use
    • Never deploy anything other than gateway VMs in this subnet
    • Must be named GatewaySubnet as it tells Azure which subnets to deploy virtual network gateway VMs and Services to
    • When creating gateway subnet specify the number of IP Addresses subnet contains
      • IP addresses are allocated to gateway VMs and Services
      • Some configs require more IP’s than others
    • Refer to documentation for desired configuration when planning gateway subnet size
      • E.g. ExpressRoute/VPN Gateway coexistant config requires a larger subnet than most other
    • Plan for possible future configurations
      • MS Learn recommendation – /27 or larger although the smallest is /29
  • Create Local Network Gateway
    • Local Network Gateway usually is the on-prem location
    • Settings
      • Give site a name that Azure can refer to
      • Specify IP address prefixes to route through VPN gateway to VPN devices
      • IP Address is the public IP of the local gateway
      • Address Space is 1 or more CIDR ranges defining local networks address space
      • If doing BGP-Enabled check the box
        • Min prefix declaration is the host address of BGP Peer IP on VPN device
  • Configure On-prem VPN Device
    • Reference validated list of standard VPN Devices Created  with Vendors such as
      • Cisco
      • Juniper
      • Barracuda
    • My latest search came back with the following Azure support site
    • When not listed contact manufacturer for support/configuration help
    • There may be pre-build configuration scripts available
    • Required
      • Shared Key
      • Public IP address of VPN gateway
  • Create VPN Connection
    • Once VPN Gateways created connection between them can be created
    • If VNets are in the same subscription you can use the portal
      • Under Add Connection
        • Name connection
        • Select Connection type – Site-to-Site
        • Enter the Pre-shared Key
  • Verify VPN Connection
    • Use either Portal or PowerShell
  • High Availability options
    • VPN Gateway Redundancy (Active-Standby)
      • Every Azure VPN Gateway has active-standby
      • Automatic failover for planned maintenance or unplanned outages
        • Brief interruption
      • For planned restoration usually in 10-15 seconds (site-to-site)
      • For unplanned restoration around 1-3 minutes (site-to-site)
      • Point-to-Site connections are disconnect and users need to reconnect
    • Multiple on-prem VPN devices
      • Requirements and Constraints
        • Need multiple Site-to-Site VPN connections from VPN devices to Azure created
          • When connecting multiple VPN devices from same on-prem to Azure one local network gateway required for each VPN device
          • One connection from Azure VPN Gateway to each local network gateway
        • Local Network Gateways corresponding to VPN devices must have unique public IP in the GatewayIpAddress property
        • BGP required
          • Each local network gateway reping a VPN device must have unique BGP peer IP specified in BgpPeerIpAddress property
          • Use BGP to advertise same prefixes of same on-prem network prefixes to Azure VPN Gateway – traffic forwarded through these tunnels at same time
        • Must use ECMP
        • Each connection counts against max number of tunnels for Azure VPN Gateway
          • 10 for Basic and Standard SKU’s
          • 30 for HighPerformance SKU
      • Stil active-standby but guards against failures/interruptions on on-prm network and VPN devices
    • Active-Active Azure VPN Gateway
      • Both Azure VPN Gateways create Site-to-Site tunnels to on prem VPN device
      • Each Azure gateway has unique public IP and establishes Ipsec/IKE Site-to-Site VPN tunnel to on-prem VPN device
      • Configure on-prem VPN device to accept 2 Site-to-Site VPN tunnels two the 2 Azure VPN Gateway public IP’s
      • Traffic from Azure VNet to on-prem network routed through both tunnels
      • For single TCP/UDP flow Azure attempts to use same tunnel
    • Combo of both
  • Dual-redundancy: active-active for both Azure and On-Prem Networks
    • Create and setup Azure VPN Gateway in active-active
    • Create two local network gateways and two connections for 2 on-prem VPN devices
    • Makes full mesh connectivity of 4 Ipsec tunnels between Azure VNet and on-prem network
    • All gateways and tunnels are active from Azure side so traffic spread across 4 tunnels
    • May result in better throughput
    • BGP required
  • Highly Available VNet-to-VNet
    • Follows same idea as Azure to on-prem active active
    • Only requires on connection for each gateway
    • BGP optional unless transit routing required
  • Troubleshoot Azure VPN Gateway Using Logs
    • Use of logs to troubleshoot such as
      • Configuration Activity
      • VPN Tunnel Connectivity
      • IPSec
      • BGP Route Exchanging
      • Point-to-Site Advanced Logging
    • Example Logs
      • GatewayDiagnosticLog
        • Configuration events, primary changes, maintenance events
      • TunnelDiagnosticLog
        • Tunnel state changes
        • Connect/Disconnect events summarized reasons if applicable
      • RouteDiagnosticLogs
        • Changes to Static and BGP routes
      • IKEDiagnosticLog
        • IKE control messages and events on gateway
      • P2SDiagnosticLog
        • Control messages and events on gateway
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-design-and-implement-azure-vpn-gateway/

FCA – FortiGate 7.4 Operator Self-Paced: Notes

Reading Time: 6 minutes

I didn’t take the greatest of notes for this free self-paced course (FCA – FortiGate 7.4 Operator Self-Paced) and free exam but I’ll share the shorthand notes that I did take down below:

  • Overview
    • NGFW
  • Antivirus
  • Web Filter
  • IPS
  • FortiOS
  • Security Processing Units (SPUs)
  • Models:
  • Fortigate VM
    • Entry Level – FG-80F, FWF-80F
    • Mid-range – FG-100F, FG-1000F, FG-4200F
    • High-end – FG-4800F, FG-7081F, FG-7121F, FG-5114C
  • Features:
    • Firewall Auth, local and remote
    • VPN
    • Security Scanning: antivirus, web filtering, app control
    • Monitoring and logging
    • Fortinet Security Fabric
    • FortiGuard Labs – threat intelligence and security research
    • Trusted machine learning and AI
    • Realtime thread intelligence
    • Threat hunting and outbreak alerts
  • Configuring Interfaces and Routing
    • Alias – name for ref
    • IP Address
    • Administrative Access (HTTPS, PING, SSH, ETC)
    • DHCP Servers
  • DHCP Server
    • Address Range
    • Mask
    • Default. Gateway
    • DNS Server (by default same as used by fortigate
  • Static Routing:
    • Default route to gateway for internet
    • Destination – Used to match incoming traffic to the correct route
    • Gateway – IP address Fortigate forwards traffic to
    • Interfaces – Interface FortiGate uses to forward traffic towards destination
    • Distance, Priority
    • Default Route – when no exact destination
  • Monitoring Static Routes:
    • Network > Static Route
  • Reasons may prevent route from being added to table:
  • Misconfigured route
  • Port associated with route is down or disabled
  • Better route to use for destination
  • To check routing tabled:
    • Dashboard > Network > Static and dynamic routing
  • Firewall Policies
    • Sets of rules to control whether traffic is accepted by FortiGate and how it processes it
  • Match based on:
    • Incoming and outgoing. Interfaces
    • Source: IP or User
    • Destination: IP or Internet Service
    • Service: Destination port
    • Schedule
  • Action:
    • Accept
    • Deny
  • IP Subnet:
    • Create a firewall address that corresponds to the IP subnet address
    • Can also create firewall address for a specific device
  • Source/Destination:
    • Default “ALL” option available for both source/dest to match all possible IP addresses
  • Internet Service:
    • Select from ISDB (Internet service database)
  • Policy Table:
    • Contains all rules. Top down
    • If no match default deny
    • Place most specific policy rules at top as it’s first match
  • Accepted Traffic:
    • Next is other features such as antivirus, web filtering
    • Applies NAT and logs based on policy settings
  • Inspection modes:
    • Flow based – examines file as passes through without buffering
    • Proxy based – buffers and examines as a whole – more thorough but slower due to buffering
  • Authenticating Network Users
    • Require users to authenticate to access network resources
  • Add source user or user group to policy
  • Methods:
    • Local password (individuals and groups)
      • Guest groups expire after time including auto generated accounts
    • Remote password authentication
    • Local Authentication Steps:
      • Create user account
      • Create user group
      • Add user group as source to policy
      • Verify and monitor
  • Remote Authentication Steps:
    • Connect FortiGate to remote server
    • Create user group and map remote auth users to group
    • Add group as source to policy
    • Verify and monitor
  • Inspect SSL Traffic
    • Certification Inspection:
      • Inspects the SSL/TLS Handshake
      • Verifies identity of web server
      • Used only with web filtering
      • Only used security feature is web filtering
      • Causes certificate warning only when fortigate displays an encrypted replacement message
  • Deep Inspection:
    • Like man-in-the-middle also causes certificate errors in browser
      • Decrypts incoming traffic to inspect
      • Re-encrypts to send if safe
      • Used with all types of security scanning
      • Can be used with things such as SMTPS, POP3s, IMAPS, FTPS
  • Preloaded SSL Inspection Profiles:
    • Certificate-inspection – read only profile
    • Deep-inspection – read only profile
    • No-inspection – read only profile
    • Deep-inspection
  • Edit custom-deep-inspection or Clone or Create your own profile
  • Certificate Warnings
    • Certificate warnings occur when fortigate encrypts traffic using self-signed certificate
  • Fortigate uses it’s own CA certificate to re-encrypt
  • To avoid
    • Download fortinet CA certificate and install into clients
    • Use CA certificate and install into browsers
  • Blocking Malware
    • FortiGuard Labs provides database of signatures
      • Schedules for updates
    • Antivirus Scan
      • Detects known malware – first fastest simplest – exact match in database
    • Grayware Scan
      • Detects unsolicited programs installed with user knowing or consent – uses fortiguard grayware signature
    • Machine Learning/AI Scan
      • Used to detect zero day attacks for new/unknown signatures
      • Logs by default but doesn’t block by default
  • Configure as part of Antivirus Profile
    • Block or monitor
    • Flow or proxy based
    • Configure in firewall policy after creating
  • Antivirus profile:
    • How windows exe are handled
    • Destination: fortisandbox, file quarantine, discard
    • Use FortiGuard Outbreak Prevention. Database
    • Use External Malware Block List
  • Configure Antivirus Protection
    • Create Antivirus Profile (or use default)
    • Enable Antivirus profile on FW policy
    • Verify configuration
    • Monitor via logs
  • Web Filtering
    • Limit access
    • Prevent Network Congestion
    • Limit exposure to harmful website
    • Limit liability
    • No inappropriate material
    • Fortiguard Categories
      • URL Categories Database
        • Enterprises
        • Schools
        • Personal
        • General Interest Personal Category
        • Bandwidth Consuming Category
  • Can be further devided
    • IE General Interest Personal can be broke down into
      • Social Networking
      • News
  • Allow
  • Block
  • Monitor
    • Allows but logs data (URL,DST,IP)
  • Warning
    • Informs users it’s block but gives option to continue or go back. Interval between warnings
  • Authenticate
    • Permits access if can authenticate
    • Customize interval of time to allow access (once authenticated covers entire category)
  • Configure:
    • Insure valid FortiGuard subscription license
    • Identify how FortiGuard categorizes website
    • Configure web filter security profile
    • Apply web silte profile to security profile
    • Test
  • IPS
    • Detect and block malicious activity by analyzing and blocking potential threats
  • IPS Enginer and Sensor
    • Sensor
      • Signature and Filters
      • Block malicious URLS
  • Engine
    • Protocol Decoders
      • Identify traffic that does not conform to. Protocol standards
    • Signatures
      • Entries in database that contains info about known threats
  • Daily updates
  • ^Log or block
  • Configuring:
    • Select IPS Sensor
    • Review or Edit filters for the sensor
    • Apply Sensor to FW Policy
  • Actions:
    • Default – use as received from FortiGuard updates
    • Allow
    • Monitor – allow but log
    • Block
    • Reset – reset session when signature triggered
    • Quarantine – Block, enable logging, quarantine attacker
  • Monitoring
    • Logs and Reports > Security. Events > Intrusion Prevention
  • Logs tab has full details
  • Best Practices
    • Verify IPS DB up to date
    • Consider using provided as template for custom
    • Consider using IPS inbound and outbound
    • Ensure SSL inspection is in place to check all traffic
    • Evaluate whether to tune IPS sensors
  • Protocol Decoders
    • Detect malformed packets
  • Controlling Application Access
    • Improve security and meet compliance standards in traffic flow of applications
  • Identify network traffic generated by specific applications
    • Monitor
    • Block
    • Traffic Shape
  • Fortiguard labs provides database
  • IPS engine used for flow-based inspection
  • Signatures
    • Monitor
    • Allow
    • Block
    • Quarantine
  • Application and Filter Overrides
    • Override allows a child signature to override it’s parent setting
      • E.g. Facebook = block, facebook chat = allow
  • Configuring:
    • Create Application Control Profile
    • Modify Action or configure app override
    • Add app control profile to FW policy
    • Verify
    • Monitor via logs
  • IPSEC VPN
    • Remote offices and Mobile workers
  • Features:
    • Data Authentication
    • Data Integrity
    • Data Confidentiality
    • Anti-Replay Protection
  • Remote Access VPN:
    • Client device to remote network – teleworkers
    • Client always initiates
    • Passwords and MFA (FortiClient and other vendors)
  • Site-to-Site VPN:
    • Branch to HQ
    • Branch to Branch
    • Either site can establish
    • Hub and spoke
    • Partial mesh
    • Full mesh
    • (Azure, AWS, etc)
  • IKE Protocol
    • Used to create dynamically
    • V1 and v2
    • V1:
      • Phase 1 and Phase 2 (still widely used)
        • Phase 1:
          • IKE Mode (main or aggressive
          • Auth
          • Encryption Alg
          • Hash  Alg
          • Diffie Helment Group
        • Phase 2:
          • Encryption Alg
          • Hash Alg
          • Diffie Helman. Group (Use PFS)
        • Configuring Phase 2:
          • Remote access – both subnets configured on server side
          • Site-to-site subnets on each peer must mirror
    • V2 includes improvements (Table is screenshot from Fortinet Course)
      • Recommended
      • Does not include 2 phases
      • Not compatible with v1
      • Reduced Latency
      • Better Reliablitliy
      • Support of EAP
      • Support of PPPK
      • Support of asymmetric auth
      • Support of strong security alg
      • Better resilience against DoS
      •  
  • Best Practices:
    • Ensure up to date firewalls
    • Use encryption levels that meet reqs
    • Verify both peers support same features
    • Ensure needed ports are open
    • Select proper mode when using IKEv1
  • IKE uses UDP 500 and UDP 4500 when behind NAT
  • Main mode is default for site-to-site
  • Aggressive mode is default for remote access
  • Configuring – has wizard with templates
  • Monitoring
  • SSL VPN
    • Use of common  protocol HTTP/HTTPS
    • Flexibility for client access
    • Granular access to resources
    • Integrity checks for Windows Clients
    • Cost Effective
  • Web Mode:
    • Web based access via portal
    • Reverse proxy
  • Tunnel Mode:
    • Full access
    • Requires FortiClient
  • Configuration:
    • Create Users and Groups or Remote. Auth servers
    • Review Edit Create SSL VPN Portals
      • Full-access
      • Tunnel-access
      • Web-access
      • Custom
    • Configure SSL VPN Settings
    • Create FW Policy to allow VPN traffic
  • Best Practices
    • Select appropriate SSL VPN mode
    • Reduce admin effort using remote auth servers
    • Use valid SSL cert
    • Use principle of least priv
    • Use client integrity check
    • If possible, do not allow connections from all locations
  • System Maintenance and Monitoring
    • Prevent security breaches
    • Optimize performance
    • Meet compliance
    • Ensure business continuity
  • Back up
  • Firmware upgrades
  • Monitor system performance
  • Examine licenese
  • Monitor event logs
  • System > FortiGuard
  • Licenses widget
  • Configuring Security Fabric
    • Integrated
    • Automated
    • Coordinated
      • Benefits:
        • Unified view of network
        • Object sync across devices
        • Security rating
        • Integration
        • Automatic detection of end devices
        • Centralized management
        • Automation
  • Implement
    • Requires 2 FortiGate min in NAT mode
    • One FortiAnalyzer or a cloud logging solution
  • Configuring:
    • Configure FortiAnalyzer or supported cloud logging
    • Configure FortiGate device acting as root
    • Configure downstream devices
    • Authorize downstream devices
Share this article:

Permanent link to this article: https://www.packetpilot.com/fca-fortigate-7-4-operator-self-paced-notes/

Microsoft AZ-700: Configure Internet Access with Azure Virtual NAT

Reading Time: 2 minutes

Notes from MS Learn AZ-700 Module 1: Introduction to Azure Virtual Networks – Unit 10: Configure Internet Access with Azure Virtual NAT

NAT came out of aa need for internal resources on private networks to gain access to external resource on a public network with public IPv4 addresses being in short supply. NAT is an alternative to a public IP for each internal resource and allows multiple resources to share a single public IP.

NAT provides mapping a single IP or range of IP (defined by prefixes) and ports. It is compatible with the Azure standard SKU for public IP address resources or public IP prefix resources (or both). Use a public IP prefix directly or distribute address from that prefix with multiple NAT gateway resources. NAT maps all traffic to the range of IP’s in that prefix. Flows are created outbound and inbound traffic is only allowed for an active flow.

Defined for each subnet within a VNet by specifying with NAT gateway resource to use. Once configured, UDP and TCP outbound flows from an VM will utilize NAT for internet connectivity with no further configuration needed. No need for user-define routes. NAT takes over other outbound and replaces the default Internet destination of the subnet

  • Support dynamic workloads y scaling NAT
    • No need for extensive preplanning or. Preallocation of addresses – NAT scales to support dymaic workloads
    • Using Port Network Address Translation (PNAT/PAT) allows up to 64000 concurrent flows for both UDP and TCP (each)
    • Supports up to 16 public IP addresses
  • Deploying NAT
    • Create regional or zonal (zone-isolated) NAT Gateway Resource
    • Assign IP addresses
    • Modify TCP idle timeout if needed (optional)
  • Coexistence of inbound and outbound
    • NAT compatible with following standard SKU resources
      • Load Balancer
      • Public IP Address
      • Public IP Prefix
    • NAT and the SKU’s aware of direction flow started – inbound and outbound can coexist
  • Limitations
    • Compatible with standard SKU Public IP, Public IP Prefix, Load Balancers but no basic SKU’s
    • IPv4 only with NAT. Can’t be on a subnet with an IPv6 prefix
    • Can’t span multiple VNets
    • IP fragmentation not supported
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-configure-internet-access-with-azure-virtual-nat/

Microsoft AZ-700: Implement Virtual Network Traffic Routing

Reading Time: 4 minutes

Notes from MS Learn AZ-700 Module 1:Introduction to Azure Virtual Networks – Unit 9: Implement Virtual Network Traffic Routing

Azure automatically creates route tables for each subnet in a VNet and adds system default routes. Override some Azure system routes with custom routes, add more custom routes to a table. Azure routes outbound based on the routes in the subnets route table

  • System Routes
    • Azure automatically creates system routes in each subnet in a VNet
    • You cannot create or remove system routes
    • Override with custom routes
  • Default Routes
    • Each route contains address prefix and next hop type
    • When VNet is created Azure creates the following default system routes for each subnet within a VNet (Table taken from MS Learn)
    • Next Hop Types
      • Virtual Network
        • Routes traffic between address ranges within address space of VNet
        • Created for each address range created within a VNet
        • Azure automatically routes traffic between subnets in a range
      • Internet
        • Routes traffic by address prefix to internet
        • Default 0.0.0.0/0 for anything that isn’t in a specific range or Azure servicce
          • Can override with custom routes
      • None
        • Traffic is dropped
        • Azure automatically creates default routes for RFC 1918 and RFC 6598 (100.64.0.0/10)
  • Optional Default Routes
    • Azure adds default system routes for Azure capabilities enabled. Optional default route to either specific subnets within VNet or all subnets in VNet.
    • Potential Azure added routes and types (table taken from MS Learn)
    • Next Hop Types
      • VNet Peering
        • When peering created between two VNets route added for each address range within the space of each VNet
      • Virtual Network Gateway
        • When virtual network gateway added to VNet Azure adds one or more routes of this type. Source is VNet Gateway because gateway adds route to the subnet
          • Limits to number of routes propagated to an Azure Virtual Network Gateway so summarize on prem routes to largest address ranges possible
      • VirtualNetworkServiceEndpoint
        • Azure adds public IP address for certain services when enabling a service endpoing to a service
        • Enabled for individual subnets within a VNet – only added to route table of subnet the service endedpoing is enabled for
        • Public address for Azure services change – Azure updates route table as needed
      • VNet Peering and VirtualNetworkServiceEndpoint next hop only added to subnet route table created through Azure Resource Manager deployment model – Not added to those created through classic deployment model
  • Custom Routes
    • Used to override default routes Azure creates using user-defined routes (UDR). Think when you want traffic to route through a FW
    • User-defined Routes
      • Custom (static) route to override Azure default system routes or add other routes to subnet route table
      • Subnet can have zero or one route table associated
      • When route table created and associated – combines with or overrides default routes Azure adds to subnet
      • Can specify next hop type when creating
        • Virtual Appliance
          • VM running a network app such as FW
          • When creating route with next hop type Virtual Appliance specify next hop IP
            • Private IP of NIC on VM
            • Private IP of Azure internal load balancer
        • Virtual Network Gateway
          • Specify when traffic desired to be destined for specific address prefix to route to a virtual network gateway
            • Virtual Network Gateway must be type VPN
        • None
          • Specify when dropping traffic to a prefix is desired
        • Virtual Network
          • Specify when overriding default routing in VNet is desired
        • Internet
          • Specify when traffic to a specific prefix is desired destined to Internet
  • Configuring User-Defined Routes
    • Create a Routing Table
      • Name
      • Subscription
      • Resource Group
      • Location
      • Optional – Decide to use Virtual Network Gateway Route Propagation
        • With this routes automatically added to route table for all subnets that it’s enabled
    • Create a Custom Route
      • Name
      • Destination Type
      • Destination IP Addresses/CIDR ranges
      • Next Hop Type
      • Next Hop Address
    • Associate Route Table
      • Select VNET
      • Select Subnet
  • Secure a VNet using forced tunneling
    • Redirect all Internet-bound traffic back to on-prem via Site-2-Site VPN
    • If not used Internet bound traffic travels of Azure direct to internet
    • Configured using Azure PowerShell – can’t be done via Azure Portal
    • Configuring forced tunneling
      • VNet Subnet has built-in system routing table with three groups of routes
        • Local VNet Routes
          • Direct to destination VM in same VNet
        • On-premises Routes
          • Route to Azure VPN gateway
        • Default Route
          • Direct to internet
  • Configure Azure Route Server
    • Azure Route Server for simplified dynamic routing between network virtual appliance (NVA) and VNet
    • Fully managed service with HA
    • Simplied configuration, management and deployment of NVA
      • No manual update to routing table on NVA needed when VNet addresses updated
      • No manual updates needed to User-Define Route when NVA announces new routes or removes routes
      • Peer multiple instance of NVA with Azure Route Server
      • Interface between NVA and Azure Route Server on common standard protocol – BGP
      • Deploy in any new or existing VNet
  • View Effective Routes in Azure Portal
    • Search for VM in Portal
    • Select VM
    • Select Networking in the settings
    • Select the NIC
    • Select Effective Routes under the “Support + Troubleshooting” section in the settings panel
  • View Effective. Routes using Azure PowerShell
    • In Azure Powershell
      • Get-AzEffectiveRouteTable `
        -NetworkInterfaceName myNic1 `
        -ResourceGroupName myRG `
  • Resolve Routing Issue
    • Sample steps you can take
      • Add customer route to override
      • Change/remove a custom route that may be problem
      • Verify route table associated to correct subnet (that contains the NIC)
      • Verify device operating as intended E.g. Azure VPN Gateway or NVA
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-implement-virtual-network-traffic-routing/

Microsoft AZ-700: Exercise – Connect Two Azure Virtual Networks Using Global Virtual Network Peering

Reading Time: 2 minutes

Notes from MS Learn AZ-700 Module 1: Introduction to Azure Virtual Networks – Unit 8: Exercise – Connect Two Azure Virtual Networks Using Global Virtual Network Peering

Tasks (taken from MS Learn: Items without “Task” in front of them are personal additions)

  • Task 1: Deploy the infrastructure.
    • Create VMs
      • Open Azure Cloud Powershell (button next to search bar in Azure Portal)
      • Upload template and parameters files (Upload/Download button in Powershell bar)
      • View account/subscription information and set variable
        • az account show –output table
        • az account set –subscription “AZ subscription name”
      • Set Resource Group Name variable
        • $RGName = “ResourceGroupName”
      • Deploy ARM template to create VM
        • New-AzResourceGroupDeployment -ResourceGroupName $RGName -TemplateFile TemplateFileName.json -TemplateParameterFile TemplateParamFileName.json
      • Close PowerShell
    • Verify VM creation
      • Search and Select Virtual Machines in Azure Portal
      • Verify VMs exist
  • Task 2: Use RDP to connect to the test virtual machines.
    • Select the Testvm and note Private IP address – close page
    • Select another VM and connect via RDP
      • Select connect in VM menu bar
      • Select RDP
        • Select Download RDP File on RDP page
        • In the right panel select Open File
        • Select connect
        • Enter Username and Password and select OK
  • Task 3: Test the connection between the virtual machines.
    • Open PowerShell
      • Search Button > PowerShell Select PowerShell
      • Verify lack of connectivity between VMs as no VNet peering exists yet
        • Test-NetConnection X.X.X.X -port 3389 (where x.x.x.x is note IP earlier)
        • Note failure with TimedOut
    • Minimize RDP session
  • Task 4: Create VNet peerings.
    • In Azure search Virtual Networks
    • Select Virtual Networks
    • Select the VNet
      • In left pane select Peerings
        • Select Add on Peerings menu
          • Add Peering link name
          • Add Peer link name under Remote virtual network
          • Select remote VNet from Virtual Network dropdown
          • Select Add
        • Select Refresh in Peerings menu
          • Peering status should say “Connected”
        • Close Peerings page
    • Select the peered to VNet
      • Select Peerings
        • Note the new peering listed
  • Task 5: Retest the connection between the virtual machines.
    • Navigate to the resource
      • On VMs page select Connect from the menu
      • Verify connectivity in PowerShell you left open
        • Test-NetConnection X.X.X.X -port 3389 (where x.x.x.x is note IP earlier)
        • Not connection Succeeded in output
          • TcpTestSucceeded : True
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-exercise-connect-two-azure-virtual-networks-using-global-virtual-network-peering/

Microsoft AZ-700: Enable Cross-Virtual Network Connectivity with Peering

Reading Time: 2 minutes

Notes from MS Learn AZ-700 Module 1: Introduction to Azure Virtual Networks – Unit 7: Enable Cross-Virtual Network Connectivity with Peering

VNet peering allows you to connect separate VNets in same Azure region (VNet Peering) or different regions (Global VNet Peering).

Traffic between peered is private and appears as one for connectivity purposes. Traffic between VMs in peered VNets use MS backbone infrastructure – no internet, gateways, encryption needed

  • Terms:
    • Regional VNet Peering – wihin same region
    • Global VNet Peering – VNets in difference regions peered
      • Can be in any Azure public cloud region
      • Can be in any China cloud region
      • CANNOT be in Government cloud region
        • Only VNets in same region peerable in Government cloud regions.
  • Benefits:
    • Low latency, high bandwidth connection between resource in different VNets
    • Ability for network security groups in either VNet for blocking purposes
    • Ability to transfer data between VNets in different subscriptions, MS Entra tenants, deployment models, and regions
    • Ability to peer VNets created using Azure Resource Manager
    • Ability to peer VNet created in Azure Resource Manager with one created through classic deployment model
    • No downtime to resource when creating peering or when peering creation is complete
  • Steps to configure VNet Peering:
    • Create 2 VNets
    • Peer VNets
    • Create VMs in each VNet
    • Test communication between VMs
  • Configuration done through the “Add peering” page. When peering is added on 1 VNet it is automatically added to second VNet
  • Gateway Transit and Connectivity
    • VNets are peered – Configure a VPN gateway in them as a transit point. In this case peered VNet uses remote gateway to access other resources.
    • VNet can have only one gateway. Gateway transit support for both VNet and Global VNet peerings
    • When. Gateway Transit allowed VNet can access resource outside of peering – examples
      • Site-2-Site VPN to on-prem
      • VNet-2-VNet connectivity to another VNet
      • Point-2-Site VPN to client
    • Allows peered VNets to share gateway for resource access
  • Service Chaining to direct traffic to gateway
    • Create user defined route directing traffic from one VNet to network virtual appliance in another
    • User defined routes point to VM in another VNet as next hop or a virtual network gateway
    • Can be utilized to create a hub and spoke topology
Share this article:

Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-enable-cross-virtual-network-connectivity-with-peering/

Load more