- Right-click ‘My Computer’ on your desktop and select Manage
- Go to Device Manager
- Select Network Adapters
- Select and double click on the adapter for which you want to change MAC address
- You will find a properties window with multiple tab. Select Advance tab
- From Property, find Network Address
- Now select value and put your 12 digit hexadecimal number
- Press OK and exit.
Monday, December 23, 2013
Manually changing your MAC Computers Address
Wednesday, September 25, 2013
diagnose debug flow
FGT # diagnose debug flow filter daddr <dst_server_ip>
FGT # diagnose debug flow show console enable
FGT # diagnose debug enable
FGT # diagnose debug flow trace start 1000
id=36870 trace_id=400 msg="vd-root received a packet(proto=17, 192.168.3.20:1470-><dns_server_ip>:53) from to_client."
id=36870 trace_id=400 msg="allocate a new session-00002a55"
id=36870 trace_id=400 msg="find a route: gw-172.16.0.254 via to_server"
id=36870 trace_id=400 msg="find SNAT: IP-172.16.0.100, port-36150"
id=36870 trace_id=400 msg="Denied by end point ip filter check"
Once the test is complete, the debug outputs should be disabled by using the commands:
# diag debug flow trace stop
# diag debug reset
# diag debug disable
FGT # diagnose debug flow show console enable
FGT # diagnose debug enable
FGT # diagnose debug flow trace start 1000
id=36870 trace_id=400 msg="vd-root received a packet(proto=17, 192.168.3.20:1470-><dns_server_ip>:53) from to_client."
id=36870 trace_id=400 msg="allocate a new session-00002a55"
id=36870 trace_id=400 msg="find a route: gw-172.16.0.254 via to_server"
id=36870 trace_id=400 msg="find SNAT: IP-172.16.0.100, port-36150"
id=36870 trace_id=400 msg="Denied by end point ip filter check"
Once the test is complete, the debug outputs should be disabled by using the commands:
# diag debug flow trace stop
# diag debug reset
# diag debug disable
Wednesday, September 4, 2013
FortiOS 5 Advanced Email server Settings (Fortigate firewall) change SMTP port
FG300Cxxxxxxxx # get system email-server
type : custom
reply-to : irfan@abcd.com
server : smtp.abcd.com
port : 25
source-ip : 0.0.0.0
source-ip6 : ::
authenticate : enable
username : irfan.m@cisinlabs.com
password : *
security : none
-----------------------------------------------------------------------------------------
FG300Cxxxxxxxx # config system email-server
FG300Cxxxxxxxx (email-server) # set port 587
FG300Cxxxxxxxx (email-server) # end
type : custom
reply-to : irfan@abcd.com
server : smtp.abcd.com
port : 25
source-ip : 0.0.0.0
source-ip6 : ::
authenticate : enable
username : irfan.m@cisinlabs.com
password : *
security : none
-----------------------------------------------------------------------------------------
FG300Cxxxxxxxx # config system email-server
FG300Cxxxxxxxx (email-server) # set port 587
FG300Cxxxxxxxx (email-server) # end
FG300Cxxxxxxxx #
-------------------------------------------------------------------------------------------
FG300Cxxxxxxxx # get system email-server
type : custom
reply-to : irfan@abcd.com
server : smtp.abcd.com
port : 587
source-ip : 0.0.0.0
source-ip6 : ::
authenticate : enable
username : irfan.m@cisinlabs.com
password : *
security : none
type : custom
reply-to : irfan@abcd.com
server : smtp.abcd.com
port : 587
source-ip : 0.0.0.0
source-ip6 : ::
authenticate : enable
username : irfan.m@cisinlabs.com
password : *
security : none
Monday, May 13, 2013
Configuring MAC address filtering on a FortiGate - IP/MAC binding
Description
In
normal operation, FortiGate firewalls offer network control, packet
filtering, based on elements such as source and destination IP
addresses. This is done using Firewall policies.
A FortiGate firewall can be configured to restrict access by workstation MAC address. When binding and IP address to a specific MAC address a higher level of control and reporting can be obtained. This allows for greater security as a trusted address that may have been spoofed will be verified against a MAC address to ensure permissions.
This procedure will only help when devices being restricted reside on the same network segment as a FortiGate interface. When routers are involved, source MAC addresses will be overridden and this check will no longer apply.
The following is a brief description on how this can be done.
A FortiGate firewall can be configured to restrict access by workstation MAC address. When binding and IP address to a specific MAC address a higher level of control and reporting can be obtained. This allows for greater security as a trusted address that may have been spoofed will be verified against a MAC address to ensure permissions.
This procedure will only help when devices being restricted reside on the same network segment as a FortiGate interface. When routers are involved, source MAC addresses will be overridden and this check will no longer apply.
The following is a brief description on how this can be done.
Scope
MAC / IP Binding / Filtering
Solution
The
feature used in this procedure is called IP/MAC binding. Using CLI,
an Administrator may configure manual binding table and configure which
MAC address corresponds to which IP address.
This is only recommended in small to medium networks. Extra caution is required to implement in large networks. As mentioned earlier, if any routing takes place before sending traffic to a FortiGate the issue of source MAC address being replaced with that of a router is a real concern.
Note: If IP/MAC binding is enabled, and the IP address of a host with an IP or MAC address in the IP/MAC table is changed, or a new computer is added to the network, it is necessary to update the IP/MAC table. If this is not done, the new or changed hosts will not have access to or through the FortiGate unit depending on the settings configured.
Caution: If a client receives an IP address from the FortiGate unit DHCP server, the client's MAC address is automatically registered in the IP/MAC binding table. This can simplify IP/MAC binding configuration, but can also neutralize protection offered by IP/MAC binding if untrusted hosts are allowed to access the DHCP server. Use caution when enabling and providing access to the DHCP server.
Syntax:
This is only recommended in small to medium networks. Extra caution is required to implement in large networks. As mentioned earlier, if any routing takes place before sending traffic to a FortiGate the issue of source MAC address being replaced with that of a router is a real concern.
Note: If IP/MAC binding is enabled, and the IP address of a host with an IP or MAC address in the IP/MAC table is changed, or a new computer is added to the network, it is necessary to update the IP/MAC table. If this is not done, the new or changed hosts will not have access to or through the FortiGate unit depending on the settings configured.
Caution: If a client receives an IP address from the FortiGate unit DHCP server, the client's MAC address is automatically registered in the IP/MAC binding table. This can simplify IP/MAC binding configuration, but can also neutralize protection offered by IP/MAC binding if untrusted hosts are allowed to access the DHCP server. Use caution when enabling and providing access to the DHCP server.
Syntax:
config firewall ipmacbinding setting
set bindthroughfw {enable | disable} - this is enabling IPMAC binding to get through a Firewall.
set bindtofw {enable | disable} - this will check an IP MAC binding combination to allow access TO the firewall
set undefinedhost {allow | block} - this defines how the Firewall will treat traffic that has not been bound
end
Syntax:
config firewall ipmacbinding table
edit <index_int> - the number in the IP/MAC binding table
set ip <address_ipv4> - IP address value
set mac <address_hex> - MAC address value
set name <name_str> - the name which may be used for this binding
set status {enable | disable} - is the binding now enabled
endSyntax:
config system interface
edit <interface name>
set ipmac {enable | disable } - enable to enable mac binding on interface
next
end
Wednesday, March 6, 2013
CFG_CMDBAPI_ERR error fortigate
When CFG_CMDBAPI_ERR appears, use this command :
diagnose test application ipsmonitor 99
This command restarts the ipsmonitor which is the problem.
diagnose test application ipsmonitor 99
This command restarts the ipsmonitor which is the problem.
Friday, February 22, 2013
Allowing DNS queries to only one approved DNS server fortigate V4 MR3
Allowing DNS queries to only one approved DNS server
http://www.youtube.com/watch?feature=player_embedded&v=rKnL3tQuISg
Wednesday, February 20, 2013
ping-options setting fortigate V4 MR3
#execute ping-options view-settings
Ping Options:
Repeat Count: 100
Data Size: 56
Timeout: 2
Interval: 1
TTL: 64
TOS: 0
DF bit: unset
Source Address: auto
Pattern:
Pattern Size in Bytes: 0
Validate Reply: no
Ping Options:
Repeat Count: 100
Data Size: 56
Timeout: 2
Interval: 1
TTL: 64
TOS: 0
DF bit: unset
Source Address: auto
Pattern:
Pattern Size in Bytes: 0
Validate Reply: no
Wednesday, January 23, 2013
DNS caching & webfilter-caching Fortigate V4 MR3
show dns settings
#config system dns
show system dns
----------------------------------------------------
#config system dns
set dns-cache-limit 999999999
set dns-cache-ttl 7200
end
--------------------------------------------------------
show webfilter settings
#config system fortiguard
show system fortiguard
-------------------------------------------------------
# config system fortiguard
set webfilter-cache-ttl 86400
end
#config system dns
show system dns
----------------------------------------------------
#config system dns
set dns-cache-limit 999999999
set dns-cache-ttl 7200
end
--------------------------------------------------------
show webfilter settings
#config system fortiguard
show system fortiguard
-------------------------------------------------------
# config system fortiguard
set webfilter-cache-ttl 86400
end
DNS cache clear Fortigate v4 MR3 Patch 10
FGT # diag test application dnsproxy ?
1. Clear dns cache
2. Show stats
3. Dump DNS setting
4. Reload FQDN
5. Requery FQDN
6. Dump FQDN
To clear the DNS cache :
#diag test application dnsproxy 1
This will simply reload and requery the FQDN :
FGT # diag test application dnsproxy 4
FGT # diag test application dnsproxy 5
Saturday, January 19, 2013
Denial-of-Service (DoS)
A Denial of Service (DoS) attack disrupts service to users and is
usually done by consuming network bandwidth or overloading a computer's
resources. One of the signs to recognize if you are being attacked is
when your connection (either Internet or network) slows down for no
apparent reason. Another sign of a DoS attack is when you are unable to
connect to a server or a web page that is usually available.
Wednesday, January 2, 2013
cron daily restart of the FortiGate
The FortiGate allows to program a daily restart at a fixed hour.
config system global
set daily-restart enable
set restart-time 05:06
end
config system global
set daily-restart enable
set restart-time 05:06
end
How to set a FortiGate to send the real time log to a FortiAnalyzer
how to enable a FortiGate unit to send the real time log to a FortiAnalyzer unit.
This only applies to a FortiGate unit that has storage or hard disk which can set to be the real time or store-and-upload. For a FortiGate unit that does not have storage or hard disk, it will be set to be the real time by default.
The following CLI command can be used to set the FortiGate unit to send the real time log to a FortiAnalyzer.
# config log fortianalyzer setting
# set upload-option realtime
# end
This only applies to a FortiGate unit that has storage or hard disk which can set to be the real time or store-and-upload. For a FortiGate unit that does not have storage or hard disk, it will be set to be the real time by default.
The following CLI command can be used to set the FortiGate unit to send the real time log to a FortiAnalyzer.
# config log fortianalyzer setting
# set upload-option realtime
# end
SQL logging on FortiGate with flash disk at 4.0 MR3 patch7
Description
After upgrade of a FortiGate with internal flash disk to 4.0 MR3 patch7, it may be noticed that even if the SQL quota was not set then the SQL log will only go up to a certain size and the log message "Sql Log is 99% full. System will overwrite old logs now.” may be seen.
Scope
SQL logging.
Solution
This is due to a change in the way SQL logging is performed on the local log disk.
In 4.0 MR3 patch7, all FortiGate untis with a flash disk will move the SQL logging to memory and the maximum size is 10% of the available memory. For example a FortiGate 100D having 2GB of RMA would have a maximum SQL log size of 200MB.
The command # dia hardware sysinfo memory can be used to check the total memory of the FortiGate.
Authentication keepalive page Fortigate
Description
This article explains how to configure the keepalive page to show on a user PC when the user accesses to the internet.
Solution
The authentication keepalive page can be enabled by the CLI command:
# config system global
# set auth-keepalive enable
# endThe authentication keepalive page is disabled by default. When enabled the following HTML page will be displayed and the firewall authentication keepalive will prevent sessions from ending when the authentication timeout ends.
Subscribe to:
Posts (Atom)