Fortigate Firewall Packet Flow - in depth for troubleshoot

Поделиться
HTML-код
  • Опубликовано: 9 июл 2024
  • ========================fortigate firewall packet flow.=================
    Fortigate firewall architecture
    CP8 & NP6
    Hardware acceleration
    dirty flag, may dirty flags
    IPS
    Life of a session
    I know its always “Life of a packet” when any vendor explain the packet flow of firewall, but I don’t agree with this sentence as this can create miss understanding which I will explain in this article. as per me the topic name should be Life of a session.
    Why ? To explain this lets take a simple example of HTTPs traffic only.
    Because when you type www.tekguru4u.com in the browser then its not only syn packet that goes from your PC and get inspected via Firewall but lot of packets get exchanged before you see the web-page. so how it can be "Life of a packet"? Either "Life of packets " but that doesn't make sense because packets can also be from another website request.
    1. DNS Query
    2. Complete 3-way handshake.
    3. Complete SSL Handshake and then
    4. HTTP requests. where lot of HTTP packets will be exchanged
    5. and if in the same website you change the application then packet will be checked for "Change of application " Like in tunneled application.
    You have seen how many packets get exchanged from one session. And every packet has different packet flow.
    1. 1st packet of session is DNS packet and its treated differently than other packets.
    2. After that 3 way handshake starts.
    3. First packet of 3 way handshake does not get offloaded and it has to travel from all the inspection modes.
    4. Rest packets of 3 way handshake will get offloaded.
    5. Another great point to know is that complete three way handshake does not need to match with the Layer-7 inspection (UTM) because it works upto L4. but fortigate in its logs you can see that packet is passed through Layer-7 inspection. which does not make sense. But nothing is matched here.
    6. for inspecting a packet at Layer-7 at-least small amount of data is required after 3-way handshake. http get request

Комментарии • 74

  • @VipulChakraborty
    @VipulChakraborty 4 месяца назад +1

    What a great explanation of Packet Flow. Loved it.
    Thank you.

  • @JO-hp8nt
    @JO-hp8nt 3 года назад +8

    Bro! You just saved me a good deal of time as I've been pondering why my custom signatures were not working like how so many people described on the web. Well with your indepth explanation, you made it so clear and gave me a vision and long story short, because the IPS doesn't kick in until after the session is added to the session table, other things could be blocking my packet before it hit the IPS. Which was the case. As soon as I create a policy and put it above all the others and pretty much made it wide open to test, bingo! I can't thank you enough for the work you did, this was wonderful.

  • @patricksigrist4831
    @patricksigrist4831 Год назад +2

    Great video.
    The main reason, why routing has to be done before the FW policy is, that the routing determines the involved interfaces, especially the egress interface which is key to determine the matching policy as we have the incoming (ingress) and outgoing (egress) interfaces, which are mandatory elements for a FW policy.
    This shows, that routing is key, also in terms of firewall policies.
    It's a good rule of thumb: "Always check the routing first" when dealing with weird firewall behaviors.

    • @SantoshSharma
      @SantoshSharma  Год назад

      perfect
      subscribe and share to support this channel

  • @robertron5303
    @robertron5303 3 года назад +1

    Much appreciated, greetings from Vienna

  • @hariprasad-uw2yn
    @hariprasad-uw2yn 2 года назад +1

    Brother, I always like your Video.No one should dislike it as far as Networking is concerned.

  • @RohitPandey-ig7ht
    @RohitPandey-ig7ht 3 года назад +1

    Great content!!

  • @nasirabbas2786
    @nasirabbas2786 3 года назад

    Thanks sir, i was trying to understand fortigate packet flow from fortigate page itself but did'nt understand. Your way of explanation is easy to understand, super explanation. Again thanks sir!

  • @swapnillande4427
    @swapnillande4427 2 года назад +1

    Very helpful 👍, thank you.

  • @govindjadhav5273
    @govindjadhav5273 3 года назад +1

    Superb bro..well done. much helpful.

  • @GauravSingh-ru4fl
    @GauravSingh-ru4fl 4 года назад +2

    Wonderful Bro !!

  • @shivanarayana4976
    @shivanarayana4976 Год назад +1

    Very nice explanation sir, sharing good knowledge

  • @learnenglishvocabulary550
    @learnenglishvocabulary550 4 года назад +2

    Greeting, Technical_Scoop. extremely picturesque video. thanks. :)

  • @ManojKumar-lr3ky
    @ManojKumar-lr3ky 4 года назад

    Wonderful bro its really very informative need more troubleshooting videos ...

  • @urdhffkt
    @urdhffkt 2 года назад +1

    Thank you sir, this video is very helpful

  • @motorbazar8358
    @motorbazar8358 2 года назад

    Slow path process :- 1>DNAT , 2> Routing , 3> Policy , 4>SNAT .... 2nd Question answers :- if there will be no routing in that case.. no use of policy lookup .. so by doing routing lookup we are not much consuming CPU Utilization of firewall ... Thank u so much for explaining it :)

  • @kirubakaran9357
    @kirubakaran9357 3 года назад +2

    Sir it's my feedback
    Really cool and crystal clear session for upcoming TAC engineer of fortigate also information that your gathered show the effort of you thanks a lot sir........

    • @JO-hp8nt
      @JO-hp8nt 3 года назад

      I could not have said it any better myself.

  • @MsAruntiwari
    @MsAruntiwari 5 месяцев назад

    Great explanation. Thanks or this knowledge.

  • @safwatramadan7640
    @safwatramadan7640 8 месяцев назад

    Very helpful thanks 👏

  • @stalinkoilraj9820
    @stalinkoilraj9820 3 года назад

    good bro ! policy will be the first counter for all the traffic before it moves to NAT and Security

  • @anurag3v4
    @anurag3v4 3 года назад

    Good explaination

  • @samiyaanjum5145
    @samiyaanjum5145 3 года назад +4

    Awesome brother, great explanation, can you make another showing differences between application,dns and web filter. Explaining in detail when to use which filter. Can you explain how SDWAN rules can impact the SNAT selection in policy

  • @beatsizedj
    @beatsizedj 3 года назад

    You king sir! Thank you very much for this Video. If you would have had a good Microphone I would rate this Video 11/10!

  • @saidsalehi4719
    @saidsalehi4719 2 года назад +1

    The route is before Policy because after Routing, specify the Policy ,based on the outgoing interface

  • @AbhijitDas-lw9mh
    @AbhijitDas-lw9mh 5 месяцев назад

    Fantastic explanation. Could you please share the traffic flow diagram which you explain here.

  • @indiankid
    @indiankid 9 месяцев назад

    You gained a subsciber thanks for awesome content

  • @arian7472
    @arian7472 4 года назад +1

    excellent

  • @sridhark2547
    @sridhark2547 3 года назад

    Thank you

  • @vivekprajapati7911
    @vivekprajapati7911 4 года назад +2

    sir thanks ...

  • @mahendrazanje6242
    @mahendrazanje6242 2 года назад +1

    Awesome

  • @venkatreddy4345
    @venkatreddy4345 Год назад +1

    In the slow path it checks the DNAT, Routing , Policy Lookup, SNAT

  • @prabhakarshandilya6082
    @prabhakarshandilya6082 2 года назад

    Really nice

    • @SantoshSharma
      @SantoshSharma  2 года назад

      Thanks, spread the words 🙏🏻🤗

  • @amitkumarsingh2176
    @amitkumarsingh2176 4 месяца назад

    JAI SHREE RAM🙏

  • @kirubakaran9357
    @kirubakaran9357 3 года назад +1

    25:10
    What is slow path chkng proccess?
    1 DNAT
    2. ROUTING
    3 POLICY
    4 SNAT

  • @ghanshyamtrilok7062
    @ghanshyamtrilok7062 Год назад +1

    how can i enroll for other videos

  • @sherkn
    @sherkn 4 года назад +1

    Your Explanation was very deep, awezome video. I have a question for you, if i have an specific Firewalls rule at the end, saying ¨Deny any any", and prior that rules execute i have some other App rule (let say office365 for example) the Application control Will not be able to detect the Application because of the "deny" rule it Will not be able to complete the 3way handshake therefore there is no flow to catch? im Right?

    • @SantoshSharma
      @SantoshSharma  4 года назад

      Cristian Silva u r right
      so its always recommend that deny deny at last and then all permit on above and if u creat rule for app with allow like allow youtube then it will do 3 way from that rule

  • @prashantakarmakar3111
    @prashantakarmakar3111 4 года назад +1

    Hello Sir. Thank you for the content. But I have one question. Where is the DNAT happening for Fast Path?

  • @beatsizedj
    @beatsizedj 3 года назад

    Just a Question. You said that every packet gets handeld first by the CPU. But not in the Case of DDos right? Then de SP would block it before passing the traffic to the CPU?
    Or other related IPS things?

  • @vaibhavcavutur8839
    @vaibhavcavutur8839 Год назад

    where does urpf happen in packet flow ?

  • @johnbruurmijn9178
    @johnbruurmijn9178 Год назад

    Love the video! Would it be possible to share the flow chart you made? Want to use it as my background, to have a quick peak when needed.

    • @SantoshSharma
      @SantoshSharma  Год назад

      thanks John, i lost it myself. my website was expired and was no plan to extend due to high cost. but renwed website , unfortuantely lost images.

  • @yogeshwartripathi9018
    @yogeshwartripathi9018 2 года назад +1

    could you please focus on fast path steps in deep?

  • @Shubhontube
    @Shubhontube Год назад

    Hi, Which command I should ran to check this flow of packets on my device

    • @SantoshSharma
      @SantoshSharma  Год назад

      diag debug
      check my another video on this

    • @rosatechnocrat2206
      @rosatechnocrat2206 Год назад +2

      diag debug flow show iprope enable
      diagnose debug flow show function-name enable
      diag debug flow trace start 1000
      diag debug enable
      You can also filter for specific IP address Flow by using - diag debug flow filter

  • @ravikumarsinge5887
    @ravikumarsinge5887 2 года назад

    Hello , Do you have full Forti gate videos , if nor here on other platform , Please let me know

    • @SantoshSharma
      @SantoshSharma  2 года назад

      Sorry bro, no videos for now. but planning to make in near furure

  • @paulvarges3323
    @paulvarges3323 3 года назад

    hello, do you share that power point doc?

    • @SantoshSharma
      @SantoshSharma  3 года назад

      Go to my websiite to see this packet flow in image

  • @FranciscoSilva-kj8zt
    @FranciscoSilva-kj8zt 11 месяцев назад

    Hey, great video. It's possible to share the powerpoint or the images of this presentation. If i try to reach the source image, i got http 404.
    Thanks in advance.

  • @ameeransar5297
    @ameeransar5297 8 месяцев назад

    Pls share the flow chart

  • @gopalsrinivasa6267
    @gopalsrinivasa6267 3 года назад

    If Destination NAT is verified before security policy check then why in WAN to LAN security policy, under Destination Address Public IP is given. why cant we directly give Private IP address. My doubt is not only for Fortigate but also for other firewalls like Sonicwall & Paloalto also.

    • @SantoshSharma
      @SantoshSharma  3 года назад

      Destination IP In fortigate is VIP. virtual IP. so in Fortigate its very easy. no confusion at all. packet flow helps you to tell which is happening when.

    • @gopalsrinivasa6267
      @gopalsrinivasa6267 3 года назад

      @@SantoshSharma Hi thanks for your reply, Can you explain packet flow for Sonicwall.

  • @monu836
    @monu836 4 года назад

    Are you teaching over the Skype or zoom

    • @SantoshSharma
      @SantoshSharma  4 года назад

      Monu Gothwal What happend? I didn’t understand the question, if u want training , Please contact me on email
      info@tekguru4u.com

  • @Mehsud2023
    @Mehsud2023 11 месяцев назад

    sir please upload the flow chart in HD Format

  • @lokeshreddysura6836
    @lokeshreddysura6836 Год назад

    IPS LOGS, APP LOGS, WEBFILTER Logs are not visible
    kindly Share the screenshot.

  • @hariprasad-uw2yn
    @hariprasad-uw2yn 2 года назад

    one dislike may be a child when his father watching the video the child could have click it.

  • @kirubakaran9357
    @kirubakaran9357 3 года назад +1

    25:11
    Question
    Why routing before policy ?
    Ans
    Because in an Firewall it has lot of policies it means utilize cpu n latency so it will check first routing its ec and also it's crct path

    • @toptalkers7980
      @toptalkers7980 3 года назад

      On the basis of routing firewall determine the egress interface and then the policy lookup is done for that flow. Without the egress information policy check won't take place

    • @SantoshSharma
      @SantoshSharma  3 года назад

      @@toptalkers7980 i would say awesome answer

    • @toptalkers7980
      @toptalkers7980 3 года назад

      @@SantoshSharma thank you sir

  • @FRITTY12348546
    @FRITTY12348546 Год назад

    pls activate windows