{"id":243,"date":"2022-04-07T14:39:29","date_gmt":"2022-04-07T18:39:29","guid":{"rendered":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/vlan-and-security-profile\/"},"modified":"2023-08-29T16:27:18","modified_gmt":"2023-08-29T20:27:18","slug":"vlan-and-security-profile","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/vlan-and-security-profile\/","title":{"raw":"7.3 VLAN and Security Profile","rendered":"7.3 VLAN and Security Profile"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n \t<li class=\"hanging-indent\">Configure VLANs in FortiGate firewall<\/li>\n \t<li class=\"hanging-indent\">Configure a Security Policy for VLANs<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: In this lab, we are going to learn how to set VLAN on Port2 of the firewall. WebTerm1 is belong to Vlan10 and WebTerm2 is belong to Vlan20. We will set different policies on each VLAN and try to verify configuration.<\/div>\n\n[caption id=\"attachment_231\" align=\"aligncenter\" width=\"1106\"]<img class=\"wp-image-231 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/03\/0.jpg\" alt=\"Vlan and Security Profile main scenario\" width=\"1106\" height=\"560\"> Figure 7.22: Main scenario[\/caption]\n\n<div align=\"left\">\n<table class=\"aligncenter\" style=\"width: 100%;\"><caption>Table 7.2: Devices configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 84.4205px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 304.398px;\" scope=\"col\">IP address<\/th>\n<th style=\"width: 181.841px;\" scope=\"col\">Access<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 84.4205px;\">FortiGate<\/td>\n<td style=\"width: 304.398px;\">Port 1: DHCP Client\n\nPort 2:\n\nVlan 10: 192.168.10.1\/24\n\nVlan 20: 192.168.20.1\/24<\/td>\n<td style=\"width: 181.841px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.4205px;\">WebTerm1<\/td>\n<td style=\"width: 304.398px;\">DHCP Client<\/td>\n<td style=\"width: 181.841px;\">-<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.4205px;\">WebTerm2<\/td>\n<td style=\"width: 304.398px;\">DHCP Client<\/td>\n<td style=\"width: 181.841px;\">-<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<ol>\n \t<li>Configure switches. Right-click on the <strong>Switch<\/strong> &gt; <strong>Configure<\/strong>, configure eth0, eth1, and eth2 as Table 7.3:\n<div align=\"left\">\n<table class=\"aligncenter\" style=\"width: 100%;\"><caption>Table 7.3: Switch configuration<\/caption>\n<tbody>\n<tr style=\"height: 35px;\">\n<th style=\"height: 35px; width: 104.352px;\" scope=\"col\">Port<\/th>\n<th style=\"height: 35px; width: 117.045px;\" scope=\"col\">VLAN<\/th>\n<th style=\"height: 35px; width: 157.807px;\" scope=\"col\">Type<\/th>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px; width: 104.352px;\">0<\/td>\n<td style=\"height: 35px; width: 117.045px;\">1<\/td>\n<td style=\"height: 35px; width: 157.807px;\">Dot1q<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px; width: 104.352px;\">1<\/td>\n<td style=\"height: 35px; width: 117.045px;\">10<\/td>\n<td style=\"height: 35px; width: 157.807px;\">Access<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px; width: 104.352px;\">2<\/td>\n<td style=\"height: 35px; width: 117.045px;\">20<\/td>\n<td style=\"height: 35px; width: 157.807px;\">Access<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n\n[caption id=\"attachment_232\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-232\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/1-1.jpg\" alt=\"Switch configuration\" width=\"400\" height=\"281\"> Figure 7.23: Switch configuration[\/caption]<\/li>\n \t<li>You should create two sub-interfaces on port2 of the firewall.\n\n[caption id=\"attachment_235\" align=\"aligncenter\" width=\"1151\"]<img class=\"wp-image-233 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1.jpg\" alt=\"Vlan10 Configuration\" width=\"1151\" height=\"745\"> Figure 7.24: Vlan10 Configuration[\/caption]\n\n[caption id=\"attachment_235\" align=\"aligncenter\" width=\"1190\"]<img class=\"wp-image-234 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1.jpg\" alt=\"Vlan20 Configuration\" width=\"1190\" height=\"685\"> Figure 7.25: Vlan20 Configuration[\/caption]\n\n[caption id=\"attachment_235\" align=\"aligncenter\" width=\"1054\"]<img class=\"wp-image-235 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1.jpg\" alt=\"Vlan10 and Vlan20 IP addresses\" width=\"1054\" height=\"127\"> Figure 7.26: Vlan10 and Vlan20 IP addresses[\/caption]<\/li>\n \t<li>Block YouTube and Social Media on Vlan 20:\n<ol>\n \t<li>Create an application profile as Figure 7.27.\n\n[caption id=\"attachment_236\" align=\"aligncenter\" width=\"863\"]<img class=\"wp-image-236 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1.jpg\" alt=\"Block Social Media and Video\/Audio\" width=\"863\" height=\"783\"> Figure 7.27: Block Social.Media and Video\/Audio[\/caption]<\/li>\n \t<li>Configure Firewall Policy from Vlan 20 to Port1 and assign application control to the Firewall Policy.\n\n[caption id=\"attachment_237\" align=\"aligncenter\" width=\"1200\"]<img class=\"wp-image-237 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/47.jpg\" alt=\"Vlan20 Firewall Policy and assign Application Control Profile\" width=\"1200\" height=\"809\"> Figure 7.28: Create vlan20 Firewall Policy and assign Application Control Profile[\/caption]<\/li>\n \t<li>Verify your configuration by visiting Twitter.com or YouTube.com.\n\n[caption id=\"attachment_238\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-238\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/48.jpg\" alt=\"Verify configuration\" width=\"400\" height=\"311\"> Figure 7.29: Verify configuration[\/caption]<\/li>\n<\/ol>\n<\/li>\n \t<li>Filter .zip, .pdf files on Vlan 10:\n<ol>\n \t<li>Create a File filtezr profile. File filter only works on the unencrypted protocol. Set traffic for both and finally set the action to block.\n\n[caption id=\"attachment_239\" align=\"aligncenter\" width=\"1234\"]<img class=\"wp-image-239 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1.jpg\" alt=\"Block pdf and zip files\" width=\"1234\" height=\"755\"> Figure 7.30: Block PDF and ZIP files[\/caption]<\/li>\n \t<li>Make sure to set the feature set as flow-based.\n\n[caption id=\"attachment_240\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-240\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1.jpg\" alt=\"Block Profile\" width=\"400\" height=\"293\"> Figure 7.31: Block profile[\/caption]<\/li>\n \t<li>Create a Firewall Policy in the firewall from vlan10 to port1, inspection mode should be Proxy-based, and assign the profile you have created to File Filter.\n\n[caption id=\"attachment_241\" align=\"aligncenter\" width=\"1027\"]<img class=\"wp-image-241 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1.jpg\" alt=\"Vlan10 Firewall Policy and Assigning File Filter Profile\" width=\"1027\" height=\"819\"> Figure 7.32: Create vlan10 Firewall Policy and assign File Filter Profile[\/caption]<\/li>\n \t<li>Verify your configuration by downloading a zip or pdf file from HTTP websites.\n\n[caption id=\"attachment_242\" align=\"aligncenter\" width=\"450\"]<img class=\"wp-image-242\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1.jpg\" alt=\"Verify your configuration by downloading a zip or pdf file from HTTP websites\" width=\"450\" height=\"189\"> Figure 7.33: Verify configuration[\/caption]<\/li>\n<\/ol>\n<\/li>\n<\/ol>","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li class=\"hanging-indent\">Configure VLANs in FortiGate firewall<\/li>\n<li class=\"hanging-indent\">Configure a Security Policy for VLANs<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: In this lab, we are going to learn how to set VLAN on Port2 of the firewall. WebTerm1 is belong to Vlan10 and WebTerm2 is belong to Vlan20. We will set different policies on each VLAN and try to verify configuration.<\/div>\n<figure id=\"attachment_231\" aria-describedby=\"caption-attachment-231\" style=\"width: 1106px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-231 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/03\/0.jpg\" alt=\"Vlan and Security Profile main scenario\" width=\"1106\" height=\"560\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/0.jpg 1106w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/0-300x152.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/0-1024x518.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/0-768x389.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/0-65x33.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/0-225x114.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/03\/0-350x177.jpg 350w\" sizes=\"auto, (max-width: 1106px) 100vw, 1106px\" \/><figcaption id=\"caption-attachment-231\" class=\"wp-caption-text\">Figure 7.22: Main scenario<\/figcaption><\/figure>\n<div style=\"text-align: left;\">\n<table class=\"aligncenter\" style=\"width: 100%;\">\n<caption>Table 7.2: Devices configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 84.4205px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 304.398px;\" scope=\"col\">IP address<\/th>\n<th style=\"width: 181.841px;\" scope=\"col\">Access<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 84.4205px;\">FortiGate<\/td>\n<td style=\"width: 304.398px;\">Port 1: DHCP Client<\/p>\n<p>Port 2:<\/p>\n<p>Vlan 10: 192.168.10.1\/24<\/p>\n<p>Vlan 20: 192.168.20.1\/24<\/td>\n<td style=\"width: 181.841px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.4205px;\">WebTerm1<\/td>\n<td style=\"width: 304.398px;\">DHCP Client<\/td>\n<td style=\"width: 181.841px;\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 84.4205px;\">WebTerm2<\/td>\n<td style=\"width: 304.398px;\">DHCP Client<\/td>\n<td style=\"width: 181.841px;\">&#8211;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<ol>\n<li>Configure switches. Right-click on the <strong>Switch<\/strong> &gt; <strong>Configure<\/strong>, configure eth0, eth1, and eth2 as Table 7.3:\n<div style=\"text-align: left;\">\n<table class=\"aligncenter\" style=\"width: 100%;\">\n<caption>Table 7.3: Switch configuration<\/caption>\n<tbody>\n<tr style=\"height: 35px;\">\n<th style=\"height: 35px; width: 104.352px;\" scope=\"col\">Port<\/th>\n<th style=\"height: 35px; width: 117.045px;\" scope=\"col\">VLAN<\/th>\n<th style=\"height: 35px; width: 157.807px;\" scope=\"col\">Type<\/th>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px; width: 104.352px;\">0<\/td>\n<td style=\"height: 35px; width: 117.045px;\">1<\/td>\n<td style=\"height: 35px; width: 157.807px;\">Dot1q<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px; width: 104.352px;\">1<\/td>\n<td style=\"height: 35px; width: 117.045px;\">10<\/td>\n<td style=\"height: 35px; width: 157.807px;\">Access<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px; width: 104.352px;\">2<\/td>\n<td style=\"height: 35px; width: 117.045px;\">20<\/td>\n<td style=\"height: 35px; width: 157.807px;\">Access<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<figure id=\"attachment_232\" aria-describedby=\"caption-attachment-232\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-232\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/1-1.jpg\" alt=\"Switch configuration\" width=\"400\" height=\"281\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/1-1.jpg 684w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/1-1-300x211.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/1-1-65x46.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/1-1-225x158.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/1-1-350x246.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-232\" class=\"wp-caption-text\">Figure 7.23: Switch configuration<\/figcaption><\/figure>\n<\/li>\n<li>You should create two sub-interfaces on port2 of the firewall.<br \/>\n<figure id=\"attachment_235\" aria-describedby=\"caption-attachment-235\" style=\"width: 1151px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-233 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1.jpg\" alt=\"Vlan10 Configuration\" width=\"1151\" height=\"745\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1.jpg 1151w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1-300x194.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1-1024x663.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1-768x497.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1-65x42.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1-225x146.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/3-1-1-350x227.jpg 350w\" sizes=\"auto, (max-width: 1151px) 100vw, 1151px\" \/><figcaption id=\"caption-attachment-235\" class=\"wp-caption-text\">Figure 7.24: Vlan10 Configuration<\/figcaption><\/figure>\n<figure id=\"attachment_235\" aria-describedby=\"caption-attachment-235\" style=\"width: 1190px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-234 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1.jpg\" alt=\"Vlan20 Configuration\" width=\"1190\" height=\"685\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1.jpg 1190w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1-300x173.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1-1024x589.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1-768x442.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1-65x37.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1-225x130.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-1-350x201.jpg 350w\" sizes=\"auto, (max-width: 1190px) 100vw, 1190px\" \/><figcaption id=\"caption-attachment-235\" class=\"wp-caption-text\">Figure 7.25: Vlan20 Configuration<\/figcaption><\/figure>\n<figure id=\"attachment_235\" aria-describedby=\"caption-attachment-235\" style=\"width: 1054px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-235 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1.jpg\" alt=\"Vlan10 and Vlan20 IP addresses\" width=\"1054\" height=\"127\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1.jpg 1054w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1-300x36.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1-1024x123.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1-768x93.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1-65x8.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1-225x27.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/41-1-350x42.jpg 350w\" sizes=\"auto, (max-width: 1054px) 100vw, 1054px\" \/><figcaption id=\"caption-attachment-235\" class=\"wp-caption-text\">Figure 7.26: Vlan10 and Vlan20 IP addresses<\/figcaption><\/figure>\n<\/li>\n<li>Block YouTube and Social Media on Vlan 20:\n<ol>\n<li>Create an application profile as Figure 7.27.<br \/>\n<figure id=\"attachment_236\" aria-describedby=\"caption-attachment-236\" style=\"width: 863px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-236 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1.jpg\" alt=\"Block Social Media and Video\/Audio\" width=\"863\" height=\"783\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1.jpg 863w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1-300x272.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1-768x697.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1-65x59.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1-225x204.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/46-1-350x318.jpg 350w\" sizes=\"auto, (max-width: 863px) 100vw, 863px\" \/><figcaption id=\"caption-attachment-236\" class=\"wp-caption-text\">Figure 7.27: Block Social.Media and Video\/Audio<\/figcaption><\/figure>\n<\/li>\n<li>Configure Firewall Policy from Vlan 20 to Port1 and assign application control to the Firewall Policy.<br \/>\n<figure id=\"attachment_237\" aria-describedby=\"caption-attachment-237\" style=\"width: 1200px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-237 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/47.jpg\" alt=\"Vlan20 Firewall Policy and assign Application Control Profile\" width=\"1200\" height=\"809\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/47.jpg 1200w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/47-300x202.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/47-1024x690.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/47-768x518.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/47-65x44.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/47-225x152.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/47-350x236.jpg 350w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><figcaption id=\"caption-attachment-237\" class=\"wp-caption-text\">Figure 7.28: Create vlan20 Firewall Policy and assign Application Control Profile<\/figcaption><\/figure>\n<\/li>\n<li>Verify your configuration by visiting Twitter.com or YouTube.com.<br \/>\n<figure id=\"attachment_238\" aria-describedby=\"caption-attachment-238\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-238\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/48.jpg\" alt=\"Verify configuration\" width=\"400\" height=\"311\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/48.jpg 1050w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/48-300x233.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/48-1024x796.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/48-768x597.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/48-65x51.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/48-225x175.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/48-350x272.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-238\" class=\"wp-caption-text\">Figure 7.29: Verify configuration<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n<\/li>\n<li>Filter .zip, .pdf files on Vlan 10:\n<ol>\n<li>Create a File filtezr profile. File filter only works on the unencrypted protocol. Set traffic for both and finally set the action to block.<br \/>\n<figure id=\"attachment_239\" aria-describedby=\"caption-attachment-239\" style=\"width: 1234px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-239 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1.jpg\" alt=\"Block pdf and zip files\" width=\"1234\" height=\"755\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1.jpg 1234w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1-300x184.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1-1024x627.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1-768x470.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1-65x40.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1-225x138.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/42-1-350x214.jpg 350w\" sizes=\"auto, (max-width: 1234px) 100vw, 1234px\" \/><figcaption id=\"caption-attachment-239\" class=\"wp-caption-text\">Figure 7.30: Block PDF and ZIP files<\/figcaption><\/figure>\n<\/li>\n<li>Make sure to set the feature set as flow-based.<br \/>\n<figure id=\"attachment_240\" aria-describedby=\"caption-attachment-240\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-240\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1.jpg\" alt=\"Block Profile\" width=\"400\" height=\"293\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1.jpg 912w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1-300x219.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1-768x562.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1-65x48.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1-225x165.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/43-1-350x256.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-240\" class=\"wp-caption-text\">Figure 7.31: Block profile<\/figcaption><\/figure>\n<\/li>\n<li>Create a Firewall Policy in the firewall from vlan10 to port1, inspection mode should be Proxy-based, and assign the profile you have created to File Filter.<br \/>\n<figure id=\"attachment_241\" aria-describedby=\"caption-attachment-241\" style=\"width: 1027px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-241 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1.jpg\" alt=\"Vlan10 Firewall Policy and Assigning File Filter Profile\" width=\"1027\" height=\"819\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1.jpg 1027w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1-300x239.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1-1024x817.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1-768x612.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1-65x52.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1-225x179.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/44-1-350x279.jpg 350w\" sizes=\"auto, (max-width: 1027px) 100vw, 1027px\" \/><figcaption id=\"caption-attachment-241\" class=\"wp-caption-text\">Figure 7.32: Create vlan10 Firewall Policy and assign File Filter Profile<\/figcaption><\/figure>\n<\/li>\n<li>Verify your configuration by downloading a zip or pdf file from HTTP websites.<br \/>\n<figure id=\"attachment_242\" aria-describedby=\"caption-attachment-242\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-242\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1.jpg\" alt=\"Verify your configuration by downloading a zip or pdf file from HTTP websites\" width=\"450\" height=\"189\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1.jpg 918w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1-300x126.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1-768x322.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1-65x27.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1-225x94.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/45-1-350x147.jpg 350w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><figcaption id=\"caption-attachment-242\" class=\"wp-caption-text\">Figure 7.33: Verify configuration<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"author":124,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-243","chapter","type-chapter","status-publish","hentry"],"part":206,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/124"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/243\/revisions"}],"predecessor-version":[{"id":244,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/243\/revisions\/244"}],"part":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/parts\/206"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/243\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=243"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapter-type?post=243"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=243"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}