{"id":54,"date":"2022-03-09T23:08:49","date_gmt":"2022-03-10T04:08:49","guid":{"rendered":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/security-policy\/"},"modified":"2023-08-29T16:26:11","modified_gmt":"2023-08-29T20:26:11","slug":"security-policy","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/security-policy\/","title":{"raw":"2.1 Security Policy","rendered":"2.1 Security Policy"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n \t<li>Create a Security Policy in FortiGate<\/li>\n \t<li>Reorder Firewall Policies and Firewall Policy Actions<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to allow traffic from the local network to the Internet. We will set Security Policy that allows the traffic from Port 2 to Port 3. Then, WebTerm1 will be able to reach the Internet.<\/div>\n<h2 style=\"text-align: left;\">Security Policy<\/h2>\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"931\"]<img class=\"wp-image-38 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0.jpg\" alt=\"Security Policy main scenario\" width=\"931\" height=\"437\"> Figure 2.1: Main scenario[\/caption]\n\n&nbsp;\n<div class=\"level4\">\n<table class=\"aligncenter\" style=\"border-collapse: collapse; width: 100%;\" border=\"0\"><caption>Table 2.1: Devices configuration<\/caption>\n<tbody>\n<tr style=\"height: 18px;\">\n<th style=\"width: 16.4488%; height: 18px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 50.2178%; height: 18px;\" scope=\"col\">Configuration<\/th>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"width: 16.4488%; height: 18px;\">FortiGate<\/td>\n<td style=\"width: 50.2178%; height: 18px;\">Port 2: DHCP Server\n\nPort 3: DHCP Client<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"width: 16.4488%; height: 18px;\">\u00a0WebTerm<\/td>\n<td style=\"width: 50.2178%; height: 18px;\">DHCP Client<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\nConfiguration of port1 of the firewall in CLI is as follows:\n\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"578\"]<img class=\"wp-image-39 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-3.jpg\" alt=\"Configuration of Port1\" width=\"578\" height=\"234\"> Figure 2.2: Configuration of port1[\/caption]\n<ol>\n \t<li>Open the browser in WebTerm2 and type https:\/\/192.168.0.1. You should be able to access the firewall.\n\n[caption id=\"attachment_40\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-40\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4.jpg\" alt=\"Login in to the FortiGate\" width=\"400\" height=\"297\"> Figure 2.3: Log in to the FortiGate[\/caption]<\/li>\n \t<li>Go to <strong>Network<\/strong> &gt; <strong>Interfaces<\/strong> &gt; <strong>Port2<\/strong>, set the interface IP address as <strong>192.168.1.1\/24<\/strong> and configure DHCP server on interface port2 (Range of IP addresses should be: 192.168.1.20 to 192.168.1.30, DNS: 4.2.2.4) and <strong>Enable Device Detection<\/strong> under Port2.\n\n[caption id=\"attachment_41\" align=\"aligncenter\" width=\"1150\"]<img class=\"wp-image-41 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2.jpg\" alt=\"Enable DHCP Server\" width=\"1150\" height=\"632\"> Figure 2.4: Enable DHCP Server[\/caption]<\/li>\n \t<li>Set a port3 as a DHCP client and enable<strong> Device Detection<\/strong> under Port3.\n\n[caption id=\"attachment_42\" align=\"aligncenter\" width=\"914\"]<img class=\"wp-image-42 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6.jpg\" alt=\" Enable DHCP Client\" width=\"914\" height=\"218\"> Figure 2.5: Enable DHCP Client[\/caption]<\/li>\n \t<li>Set a Static route in the firewall to reach the NAT object. Go to <strong>Network &gt; Static Route &gt; Create a new<\/strong>.\n\n[caption id=\"attachment_43\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-43\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-7.jpg\" alt=\"Configure a static route\" width=\"400\" height=\"350\"> Figure 2.6: Configure a static route[\/caption]<\/li>\n \t<li>Go to <strong>Policy &amp; Objects &gt; Firewall Policy<\/strong> section, click <strong>Create New<\/strong> to add a new firewall policy, and configure the following settings:\n<ul>\n \t<li>Name: <strong>LocalToInternet<\/strong><\/li>\n \t<li>From <strong>inside<\/strong> to <strong>outside (port2 to port3)<\/strong><\/li>\n \t<li>Source:<strong> Create an address for local network (Subnet: 192.168.1.0\/24)<\/strong><\/li>\n \t<li>Destination: <strong>all<\/strong><\/li>\n \t<li>Schedule: <strong>Always<\/strong><\/li>\n \t<li>Service: Only <strong>HTTP, HTTPS, DNS, Ping<\/strong><\/li>\n \t<li>Action: <strong>Accept<\/strong><\/li>\n<\/ul>\n[caption id=\"attachment_45\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-44\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-8.jpg\" alt=\"set local subnet\" width=\"400\" height=\"241\"> Figure 2.7: Set local subnet[\/caption]\n\n[caption id=\"attachment_45\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-45\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9.jpg\" alt=\"Set firewall policy\" width=\"500\" height=\"341\"> Figure 2.8: Set firewall policy[\/caption]<\/li>\n \t<li>Go to <strong>WebTerm1<\/strong>, Set interface as DHCP and then open the browser, you should be able to access the internet.\n\n[caption id=\"attachment_47\" align=\"aligncenter\" width=\"1053\"]<img class=\"wp-image-46 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1.jpg\" alt=\"Enable DHCP Client on webterm1\" width=\"1053\" height=\"729\"> Figure 2.9: Enable DHCP Client on WebTerm1[\/caption]\n\n[caption id=\"attachment_47\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-47\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11.jpg\" alt=\"Verify your configuration by testing google.com\" width=\"500\" height=\"360\"> Figure 2.10: Verify your configuration by testing Google.com[\/caption]<\/li>\n<\/ol>\n<h2>Verify Your Configuration<\/h2>\n<ul>\n \t<li>Go to <strong>Dashboard <\/strong>&gt; <strong>FortiView Sessions<\/strong>. You should be able to see the traffic.<\/li>\n<\/ul>\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"1270\"]<img class=\"wp-image-48 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12.jpg\" alt=\" Fortiview Sessions\" width=\"1270\" height=\"742\"> Figure 2.11: FortiView Sessions[\/caption]\n<ul>\n \t<li>\u00a0Go to Firewall Policy and on the right side of the screen, you should be able to see <strong>Hit count.<\/strong><\/li>\n<\/ul>\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"1261\"]<img class=\"wp-image-49 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1.jpg\" alt=\"Hit count in the Firewall Policy\" width=\"1261\" height=\"796\"> Figure 2.12: Hit count in the Firewall Policy[\/caption]\n<ul>\n \t<li>Go to <strong>Dashboard<\/strong> &gt; <strong>Users &amp; Devices<\/strong> &gt; <strong>Device Inventory<\/strong> and verify the IP and Mac address of the device.<\/li>\n<\/ul>\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"1268\"]<img class=\"wp-image-50 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14.jpg\" alt=\"Device Inventory\" width=\"1268\" height=\"740\"> Figure 2.13: Device Inventory[\/caption]\n<h2>Reordering Firewall Policies and Firewall Policy Actions<\/h2>\nFortiGate will look for a matching policy, beginning at the top. Usually, you should put more specific policies at the top; otherwise, more general policies will match the traffic first, and your more granular policies will never be applied.\n\nYou will create a new firewall policy with more specific settings such as source, destination, service, and action set to <strong>DENY<\/strong>. Then, you will move this firewall policy above the existing firewall policies and observe the behaviour of firewall policy reordering.\n<h3>Create a firewall policy<\/h3>\nYou will create a new firewall policy to match a specific source, destination, service, and action set to <strong>DENY<\/strong>.\n<table class=\"aligncenter\" style=\"width: 100%;\"><caption>Table 2.2: Firewall policy configuration<\/caption>\n<tbody>\n<tr>\n<th scope=\"col\">Field<\/th>\n<th scope=\"col\">Value<\/th>\n<\/tr>\n<tr>\n<td>Name<\/td>\n<td>Block_Ping<\/td>\n<\/tr>\n<tr>\n<td>Incoming Interface<\/td>\n<td>Port2<\/td>\n<\/tr>\n<tr>\n<td>Outgoing Interface<\/td>\n<td>Port3<\/td>\n<\/tr>\n<tr>\n<td>Source<\/td>\n<td>LOCAL_SUBNET<\/td>\n<\/tr>\n<tr>\n<td>Destination<\/td>\n<td>All<\/td>\n<\/tr>\n<tr>\n<td>Schedule<\/td>\n<td>Always<\/td>\n<\/tr>\n<tr>\n<td>Service<\/td>\n<td>PING<\/td>\n<\/tr>\n<tr>\n<td>Action<\/td>\n<td>DENY<\/td>\n<\/tr>\n<tr>\n<td>Log Violation Traffic<\/td>\n<td>&lt;enable&gt;<\/td>\n<\/tr>\n<tr>\n<td>Enable this policy<\/td>\n<td>&lt;enable&gt;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-51\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068.jpg\" alt=\"Set firewall policy to block ping\" width=\"500\" height=\"390\"> Figure 2.14: Set firewall policy to block ping[\/caption]\n\nClick <strong>OK<\/strong> to save the changes. Add this policy on top of the previous policy.\n\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"984\"]<img class=\"wp-image-52 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069.jpg\" alt=\"Priority of Block_Ping should be higher than LocalToInternet\" width=\"984\" height=\"320\"> Figure 2.15: Priority of Block_Ping should be higher than LocalToInternet[\/caption]\n\nGo to <strong>Webterm1<\/strong> and ping <strong>4.2.2.4<\/strong>. You shouldn't be able to ping!\n\n[caption id=\"attachment_53\" align=\"aligncenter\" width=\"1249\"]<img class=\"wp-image-53 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070.jpg\" alt=\"Webterm1 and ping 4.2.2.4. You shouldn't be able to ping!\" width=\"1249\" height=\"837\"> Figure 2.16: Verify ping in the WebTerm1[\/caption]","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Create a Security Policy in FortiGate<\/li>\n<li>Reorder Firewall Policies and Firewall Policy Actions<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to allow traffic from the local network to the Internet. We will set Security Policy that allows the traffic from Port 2 to Port 3. Then, WebTerm1 will be able to reach the Internet.<\/div>\n<h2 style=\"text-align: left;\">Security Policy<\/h2>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 931px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-38 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0.jpg\" alt=\"Security Policy main scenario\" width=\"931\" height=\"437\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0.jpg 931w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0-300x141.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0-768x360.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0-65x31.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0-225x106.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/2-0-350x164.jpg 350w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.1: Main scenario<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<div class=\"level4\">\n<table class=\"aligncenter\" style=\"border-collapse: collapse; width: 100%;\">\n<caption>Table 2.1: Devices configuration<\/caption>\n<tbody>\n<tr style=\"height: 18px;\">\n<th style=\"width: 16.4488%; height: 18px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 50.2178%; height: 18px;\" scope=\"col\">Configuration<\/th>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"width: 16.4488%; height: 18px;\">FortiGate<\/td>\n<td style=\"width: 50.2178%; height: 18px;\">Port 2: DHCP Server<\/p>\n<p>Port 3: DHCP Client<\/td>\n<\/tr>\n<tr style=\"height: 18px;\">\n<td style=\"width: 16.4488%; height: 18px;\">\u00a0WebTerm<\/td>\n<td style=\"width: 50.2178%; height: 18px;\">DHCP Client<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Configuration of port1 of the firewall in CLI is as follows:<\/p>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 578px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-39 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-3.jpg\" alt=\"Configuration of Port1\" width=\"578\" height=\"234\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-3.jpg 578w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-3-300x121.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-3-65x26.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-3-225x91.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-3-350x142.jpg 350w\" sizes=\"auto, (max-width: 578px) 100vw, 578px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.2: Configuration of port1<\/figcaption><\/figure>\n<ol>\n<li>Open the browser in WebTerm2 and type https:\/\/192.168.0.1. You should be able to access the firewall.<br \/>\n<figure id=\"attachment_40\" aria-describedby=\"caption-attachment-40\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-40\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4.jpg\" alt=\"Login in to the FortiGate\" width=\"400\" height=\"297\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4.jpg 1023w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4-300x223.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4-768x571.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4-65x48.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4-225x167.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-4-350x260.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-40\" class=\"wp-caption-text\">Figure 2.3: Log in to the FortiGate<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Network<\/strong> &gt; <strong>Interfaces<\/strong> &gt; <strong>Port2<\/strong>, set the interface IP address as <strong>192.168.1.1\/24<\/strong> and configure DHCP server on interface port2 (Range of IP addresses should be: 192.168.1.20 to 192.168.1.30, DNS: 4.2.2.4) and <strong>Enable Device Detection<\/strong> under Port2.<br \/>\n<figure id=\"attachment_41\" aria-describedby=\"caption-attachment-41\" style=\"width: 1150px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-41 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2.jpg\" alt=\"Enable DHCP Server\" width=\"1150\" height=\"632\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2.jpg 1150w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2-300x165.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2-1024x563.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2-768x422.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2-65x36.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2-225x124.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-5-2-350x192.jpg 350w\" sizes=\"auto, (max-width: 1150px) 100vw, 1150px\" \/><figcaption id=\"caption-attachment-41\" class=\"wp-caption-text\">Figure 2.4: Enable DHCP Server<\/figcaption><\/figure>\n<\/li>\n<li>Set a port3 as a DHCP client and enable<strong> Device Detection<\/strong> under Port3.<br \/>\n<figure id=\"attachment_42\" aria-describedby=\"caption-attachment-42\" style=\"width: 914px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-42 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6.jpg\" alt=\"Enable DHCP Client\" width=\"914\" height=\"218\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6.jpg 914w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6-300x72.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6-768x183.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6-65x16.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6-225x54.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-6-350x83.jpg 350w\" sizes=\"auto, (max-width: 914px) 100vw, 914px\" \/><figcaption id=\"caption-attachment-42\" class=\"wp-caption-text\">Figure 2.5: Enable DHCP Client<\/figcaption><\/figure>\n<\/li>\n<li>Set a Static route in the firewall to reach the NAT object. Go to <strong>Network &gt; Static Route &gt; Create a new<\/strong>.<br \/>\n<figure id=\"attachment_43\" aria-describedby=\"caption-attachment-43\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-43\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-7.jpg\" alt=\"Configure a static route\" width=\"400\" height=\"350\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-7.jpg 702w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-7-300x263.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-7-65x57.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-7-225x197.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-7-350x307.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-43\" class=\"wp-caption-text\">Figure 2.6: Configure a static route<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Policy &amp; Objects &gt; Firewall Policy<\/strong> section, click <strong>Create New<\/strong> to add a new firewall policy, and configure the following settings:\n<ul>\n<li>Name: <strong>LocalToInternet<\/strong><\/li>\n<li>From <strong>inside<\/strong> to <strong>outside (port2 to port3)<\/strong><\/li>\n<li>Source:<strong> Create an address for local network (Subnet: 192.168.1.0\/24)<\/strong><\/li>\n<li>Destination: <strong>all<\/strong><\/li>\n<li>Schedule: <strong>Always<\/strong><\/li>\n<li>Service: Only <strong>HTTP, HTTPS, DNS, Ping<\/strong><\/li>\n<li>Action: <strong>Accept<\/strong><\/li>\n<\/ul>\n<figure id=\"attachment_45\" aria-describedby=\"caption-attachment-45\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-44\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-8.jpg\" alt=\"set local subnet\" width=\"400\" height=\"241\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-8.jpg 695w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-8-300x181.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-8-65x39.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-8-225x136.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-8-350x211.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-45\" class=\"wp-caption-text\">Figure 2.7: Set local subnet<\/figcaption><\/figure>\n<figure id=\"attachment_45\" aria-describedby=\"caption-attachment-45\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-45\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9.jpg\" alt=\"Set firewall policy\" width=\"500\" height=\"341\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9.jpg 1033w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9-300x204.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9-1024x698.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9-768x523.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9-65x44.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9-225x153.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-9-350x239.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-45\" class=\"wp-caption-text\">Figure 2.8: Set firewall policy<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>WebTerm1<\/strong>, Set interface as DHCP and then open the browser, you should be able to access the internet.<br \/>\n<figure id=\"attachment_47\" aria-describedby=\"caption-attachment-47\" style=\"width: 1053px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-46 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1.jpg\" alt=\"Enable DHCP Client on webterm1\" width=\"1053\" height=\"729\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1.jpg 1053w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1-300x208.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1-1024x709.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1-768x532.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1-65x45.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1-225x156.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-10-1-350x242.jpg 350w\" sizes=\"auto, (max-width: 1053px) 100vw, 1053px\" \/><figcaption id=\"caption-attachment-47\" class=\"wp-caption-text\">Figure 2.9: Enable DHCP Client on WebTerm1<\/figcaption><\/figure>\n<figure id=\"attachment_47\" aria-describedby=\"caption-attachment-47\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-47\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11.jpg\" alt=\"Verify your configuration by testing google.com\" width=\"500\" height=\"360\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11.jpg 1268w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11-300x216.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11-1024x737.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11-768x553.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11-65x47.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11-225x162.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-11-350x252.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-47\" class=\"wp-caption-text\">Figure 2.10: Verify your configuration by testing Google.com<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n<h2>Verify Your Configuration<\/h2>\n<ul>\n<li>Go to <strong>Dashboard <\/strong>&gt; <strong>FortiView Sessions<\/strong>. You should be able to see the traffic.<\/li>\n<\/ul>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 1270px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-48 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12.jpg\" alt=\"Fortiview Sessions\" width=\"1270\" height=\"742\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12.jpg 1270w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12-300x175.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12-1024x598.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12-768x449.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12-65x38.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12-225x131.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-12-350x204.jpg 350w\" sizes=\"auto, (max-width: 1270px) 100vw, 1270px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.11: FortiView Sessions<\/figcaption><\/figure>\n<ul>\n<li>\u00a0Go to Firewall Policy and on the right side of the screen, you should be able to see <strong>Hit count.<\/strong><\/li>\n<\/ul>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 1261px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-49 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1.jpg\" alt=\"Hit count in the Firewall Policy\" width=\"1261\" height=\"796\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1.jpg 1261w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1-300x189.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1-1024x646.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1-768x485.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1-65x41.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1-225x142.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-13-1-350x221.jpg 350w\" sizes=\"auto, (max-width: 1261px) 100vw, 1261px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.12: Hit count in the Firewall Policy<\/figcaption><\/figure>\n<ul>\n<li>Go to <strong>Dashboard<\/strong> &gt; <strong>Users &amp; Devices<\/strong> &gt; <strong>Device Inventory<\/strong> and verify the IP and Mac address of the device.<\/li>\n<\/ul>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 1268px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-50 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14.jpg\" alt=\"Device Inventory\" width=\"1268\" height=\"740\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14.jpg 1268w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14-300x175.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14-1024x598.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14-768x448.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14-65x38.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14-225x131.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/2-14-350x204.jpg 350w\" sizes=\"auto, (max-width: 1268px) 100vw, 1268px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.13: Device Inventory<\/figcaption><\/figure>\n<h2>Reordering Firewall Policies and Firewall Policy Actions<\/h2>\n<p>FortiGate will look for a matching policy, beginning at the top. Usually, you should put more specific policies at the top; otherwise, more general policies will match the traffic first, and your more granular policies will never be applied.<\/p>\n<p>You will create a new firewall policy with more specific settings such as source, destination, service, and action set to <strong>DENY<\/strong>. Then, you will move this firewall policy above the existing firewall policies and observe the behaviour of firewall policy reordering.<\/p>\n<h3>Create a firewall policy<\/h3>\n<p>You will create a new firewall policy to match a specific source, destination, service, and action set to <strong>DENY<\/strong>.<\/p>\n<table class=\"aligncenter\" style=\"width: 100%;\">\n<caption>Table 2.2: Firewall policy configuration<\/caption>\n<tbody>\n<tr>\n<th scope=\"col\">Field<\/th>\n<th scope=\"col\">Value<\/th>\n<\/tr>\n<tr>\n<td>Name<\/td>\n<td>Block_Ping<\/td>\n<\/tr>\n<tr>\n<td>Incoming Interface<\/td>\n<td>Port2<\/td>\n<\/tr>\n<tr>\n<td>Outgoing Interface<\/td>\n<td>Port3<\/td>\n<\/tr>\n<tr>\n<td>Source<\/td>\n<td>LOCAL_SUBNET<\/td>\n<\/tr>\n<tr>\n<td>Destination<\/td>\n<td>All<\/td>\n<\/tr>\n<tr>\n<td>Schedule<\/td>\n<td>Always<\/td>\n<\/tr>\n<tr>\n<td>Service<\/td>\n<td>PING<\/td>\n<\/tr>\n<tr>\n<td>Action<\/td>\n<td>DENY<\/td>\n<\/tr>\n<tr>\n<td>Log Violation Traffic<\/td>\n<td>&lt;enable&gt;<\/td>\n<\/tr>\n<tr>\n<td>Enable this policy<\/td>\n<td>&lt;enable&gt;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-51\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068.jpg\" alt=\"Set firewall policy to block ping\" width=\"500\" height=\"390\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068.jpg 863w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068-300x234.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068-768x600.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068-65x51.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068-225x176.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00068-350x273.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.14: Set firewall policy to block ping<\/figcaption><\/figure>\n<p>Click <strong>OK<\/strong> to save the changes. Add this policy on top of the previous policy.<\/p>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 984px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-52 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069.jpg\" alt=\"Priority of Block_Ping should be higher than LocalToInternet\" width=\"984\" height=\"320\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069.jpg 984w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069-300x98.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069-768x250.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069-65x21.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069-225x73.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00069-350x114.jpg 350w\" sizes=\"auto, (max-width: 984px) 100vw, 984px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.15: Priority of Block_Ping should be higher than LocalToInternet<\/figcaption><\/figure>\n<p>Go to <strong>Webterm1<\/strong> and ping <strong>4.2.2.4<\/strong>. You shouldn&#8217;t be able to ping!<\/p>\n<figure id=\"attachment_53\" aria-describedby=\"caption-attachment-53\" style=\"width: 1249px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-53 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070.jpg\" alt=\"Webterm1 and ping 4.2.2.4. You shouldn't be able to ping!\" width=\"1249\" height=\"837\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070.jpg 1249w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070-300x201.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070-1024x686.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070-768x515.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070-65x44.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070-225x151.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/ScreenShot00070-350x235.jpg 350w\" sizes=\"auto, (max-width: 1249px) 100vw, 1249px\" \/><figcaption id=\"caption-attachment-53\" class=\"wp-caption-text\">Figure 2.16: Verify ping in the WebTerm1<\/figcaption><\/figure>\n","protected":false},"author":124,"menu_order":2,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"class_list":["post-54","chapter","type-chapter","status-publish","hentry","chapter-type-standard"],"part":37,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/124"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/54\/revisions"}],"predecessor-version":[{"id":55,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/54\/revisions\/55"}],"part":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/parts\/37"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/54\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=54"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapter-type?post=54"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=54"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}