Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
rzahraoui
New Contributor

Designs Fortigate (FireWall / Proxy)

Hi All, My company has purchased FortiGate 100D, with the aim of using them as proxy. Except that I also want to enjoy the Firewalling and IDS roles of that range ==> I want to use as the first level Firewall keeping existing firewalls (ASA). Could you help me by telling me what design/architecture to implement for both cases, knowing that we already have to keep ASA Firewall Case 1: Fortigate as proxy + Firewall ASA. Case 2: Fortigate as Proxy/Firewall/IDS + ASA Firewall (in this case the DMZ already created in the ASA Firewall will be moved to Fortigate) Thanks for all, Rachid
26 REPLIES 26
emnoc
Esteemed Contributor III

You could do exactly what you want and in " transparent" mode. Do you really need proxy in a dmz and what other UTM features do you need within the DMZ ( i.e webfilter, email AS, AV detection or DLP, etc......) Transparent will provide the simplest and least impact to any network changes. ANd doesn' t require any l3 re-addressing. If you want to run a tier' d stacked firewalls ( ASA exterior and FGT interior ) and protect your internal lan depts, you could also do this. As a matter of fact your could run mixed-match transparent and routed vdoms to do what you want in each vdom. please see sample drawg

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
rzahraoui

Thanks! Yes i want use all of these features (email AS, AV detec...)
lightmoon1992
New Contributor

Old school: it would be better to have two consecutive firewalls with the DMZ setup. Functionality point of view, ASA will do you nothing more than firewalling, which could be handled by the FortiGate itself, so this will save you extra processing layer with all of its time related consumptions. Do you have any published servers so you may need to consider other security layers? Mohammad

Mohammad Al-Zard

 

Mohammad Al-Zard
rzahraoui
New Contributor

Yes i have some published servers, majority of them are on DMZ behind ASA.
lightmoon1992
New Contributor

Just keep in mind FortiGate is doing the network security part of the cycle, however, if you have mail server for example, you should take care of it by another appliance (Fortinet FortiMail). for published servers, you keep them apart from your local network, this is by different logical or physical network. Mohammad

Mohammad Al-Zard

 

Mohammad Al-Zard
rzahraoui
New Contributor

Hi All, I re-take emnoc' s scheme with a slight modification, I added an inter-subnet between ASA and FGT (a dedicate private network between them). So i will use ASA in NAT/Routed mode, and FGT will be explict. All Flow on FGT will be sent to ASA (default route). I keep DMZs on ASA, but I don' t know if there is an utility to pass this dmz through the FGT? What do you think about this design, is there any inconvenient on it? Rachid
lightmoon1992
New Contributor

First of all, you need to make sure that you are configuring two different L2 networks at your internal switch, otherwise it will be big problem. Also, why you are making direct connection between switch and ASA? this may lead to bypassing the FortiGate Mohammad

Mohammad Al-Zard

 

Mohammad Al-Zard
rzahraoui
New Contributor

This Direct connection is for managing ASA, is there other way to get this without direct connection?
lightmoon1992
New Contributor

You still can access the ASA through the same link for users. the most important question is how you manage these three segments via your switch? is it L2/L3 switch or just configured as on broadcast domain? Mohammad

Mohammad Al-Zard

 

Mohammad Al-Zard
rzahraoui
New Contributor

Yes, subnets/vlans will be manage by a L2/L3 Switch. Intreco Scheme will be like this, Still the question, DMZ can pass trough FGT, or there is no need ==> DMZ directly connected between Backbone(Switch) and ASA.
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors