I have a basic question: From your experience, what would you recommend as a naming convention for the objects (hosts, networks, ports etc) in a fortigate firewall that is more practical and makes it easier later to support and resolve problems?
Your feedback will be appreciated!
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
IMHO and to help in audits
1: name them the same as local dns
2: stick to all upper or lower case
3: try to avoid spaces
e.g
WINHOST01 AAA
vrs
WINHOST01AAA
4: standardize the naming convention no matter what method you go by
e.g GEO or region or purpose
EQXCH3WEBSRV001
EQXNY2WEBSRV001
EQXNY2LDAPMS001
5: Keep aware of the maximum character name value ( 63 )
Ken
PCNSE
NSE
StrongSwan
I will typically put the object type in the name to make it easier to distinguish what you are looking at. For example you might have an interface, vlan, and zone all named internal- so the interface would be internal, then internalVLAN, and internalZONE to separate them. I will put VIP at the end of VIPs to distinguish between the original object and the VIP to that object. Sometimes you have a VPN that connects two networks that are similar function, so i'll put VPN at the end of the vpn interface name. Address groups have group at the end to distinguish them.
To put it together in an example you have a network that just connects backup servers in two locations. You have the BackupVLAN which comprises the BackupZONE. It talks over the BackupVPN to another location. You have traffic rules that allow from BackupServersGroup in BackupZONE to BackupVPN.
It sounds redundant, but it makes it easier to distinguish things when looking at the config file since there is no icon coding there- you can easily tell if a policy is going to a vip, or address, or address group.
Definitely agree with emnoc- keep addresses to what the dns/hostnames are for individual devices both for sanity and auditing. Use the comment field to specify that it's a certain user if you want to. I also name addresses that are entire subnets something different to indicate that like servernetwork or usernetwork.
As far as case sensitivity is concerned- the fortigate is case sensitive and Capital letters come before lowercase ones, so if you have an address item with a lowercase letter first, it will appear after all the other capitalized ones in the gui.
CISSP, NSE4
IMHO and to help in audits
1: name them the same as local dns
2: stick to all upper or lower case
3: try to avoid spaces
e.g
WINHOST01 AAA
vrs
WINHOST01AAA
4: standardize the naming convention no matter what method you go by
e.g GEO or region or purpose
EQXCH3WEBSRV001
EQXNY2WEBSRV001
EQXNY2LDAPMS001
5: Keep aware of the maximum character name value ( 63 )
Ken
PCNSE
NSE
StrongSwan
6. stick to ASCII!
6. stick to ASCII!
Be cautious of ASCII
e.g
FGT01 (address) # edit +#@333 The string contains XSS vulnerability characters value parse error before '+#@333' Command fail. Return code -173 FGT01 (address) # edit +# The string contains XSS vulnerability characters value parse error before '+#' Command fail. Return
FGT01 (address) # edit #456 The string contains XSS vulnerability characters value parse error before '#456' Command fail. Return code -173
All are ASCII but they will not work
;)
PCNSE
NSE
StrongSwan
thanks for the input.
How about networks, interfaces, services, vips ??
I will typically put the object type in the name to make it easier to distinguish what you are looking at. For example you might have an interface, vlan, and zone all named internal- so the interface would be internal, then internalVLAN, and internalZONE to separate them. I will put VIP at the end of VIPs to distinguish between the original object and the VIP to that object. Sometimes you have a VPN that connects two networks that are similar function, so i'll put VPN at the end of the vpn interface name. Address groups have group at the end to distinguish them.
To put it together in an example you have a network that just connects backup servers in two locations. You have the BackupVLAN which comprises the BackupZONE. It talks over the BackupVPN to another location. You have traffic rules that allow from BackupServersGroup in BackupZONE to BackupVPN.
It sounds redundant, but it makes it easier to distinguish things when looking at the config file since there is no icon coding there- you can easily tell if a policy is going to a vip, or address, or address group.
Definitely agree with emnoc- keep addresses to what the dns/hostnames are for individual devices both for sanity and auditing. Use the comment field to specify that it's a certain user if you want to. I also name addresses that are entire subnets something different to indicate that like servernetwork or usernetwork.
As far as case sensitivity is concerned- the fortigate is case sensitive and Capital letters come before lowercase ones, so if you have an address item with a lowercase letter first, it will appear after all the other capitalized ones in the gui.
CISSP, NSE4
One cool things on NAMING, you can always rename firewall.adress and adrgp . So if you later change your format or need to bring objects into standard, it is easy todo.
Ken
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1696 | |
1091 | |
752 | |
446 | |
228 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.