SmartEDB Wiki
Attachments
History
Blame
Rename
Delete
Changelog
Documentation
Toggle dark mode
Login
Home
A - Z
Create page
Page Index
Defender
Fortinet
NSE4
Home
Intune
An Otter Wiki
Fortinet
a2cad1
Commit
a2cad1
2026-04-03 16:40:45
Peter
: e
fortinet.md
..
@@ 1,77 1,2 @@
# Fortinet
Knowledge about all things fortinet
-
-
# Certifications
-
## NSE4 - Basics
-
What to know for NSE4 - Basics of fortinet
-
-
### Routing
-
#### RPF
-
--- Reverse Path Forwarding ---
-
-
Anti IP Spoofing.
-
-
✅ Strict RPF (uRPF strict)
-
A packet is allowed only if the best (longest‑match / preferred) route back to the source IP would exit the same interface the packet arrived on.
-
-
Think: “Would I send the reply back out the same interface?”
-
If no → drop.
-
-
✅ Loose RPF (uRPF loose)
-
A packet is allowed if the firewall/router has any route at all to the source IP (regardless of interface). It’s basically a route existence check.
-
-
Think: “Do I have some route to that source?”
-
If yes → allow.
-
-
##### RPF Example
-
-
Topology (classic multi-homed/asymmetric routing)
-
ISP-A (WAN1) -----------------
-
| \
-
| (best route to source) \ Internet
-
+---+---+ \
-
| Forti | \
-
| Gate | \
-
+---+---+ \
-
| \
-
ISP-B (WAN2) ------------------------(packet arrives here)
-
-
Routing table on FortiGate (simplified)
-
203.0.113.0/24 via WAN1 ← best/preferred route
-
default route(s), etc.
-
-
Traffic event
-
A packet arrives on WAN2:
-
-
Src = 203.0.113.5
-
Dst = your public VIP / service
-
Ingress interface = WAN2
-
-
RPF decision
-
Strict RPF:
-
-
Look up route to 203.0.113.5
-
Best route says: send to WAN1
-
But packet came in WAN2
-
Mismatch → DROP
-
-
Loose RPF:
-
-
Look up route to 203.0.113.5
-
A route exists (via WAN1)
-
Loose mode does not care that it arrived on WAN2
-
Route exists → ALLOW
-
-
### FSSO
-
-
### Security Profiles
-
-
#### Anti Virus
-
-
#### Web Filter
-
-
#### IPS
-
-
#### Application Control
-
-
### Certificates
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9