Cfg for FortiAnalyzer
1. Set TLS to minimum version 1.2:2. Change FAZ certificate to one using the correct FQDN from your/a public CA:
Debugging can be done using the fowlloing commands:
Oftpd daemon test usage: diagnose test application oftpd <integer>
FAZ looks like this:
1
: show PID2
: show statistics and state3
: show connected device name and IP4
: show detailed session state5
: show oftp request statistics6
: show cmdb device cache7
: show logfwd thread stats8
: show tasklist statistics9
: show unreg dev cache10
: log cluster bridge stats20
: show forticlent end-user stats21
: rebuild forticlient end-user avatar table90
: reload un-reg device tree99
: restart daemon
FAZ looks like this:
(global)# get
dh-params
: 8192
enc-algorithm
: high
fgfm-ssl-protocol
: tlsv1.2
oftp-ssl-protocol
: tlsv1.2
ssl-low-encryption
: disable
ssl-protocol
: tlsv1.2
ssl-static-key-ciphers:
disable
webservice-proto
: tlsv1.2
Cfg for FortiGate
1. Change TLS ciphers to high:
config log fortianalyzer
setting
set
enc-algorithm high
end
2. Change Global TLS-Settings
config system global
set ssl-static-key-ciphers disable
set dh-params 8192
set strong-crypto enable
end
No comments:
Post a Comment