FortiADC Deployment Guide. High-Performance SSL Inspection With FortiADC and FortiGate
FortiADC Deployment Guide. High-Performance SSL Inspection With FortiADC and FortiGate
FORTINET VIDEO GUIDE
http://video.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
CUSTOMER SERVICE & SUPPORT
https://support.fortinet.com
FORTIGATE COOKBOOK
http://cookbook.fortinet.com
FORTINET TRAINING SERVICES
http://www.fortinet.com/training
FORTIGUARD CENTER
http://www.fortiguard.com
FEEDBACK
Email: [email protected]
February 4, 2016
Revision 1
TABLE OF CONTENTS
Change Log 4
Introduction 5
Benefits of FortiADC and FortiGate for SSL Inspection 6
The FortiADC difference 7
The FortiGate difference 8
Deployment topology 9
Hardware and software used in this example 10
Configuration overview 11
FortiGate configuration guidelines 12
FortiADC Configuration 13
Internal FortiADC configuration 13
Step 1: Configure network interfaces and a static route 13
Step 2: Import an intermediate CA to be used for SSL forward proxy 15
Step 3: Configure health checks 17
Step 4: Configure the real server pool 18
Step 5: Configure the virtual server profile 21
Step 6: Configure an L2 exception list (optional) 24
Step 7: Configure the virtual server 24
Step 8: Configure a Link Load Balancing policy to load balance all other traffic 26
External FortiADC configuration 29
Step 1: Configure network interfaces and a static route 29
Step 2: Configure the real server pool 31
Step 3: Configure the virtual server 32
Appendix A: Importing the Intermediate CA certificate into a web browser 36
Appendix B: SSL forward proxy packet flow 39
Appendix C: FortiADC configurations 40
Internal FortiADC 40
External FortiADC 47
Change Log
Change Log
FortiADC Deployment Guide 4
Fortinet Technologies Inc.
Introduction
Introduction
HTTPS encryption is the foundation for secure Internet traffic. Online banking, e-commerce, and even sites like
Google and Facebook, all rely on SSL to provide their users a safe, trusted way to ensure sensitive data is
protected when it’s sent over the internet. Many organizations rely on SSL for their own services such as email
and internal applications that are made available on the Internet for remote employees.
However this increased level of security for you also benefits cyber attackers too. They are focusing on the use of
SSL/TLS, because they know the majority of organizations blindly trust encrypted communications and don’t (or
can’t) decrypt them.
Gartner believes that by 2017, more than 50% of network attacks, both inbound and outbound, will use encrypted
SSL/TLS communications. If you’re not deeply inspecting secure traffic with your FortiGate or other security
tools, you’re only going to get half the job done.
SSL decryption and re-encryption is a CPU intensive task, especially with most websites having deployed larger
2048 encryption keys with some even moving to 4096. For years FortiGate firewalls have offered SSL decryption
and re-encryption for deep packet inspection. This however comes at a price in both firewall performance and in
real costs as many users have to spend much more on a higher-capacity model with SSL ASICs to handle traffic
volumes for their network.
Using FortiADC with FortiGate leverages the strengths of two time-tested Fortinet technologies. With FortiADCs
at the front and back ends of a data center’s network security elements, clear traffic speeds through the FortiGate
and other security services at top speeds without the overhead of decrypting and re-encrypting secure traffic.
5 FortiADC Deployment Guide
Fortinet Technologies Inc.
Benefits of FortiADC and FortiGate for SSL Inspection
FortiADC Deployment Guide 6
Fortinet Technologies Inc.
The FortiADC difference
There are a number of hardware load balancing products available on the market with a wide range of features
and capabilities. FortiADC differentiates itself by providing superior value, high performance, reliability, advanced
acceleration features, and security from a market leader.
FortiADC not only load balances Internet service requests across multiple servers, but also accelerates
application performance and provides application-aware features that monitor server load and improve server
response times – by as much as 25%. In addition to basic load balancing, FortiADC provides:
7 FortiADC Deployment Guide
Fortinet Technologies Inc.
The FortiGate difference
Fortinet delivers unparalleled protection, ease of use, and performance from its next generation network security
platforms to protect against sophisticated cyberthreats. We are a leading global provider of network security
appliances available in both hardware and virtualized form factors to fit unique requirements of carriers, data
centers, enterprises and distributed offices.
We combine the most advanced threat intelligence from FortiGuard Labs with our FortiOS operating system and
purpose-built FortiASIC processors to provide consistently top-rated security, deeper visibility, and superior
performance.
n End-to-end security across the full attack cycle to close gaps in protection.
n Independently validated 99%+ security effectiveness to increase protection.
n NSS Labs "Recommended" NGFW and NGIPS.
n Internal Segmentation Firewall deployment mode to protect the network from the inside-out.
n Single pane of glass management for unmatched visibility and control.
n Best-in-class performance/price to maximize investment value.
n Integrated high port density for maximum flexibility.
n Cloud readiness with multi-tenant and fast integration with 3rd party ecosystems.
For more information on how FortiGate can make your applications work better, faster, and more economically,
please visit http://www.fortinet.com/products/FortiGate/index.html.
FortiADC Deployment Guide 8
Fortinet Technologies Inc.
Deployment topology
Deployment topology
This section shows the most common deployment topology for SSL inspection with FortiADC and FortiGate.
Figure 1 shows an inline topology. FortiADC appliances are deployed at the front- and back-end of a FortiGate
cluster to provide decryption and re-encryption of SSL traffic. This solution is described in this document.
In addition to decryption and re-encryption of secure traffic, FortiADC can direct traffic among multiple FortiGates
and other security devices. Using health monitoring, load balancing, and persistent connections, network traffic is
sent to the best performing security resources in the network. Depending on security elements in place, FortiADC
can intelligently route traffic to different destinations by packet type. For example, it can be configured to
automatically route all SMTP traffic to an email security device like FortiMail instead of to the FortiGate for
inspection.
9 FortiADC Deployment Guide
Fortinet Technologies Inc.
Hardware and software used in this example
The following hardware and software were used in testing this example:
l FortiADC VM
l FortiADC OS Version 4.4.0
l FortiGate VM
l FortiGate OS Version 5.4
l Custom client/server hardware running VMware ESX 4 (Windows 8.1)
Important: This guide is written only for the FortiADC D-Series platform. The instructions included within are not
designed to be used with the FortiADC E-Series platform application delivery controllers.
FortiADC Deployment Guide 10
Fortinet Technologies Inc.
Configuration overview
Configuration overview
Basic steps
11 FortiADC Deployment Guide
Fortinet Technologies Inc.
FortiGate configuration guidelines
In this deployment, the internal FortiADC load balances decrypted traffic to two identical FortiGate units. The two
FortiGate units must be the same model and run the same version of FortiOS. If one of the FortiGate cluster
members fails, session failover occurs, and active sessions fail over to the peer that is still operating. This failover
occurs without any loss of data. The external FortiADC will detect the failover and re-distribute all sessions to the
peer that is still operating.
In the FortiGate deployment, you use the config system cluster-sync command to enable the
FortiGate Session Life Support Protocol (FGSP) to synchronize session tables. By default, FGSP synchronizes all
IPv4 and IPv6 TCP sessions, IPsec tunnels, and also synchronizes the configuration of the FortiGate units. You
can optionally enable session pickup to synchronize connectionless (UDP and ICMP) sessions, expectation
sessions, and NAT sessions.
Since session pickup requires FortiGate resources, only enable this feature for sessions that you need to have
synchronized. If you do not enable session pickup, the FGSP does not share session tables for the particular
session type and sessions do not resume after a failover. Sessions that are interrupted by the failover and must
be re-established at the application level. Many protocols can successfully restart sessions with little, or no, loss
of data. Others may not recover easily. Enable session pickup for sessions that may be difficult to reestablish.
You can also optionally add filters to control which sessions are synchronized. You can add filters to only
synchronize packets from specified source and destination addresses, specified source and destination
interfaces, and specified services.
By default configuration synchronization is disabled. You can use the following command to enable it.
config system ha
set standalone-config-sync enable
end
Settings that identify the FortiGate unit to the network, for example, interface IP addresses and BGP neighbor
settings are not synchronized so each FortiGate unit maintains its identity on the network.
FortiADC Deployment Guide 12
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
FortiADC Configuration
This section provides configuration guidelines for the FortiADC appliances on each side of the sandwich:
This section describes the internal FortiADC configuration. It includes the following steps:
13 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
FortiADC Deployment Guide 14
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
To create a static route, go to Networking > Routing. Figure 4 shows the static route configuration page.
The following steps create the certificate configuration used in this example:
1. Use Open SSL to generate an intermediate CA and key:
l Create a private root key. The following OpenSSL command creates a 2048 bit key:
l Self-sign this certificate. The following command starts an interactive script to populate the contents of the
PEM certificate file (fill it out as appropriate for your organization):
openssl req -x509 -new -nodes -key FortiADC.key -days 1024 -out
FortiADC.pem
2. Import the Intermediate CA and key into FortiADC. Go to System > Manage Certificates > Intermediate CA and
click Import to display the configuration page. Import both the PEM certificate file and the key file.
3. Configure an Intermediate CA group. Make the member that includes the special Intermediate CA the default for
the group. Go to System > Manage Certificates > Intermediate CA Group and click Add to display the
configuration page.
4. Configure a local certificate group that includes any local certificate (including the factory certificate) and the
Intermediate CA group that contains the special Intermediate CA. Make this member the default. Go to System >
Manage Certificates > Local Certificate Group and click Add to display the configuration page.
This example shows an Intermediate CA generated with OpenSSL. You can also use
an Intermediate CA signed by your enterprise certificate server (such as a Microsoft
Certificate Services) or one of the CA vendors that has its root certificates preinstalled
in the web browsers.
15 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
FortiADC Deployment Guide 16
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
To configure a health check, go to System > Shared Resources > Health Check.
17 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
To configure real server pools, go to Server Load Balance > Real Server Pool. Table 1 summarizes the real server
pool configuration for this example. Figure 9 through Figure 11 show the configuration pages.
Name L2VSRS
Health Check List LB_HLTHCK_ICMP The predefined health check to test whether the next hop
is responsive.
Real Server SSL Pro- LB_RS_PROF_NONE The predefined profile that indicates SSL is not used
file between the FortiADC and the FortiGate cluster mem-
bers.
FortiADC Deployment Guide 18
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
Member
IP Address 10.1.65.163
10.1.60.165
Port 8080 We use port 8080 so that FortiADC and FortiGate can
distinguish regular HTTP traffic (port 80) from traffic
decrypted by FortiADC (port 8080).
Health Check Inherit Enable In this example, the member inherits the configuration
/ RS Profile Inherit from the master pool configuration. If necessary, you can
apply a different configuration to members.
19 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
FortiADC Deployment Guide 20
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
To configure a virtual server profile, go to Server Load Balance > Profile. Table 2 summarizes the virtual server
profile configuration for this example. Figure 12 shows the configuration page.
21 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
Name 183p1
Type HTTPS
SSL Ciphers ECDHE-RSA-AES256-GCM- The cipher list includes strong ciphers. Your list
SHA384 ECDHE-RSA-
AES256-SHA384 ECDHE- can include
RSA-AES256-SHA DHE-
RSA-AES256-GCM-SHA384
DHE-RSA-AES256-SHA256
DHE-RSA-AES256-SHA
AES256-GCM-SHA384
AES256-SHA256 AES256-
SHA ECDHE-RSA-AES128-
GCM-SHA256 ECDHE-RSA-
AES128-SHA256 ECDHE-
RSA-AES128-SHA DHE-
RSA-AES128-GCM-SHA256
DHE-RSA-AES128-SHA256
DHE-RSA-AES128-SHA
AES128-GCM-SHA256
AES128-SHA256 AES128-
SHA ECDHE-RSA-RC4-SHA
Client SNI Required Not enabled. Enable to include the server hostname in the TLS
client hello message if you are using L2 Excep-
tion List.
FortiADC Deployment Guide 22
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
23 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
To configure an exception list, go to Server Load Balance > Virtual Server > L2 Exception List. Figure 13 shows
the configuration page.
To configure virtual servers, go to Server Load Balance > Virtual Server. Table 3 summarizes the virtual server
configuration for this example. Figure 14 shows the configuration summary page.
FortiADC Deployment Guide 24
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
Name L2VS183
Type Layer 2
25 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
Step 8: Configure a Link Load Balancing policy to load balance all other traffic
By default, traffic that does not match a FortiADC virtual server policy is forwarded toward its destination
according to the routing tables (static route, policy route, etc.). Routes in the Link Load Balancing table have
precedence over static routes, and we leverage them in this deployment to load balance non-SSL traffic to the
FortiGate cluster as well.
In this configuration, the FortiGate cluster members are the gateways that make up the link group that is load
balanced. You do not have to configure addresses for the Link Load Balancing Policy rules because the rules are
configured to match all traffic (all traffic not forwarded by Load Balance virtual server policy rules, that is).
FortiADC Deployment Guide 26
Fortinet Technologies Inc.
FortiADC Configuration Internal FortiADC configuration
1. Go to Link Load Balance > Link Group > Gateway and create two gateway objects—one for each FortiGate.
27 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC configuration FortiADC Configuration
2. Go to Link Load Balance > Link Group > Persistence and create a persistence configuration. In this example, we
have configured persistence by Source Address. Packets with a source IP address that belongs to the same
subnet are forwarded to the same gateway.
3. Go to Link Load Balance > Link Group and configure a link group that specifies the two gateways and the
persistence configuration.
FortiADC Deployment Guide 28
Fortinet Technologies Inc.
FortiADC Configuration External FortiADC configuration
4. Go to Link Load Balance > Link Policy and configure a link load balancing policy rule that matches all traffic to the
link group configure in the previous step. Note that if you do not specify Source, Destination, and Service objects,
it is equivalent to matching "any".
This section describes the external FortiADC configuration. It includes the following steps:
29 FortiADC Deployment Guide
Fortinet Technologies Inc.
External FortiADC configuration FortiADC Configuration
FortiADC Deployment Guide 30
Fortinet Technologies Inc.
FortiADC Configuration External FortiADC configuration
To create a static route, go to Networking > Routing. Figure 16 shows the static route configuration page.
To configure real server pools, go to Server Load Balance > Real Server Pool. Table 4 summarizes the real server
pool configuration for this example. Figure 17 shows the configuration summary page.
Name L2RSport443
Health Check List LB_HLTHCK_ICMP The predefined health check to test whether the next
hop is responsive.
Real Server SSL Pro- LB_RS_SSL_PROF_ The predefined profile that indicates SSL is used
file DEFAULT between the FortiADC and the next hop.
Member
IP Address 10.1.80.200
31 FortiADC Deployment Guide
Fortinet Technologies Inc.
External FortiADC configuration FortiADC Configuration
Health Check Inherit Enable In this example, the member inherits the configuration
/ RS Profile Inherit from the master pool configuration. If necessary, you
can apply a different configuration to members.
FortiADC Deployment Guide 32
Fortinet Technologies Inc.
FortiADC Configuration External FortiADC configuration
To configure virtual servers, go to Server Load Balance > Virtual Server. Table 5 summarizes the virtual server
configuration for this example. Figure 18 and Figure 19 show the configuration.
Type Layer 2
Real Server Pool L2RSport443 The pool configured in the previous step.
33 FortiADC Deployment Guide
Fortinet Technologies Inc.
External FortiADC configuration FortiADC Configuration
FortiADC Deployment Guide 34
Fortinet Technologies Inc.
FortiADC Configuration External FortiADC configuration
35 FortiADC Deployment Guide
Fortinet Technologies Inc.
Appendix A: Importing the Intermediate CA certificate into a web browser
When a client browser requests an HTTPS connection to a web server, the server presents a server certificate to
the client for verification. The client checks the content of the certificate against a local browser database of
Certificate Authorities, and if it finds a match, the connection is made. If no match is found, the browser displays
a warning that asks if you want to continue with the connection, similar to the following.
Even if the user dismisses the error message and continues, the browser still might show an error in the toolbar.
If the certificate used for SSL forward proxy was signed by your enterprise certificate server (such as a Microsoft
Certificate Services) or one of the CA vendors that has its root certificates preinstalled in the web browsers,
clients will not encounter these messages because the certificate Issuer is trusted.
If you use an OpenSSL self-signed certificate and key (as shown in this example), you must distribute that
certificate to client browsers in whatever manner you typically do that—automatic update package from IT,
manual distribution, and so on.
This appendix gives instructions for end-users adding the certificate to their web browser manually.
Internet Explorer
1. Go to Internet Options.
2. Click the Content tab.
36 FortiADC Deployment Guide
Fortinet Technologies Inc.
Appendix A: Importing the Intermediate CA certificate into a web browser
3. Click Certificates.
4. Click Import to start the Import Wizard.
5. Complete the wizard steps. Make sure that the certificate is imported into Trusted Root Certification Authorities.
Firefox
1. Depending on the platform, go to Menu > Options or Preferences > Advanced and find the Certificates tab
2. Click View Certificates and then click the Authorities tab.
3. Click Import and then browse and select the certificate file.
FortiADC Deployment Guide 37
Fortinet Technologies Inc.
Appendix A: Importing the Intermediate CA certificate into a web browser
38 FortiADC Deployment Guide
Fortinet Technologies Inc.
Appendix B: SSL forward proxy packet flow
39 FortiADC Deployment Guide
Fortinet Technologies Inc.
Appendix C: FortiADC configurations Internal FortiADC
l Internal FortiADC
l External FortiADC
Internal FortiADC
40 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC Appendix C: FortiADC configurations
next
edit "port7"
set vdom root
config ha-node-ip-list
end
next
edit "port8"
set vdom root
config ha-node-ip-list
end
next
edit "port9"
set vdom root
config ha-node-ip-list
end
next
edit "port10"
set vdom root
config ha-node-ip-list
end
next
end
config system dns
set primary 208.91.112.53
set secondary 208.91.112.52
end
config system time manual
end
config system time ntp
end
config system certificate ca
end
config system certificate remote
end
config system certificate crl
end
config user pki
end
config system accprofile
end
config profile authentication radius
end
config system password-policy
end
config user radius
end
config user ldap
end
config system admin
edit "admin"
set is-system-admin yes
next
end
config system ha
end
config system snmp sysinfo
FortiADC Deployment Guide 41
Fortinet Technologies Inc.
Appendix C: FortiADC configurations Internal FortiADC
42 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC Appendix C: FortiADC configurations
93:fc:14:1a:b1:d2:ef:72:b2:f6:27:62:7d:36:95:
91:09:69:81:79:87:eb:6d:f7:ab:8d:45:a3:15:4f:
91:55:51:47:b6:ac:d7:7b:f0:90:80:78:e2:73:ff:
77:f6:31:7c:23:61:ad:52:e4:5f:7a:02:9f:09:1a:
63:9f:13:e6:3e:fa:be:e8:d8:e6:c7:42:3c:da:7a:
87:1b:1a:92:ff:9d:e4:06:e5:78:d6:1b:b2:6e:7e:
20:67:4d:c9:8f:32:a4:08:cf:eb:03:20:06:3d:b2:
ec:dc:29:d8:99:8b:e2:6e:b3
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
54:3E:CE:DA:29:A4:4F:BC:D1:B3:64:CC:DC:3A:F7:10:33:0B:BA:BA
X509v3 Authority Key Identifier:
keyid:21:34:00:8C:2E:FB:82:5C:54:90:43:3D:42:C3:3F:14:1F:3B:F2:F4
FortiADC Deployment Guide 43
Fortinet Technologies Inc.
Appendix C: FortiADC configurations Internal FortiADC
9MyY0s+FaAb1iuip8iBRrLaSw8l5AkAomNeli4RC8dGe827Pb/ndtva5D2M6gDk2
JnCY0kWqChKVHLziwv20s5Tq2m4HSYiaVvwp1AW2Zk7ndmuhpvg1AkBvA8oHcugz
NbeMsDXoXKX0FJ7Ae6sdy3tpJ3pwMnJBZmLbW54HLK5xeeyM5ej8seVlPylZv5kf
OkR4W7azoUs8
-----END PRIVATE KEY-----
"
next
end
config system certificate intermediate_ca_group
edit "cg1"
config group_member
edit 1
set ca c1
set default enable
next
end
next
end
config system certificate local_cert_group
edit "lg1"
config group_member
edit 1
set local-cert Factory
set intermediate-ca-group cg1
set default enable
next
end
next
end
config system certificate certificate_verify
end
config system mailserver
end
config router static
edit 1
set gateway 172.30.154.254
next
end
config system address
edit "all"
next
end
config load-balance profile
edit "183p1"
set type https
set ssl-ciphers ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-
AES256-SHA DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA
AES256-GCM-SHA384 AES256-SHA256 AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-
AES128-SHA256 ECDHE-RSA-AES128-SHA DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256
DHE-RSA-AES128-SHA AES128-GCM-SHA256 AES128-SHA256 AES128-SHA ECDHE-RSA-RC4-SHA
set local-cert-group lg1
set ssl-proxy enable
next
end
config load-balance connection-pool
end
44 FortiADC Deployment Guide
Fortinet Technologies Inc.
Internal FortiADC Appendix C: FortiADC configurations
FortiADC Deployment Guide 45
Fortinet Technologies Inc.
Appendix C: FortiADC configurations Internal FortiADC
46 FortiADC Deployment Guide
Fortinet Technologies Inc.
External FortiADC Appendix C: FortiADC configurations
External FortiADC
FortiADC Deployment Guide 47
Fortinet Technologies Inc.
Appendix C: FortiADC configurations External FortiADC
48 FortiADC Deployment Guide
Fortinet Technologies Inc.
External FortiADC Appendix C: FortiADC configurations
end
config log alertemail recipient
end
config log alertemail setting
set by_category disable
set loglevel information
set deferq-interval 1
end
config load-balance pool
edit "L2RSport443"
set health-check-ctrl enable
set health-check-list LB_HLTHCK_ICMP
set real-server-ssl-profile LB_RS_SSL_PROF_DEFAULT
config pool_member
edit 1
set ip 10.1.80.200
set pool_member_service_port 443
set pool_member_server_name L2RS-external-gateway
next
end
next
end
config load-balance virtual-server
edit "L2VSport8080_port4”
set type l2-load-balance
set interface port4
set port 8080
set load-balance-profile LB_PROF_HTTP
set load-balance-method LB_METHOD_ROUND_ROBIN
set load-balance-pool L2RSport443
set id 6
next
edit "L2VSport8080_port6"
set type l2-load-balance
set interface port6
set port 8080
set load-balance-profile LB_PROF_HTTP
set load-balance-method LB_METHOD_ROUND_ROBIN
set load-balance-pool L2RSport443
set id 12
next
end
FortiADC Deployment Guide 49
Fortinet Technologies Inc.
Copyright© 2016 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.