Unified Threat Management (UTM)

Security

Next generation firewall sits at the perimeter of the network with the purpose of protecting internal assets from external threats. A security appliance is required for each location and will support signature based IPS, web-content filtering, gateway malware protection.

Benefits

  • Quick issue resolution via Fortinet Certified Engineers
  • Additional technical assistance available as needed directly from manufacturer 
  • Ensure company assets are protected at an additional level – from the edge – rather than just at the endpoints
  • Mitigate the risk of unwarranted bandwidth consumption that could slow employee productivity
  • Improve staff efficiency through policies by ensuring employees aren’t accessing non work-related web content during work hours
  • Extensive network security from internal and external threats
  • Mitigate the risk of installation of spyware, spam, phishing, etc. by proactively blocking sites categorized as “malicious”

Setup

  • Service Provider to obtain correct login information and provide to Collabrance all the following relevant information: 
    • Login information
    • Routing information
    • WAN interface setup
    • Internal (LAN) interface setup
    • Wi-Fi information
    • ISP contact information - occasionally need to contact when there is no current firewall
    • Single web content filtering policy (white list / black list)
    • VPN information
      • Point to point
      • User VPN
  • Collabrance to program FortiGate according to Collabrance standards and Fortinet best practices 
    • Configure device Host Name
    • Setup Inspection mode to Proxy
    • Apply FortiOS updates
    • Configure Primary (& Secondary if applicable) WAN interface(s) (usable IP’s, subnet mask, Gateway (provided by Service Provider)) Configure LAN interface – (usable IP, subnet mask, Gateway (provided by Service Provider))
    • Configure DHCP (if applicable)
    • Configure DNS (if applicable)
    • Configure Static Routes (default routes- Provided by Service Provider)Configure WiFi (if applicable) – SSID and Passphrase provided by Service Provider
      • Corporate Wi-Fi
      • Guest Wi-Fi
    • Configure management interface
    • Configure Policies (5 basic / default policies created by Collabrance)
    • Disable SIP ALG Helpers
    • Setup UTM functionality
      • Setup antivirus
      • Setup web-content filtering
      • Setup intrusion prevention
    • Setup Client to Fateway SSL or IPSec VPN  (requires domain environment)
      • Configure FortiGate for user VPN
      • Send FortiClient setup documentation to end users
  • Enable SNMP on FortiGate
  • Attach appliance to Nuspire NuSecure
    • Verify logs are being captured
  • Attach appliance to FortiManager
    • Verify configuration and policy packages are being backed-up
  • Attach appliance to PRTG
    • Verify WAN and LAN connectivity, interface utilization (bandwidth), ping (uptime and availability), and WAN latency (Internet latency)
  • Document setup and support details in ConnectWise 
  • Check all settings for accuracy
  • Coordinate on-site installation with Service Provider
    • Over the phone, walk Service Provider or their designee through hookup
      • Failure to meet scheduled appointment time will result in penalties and reschedule appointment (See Service Provider expectation document)
    • Testing to ensure appliance is working properly
    • Testing to ensure customer has access to necessary resources
  • Register FortiGate, check for 3 year, 24x7 agreement 
  • Verify FortiGuard subscription is active and definitions are being updated
  • Login to appliance ~ 3 days after installation to make sure everything is working properly
  • Setup read only access, upon request, for a single user account for the Service Provider

Elective Services (Setup) available for additional fee

  • Site to Site VPN Tunnels (fee based)
    • Flat fee between two supported FortiGate units
    • Hourly fee if not between supported FortiGate units
    • Different subnets at each site is required
    • Static public IP addresses at both sites is required
    • Antivirus and IPS Security policies enabled on VPN policies
    • Statement of work required if the other firewall is not in the Collabrance technology stack, or Collabrance cannot configure the other end of the tunnel
  • Custom Application Filtering: Statement of work required
  • Custom Traffic Shaping/Quality of Service: Statement of work required
  • Setup user-level reporting for Web-Content Filtering (Requires LDAP)
  • Setup multiple Web-Content Filter policies so different rules can apply to different sets of users (Requires FSSO)
  • Setup of VOIP and/or other technologies that may be impacted by, controlled by or passes through the UTM (such as VOIP, security systems, etc.)

Service Specific Commitments

Emergency Maintenance Window: Any time; Customer or Service Provider will be notified prior to maintenance if time falls outside of Standard Maintenance Window.

Roles & Responsibilities

Collabrance Responsibilities

Service Provider Responsibilities

Subscriber Responsibilities

Technical Details

  • Base configuration will include the following
    • MultiWAN Setup
    • Port Forwarding for services (HTTP/HTTPS, SMTP, etc)
    • Setup of one internal corporate network 
    • Setup of one corporate Wi-Fi network (See “Wireless Networking: Fortinet”)
    • Setup of one guest Wi-Fi network (See “Wireless Networking: Fortinet”)
    • Setup of Antivirus Profile
      • Does not negate the need to Endpoint Security
    • Setup of Application Control Monitoring ONLY
      • By default all applications are allowed
      • Changes to this may incur a fee
    • Setup of Intrusion Protection
      • Includes FortiGuard best practice to apply Default Action to Medium, High and Critical events per FortiGuard
    • Setup and Support of Remote user VPN connection 
      • SSL(preferred) or IPSEC 
      • FortiClient VPN client is supported (not Cisco AnyConnect, etc)
        • For complete list of requirements to utilize VPN client, please reference the service catalog document RMM Remote Connectivity.
  • Active Directory required (no local username/passwords on firewall)

** Disclaimer: Service Providers must comply with identified Collabrance Requirements in order for items referenced in our Service Catalog to perform properly. **