<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VPN &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/vpn/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Tue, 19 Aug 2025 13:56:46 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>小心網路詐騙跟釣魚，Fortinet官方正確網址</title>
		<link>https://ailog.tw/lifelog/2025/08/19/fortinet-url/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 19 Aug 2025 13:54:01 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=18120</guid>

					<description><![CDATA[現在的網路詐騙跟釣魚猖獗，連線到個官網時記得要小心，小編除了提醒網友，也幫自己筆記一下，避免google到假的 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2025/08/19/fortinet-url/" class="more-link">閱讀全文<span class="screen-reader-text">〈小心網路詐騙跟釣魚，Fortinet官方正確網址〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>現在的網路詐騙跟釣魚猖獗，連線到個官網時記得要小心，小編除了提醒網友，也幫自己筆記一下，避免google到假的釣魚網址。<br />
安裝VPN時，連後門程式都安裝進去系統&#8230;.</p>
<p><span id="more-18120"></span></p>
<p>Fortinet官方網站：<br />
<a href="https://www.fortinet.com/">https://www.fortinet.com/</a></p>
<p>繁體中文官網：<br />
<a href="https://www.fortinet.com/tw">https://www.fortinet.com/tw</a></p>
<p>產品下載網址：<br />
<a href="https://www.fortinet.com/tw/support/product-downloads">https://www.fortinet.com/tw/support/product-downloads</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>透過Fortigate VPN建立VXLAN讓分隔異地的兩端使用相同的區域網路</title>
		<link>https://ailog.tw/lifelog/2021/10/31/fortigate-vxlan/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Sun, 31 Oct 2021 09:39:09 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[fortigate]]></category>
		<category><![CDATA[L2]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[VXLAN]]></category>
		<category><![CDATA[專線]]></category>
		<category><![CDATA[相同網段]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=11473</guid>

					<description><![CDATA[人生真的是充滿了挑戰，小編最近處理了一個透過Fortigate建立VXLAN讓分隔兩地的網路可以串連在一起，並 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/10/31/fortigate-vxlan/" class="more-link">閱讀全文<span class="screen-reader-text">〈透過Fortigate VPN建立VXLAN讓分隔異地的兩端使用相同的區域網路〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">人生真的是充滿了挑戰，小編最近處理了一個透過Fortigate建立VXLAN讓分隔兩地的網路可以串連在一起，並且形成同一個內部網路，效果就跟點對點(point to point network)L2專線一樣，雖然反應速度略遜專線，但價格差距可是相當驚人，因此就可以了解為何會有企業想這樣做了吧!<span id="more-11473"></span></span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">一、情境說明</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">(1)、IDC及DR兩端各有一台Fortigate防火牆，設備韌體均採用6.4.4(1803)，希望透過VPN VXLAN技術，讓分隔兩端的網路形成一個虛擬的L2內網。</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">(2)、情境架構圖：<br />
<img fetchpriority="high" decoding="async" class="alignnone wp-image-11479 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-00.jpg" alt="" width="836" height="699" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-00.jpg 836w, https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-00-300x251.jpg 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-00-768x642.jpg 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><br />
</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">(3)、本範例設定過程均採用Conosle模式<br />
(4)、VXLAN<span style="font-weight: 400;">該功能只支援FortOS 5.4版本以上，但5.6以上功能較為完善。<br />
(5)、該功能是透過IPSec VPN架構進行，但無法透過加速晶片進行加速，因此如果流量過大，請注意設備等級及效能。<br />
(6)、本範例防火牆相關資訊<br />
Wan interface：wan1<br />
Lan interface：internal1<br />
IDC防火牆Wan端真實IP：192.192.205.1<br />
DR防火牆Wan端真實IP：192.192.209.1<br />
VPN psksecret：0800080080</span></span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;"><span style="font-weight: 400;"><br />
</span>二、設定步驟<br />
(1)、IDC端的Fortigate設定WAN端IP及預設閘道<br />
指令：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">config system interface</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">edit &#8220;wan1&#8221;</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set vdom &#8220;root&#8221;</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set ip <span style="color: #ff0000;">192.192.205.1 255.255.255.0</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set allowaccess ping</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set type physical</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set role wan</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set snmp-index 1</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">next<br />
end</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">config router static</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">edit 1</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set gateway <span style="color: #ff0000;">192.192.205.254</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set device &#8220;wan1&#8221;</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">next</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">end</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">(2)、DR端的Fortigate設定WAN端IP及預設閘道<br />
指令：<br />
config system interface<br />
edit &#8220;wan1&#8221;<br />
set vdom &#8220;root&#8221;<br />
set ip <span style="color: #ff0000;">192.192.209.1 255.255.255.0</span><br />
set allowaccess ping<br />
set type physical<br />
set role wan<br />
set snmp-index 1<br />
next<br />
end</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">config router static</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">edit 1</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set gateway <span style="color: #ff0000;">192.192.209.254</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set device &#8220;wan1&#8221;</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">next</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">end</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">(3)、IDC端的Fortigate建立VXLAN VPN<br />
指令：<br />
config vpn ipsec phase1-interface</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">edit VXLAN</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set interface wan1</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set peertype any</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set proposal aes256-sha1</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set encapsulation vxlan</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set encapsulation-address ipv4</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set encap-local-gw4 <span style="color: #ff0000;">192.192.205.1</span></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set encap-remote-gw4 <span style="color: #ff0000;">192.192.209.1</span></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set remote-gw <span style="color: #ff0000;">192.192.209.1</span></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set psksecret <span style="font-weight: 400; color: #ff0000;">0800080080</span></span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">next</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">end</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">config vpn ipsec phase2-interface</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">edit VXLAN_ph2</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set phase1name VXLAN</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set proposal aes256-sha1</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">set auto-negotiate enable</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">next</span><br />
<span style="font-family: verdana, geneva; font-size: 14pt;">end</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">(4)、DR端的Fortigate建立VXLAN VPN<br />
指令：<br />
config vpn ipsec phase1-interface</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">edit VXLAN</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set interface wan1</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set peertype any</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set proposal aes256-sha1</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set encapsulation vxlan</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set encapsulation-address ipv4</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set encap-local-gw4 <span style="color: #ff0000;">192.192.209.1</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set encap-remote-gw4 <span style="color: #ff0000;">192.192.205.1</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set remote-gw <span style="color: #ff0000;">192.192.205.1</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set psksecret <span style="font-weight: 400; color: #ff0000;">0800080080</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">next</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">end</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">config vpn ipsec phase2-interface</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">edit VXLAN_ph2</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set phase1name VXLAN</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set proposal aes256-sha1</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set auto-negotiate enable</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">next</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">end</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">(5)、在IDC及DR兩端的Fortigate設定VPN介面採用L2傳遞模式<br />
指令：<br />
config system interface<br />
edit VXLAN<br />
<span style="color: #ff0000;">set l2forward enable<br />
<span style="font-weight: 400;">set mtu-override enable</span></span><br />
next<br />
end<br />
</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">(6)、在IDC及DR兩端的Fortigate建立虛擬Switch<br />
指令：<br />
config system switch-interface<br />
edit VXLAN-SWITCH<br />
set vdom root<br />
set member <span style="color: #ff0000;">internal1 VXLAN</span><br />
next<br />
end<br />
<img decoding="async" class="alignnone wp-image-11480 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-01.jpg" alt="" width="1370" height="103" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-01.jpg 1370w, https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-01-300x23.jpg 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-01-1024x77.jpg 1024w, https://ailog.tw/lifelog/wp-content/uploads/2021/10/fortigate-vxlan-01-768x58.jpg 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><br />
備註說明：建立完畢虛擬SWITCH後的網頁畫面</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">(7)、在IDC及DR兩端的Fortigate設定<br />
config system global<br />
<span style="color: #ff0000;">set honor-df disable</span><br />
end<br />
備註說明：<br />
<span style="font-size: 12pt;">FortiOS does not send back an ICMP “destination unreachable, fragmentation needed and DF set” to the source when an IP packet with the DF bit set and a size greater than the tunnel MTU cannot be forwarded inside the VxLAN-IPsec tunne</span><br />
</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">三、實測<br />
(1)、在IDC端Fortigate防火牆的<span style="color: #ff0000;">internal1<span style="color: #000000;">接上一台電腦，並把IP設定為<span style="color: #ff0000;">192.168.100.1</span>/24。</span></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">(2)、在DR端Fortigate防火牆的<span style="color: #ff0000;">internal1</span>接上一台電腦，並把IP設定為<span style="color: #ff0000;">192.168.100.2</span>/24。</span></p>
<p><span style="font-family: verdana, geneva; font-size: 14pt;">(3)<span style="color: #ff0000;"><span style="color: #000000;">、透過這兩台電腦進行IP互ping的動作(記得關閉電腦上的防火牆限制)，如果可以通那就完成所有設定了。</span></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">四、輔助說明</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">設定過程中需要設定<br />
<span style="color: #ff0000;"><span style="font-size: 14pt; font-family: verdana, geneva;">set l2forward enable</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva; color: #000000;">及</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">set honor-df disable<br />
</span><span style="color: #000000;">的參考說明：<br />
<a href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Global-setting-honor-df-explained/ta-p/197002?externalID=FD51964">https://community.fortinet.com/t5/FortiGate/Technical-Tip-Global-setting-honor-df-explained/ta-p/197002?externalID=FD51964</a></span><br />
</span></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>安裝Firewall Analyzer來收集Fortigate防火牆log</title>
		<link>https://ailog.tw/lifelog/2021/05/20/firewall-analyzer/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Thu, 20 May 2021 10:00:16 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Firewall Analyzer]]></category>
		<category><![CDATA[fortigate]]></category>
		<category><![CDATA[log]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[安裝Firewall Analyzer來收集Fortigate防火牆log]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=8290</guid>

					<description><![CDATA[近期因為疫情的關係，很多公司已有採居家上班的狀況，並透過VPN讓使用者可以連線回公司存取公司的資源，但到底哪些 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/05/20/firewall-analyzer/" class="more-link">閱讀全文<span class="screen-reader-text">〈安裝Firewall Analyzer來收集Fortigate防火牆log〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt;">近期因為疫情的關係，很多公司已有採居家上班的狀況，並透過VPN讓使用者可以連線回公司存取公司的資源，但到底哪些人有VPN連線進來過，怎麼保留連線紀錄呢?很多中小企業在裝設防火牆時是沒有建立log收集的機制的，小編今天要介紹透過Firewall Analyzer來收集防火牆的VPN資訊。<span id="more-8290"></span></span></p>
<p><span style="font-size: 14pt;">考慮到在企業使用盡量不增加授權的成本，本篇小編會介紹以Linux環境安裝的方式。</span></p>
<p><span style="font-size: 14pt;">Firewall Analyzer官方網頁介紹：</span><br />
<span style="font-size: 14pt;"><a href="https://www.manageengine.com/products/firewall/">https://www.manageengine.com/products/firewall/</a></span></p>
<p><strong><span style="font-size: 14pt;">01、安裝好Linux</span></strong><br />
<span style="font-size: 14pt;">安裝步驟可以參考下列文章：<br />
<a href="https://ailog.tw/lifelog/2021/05/15/ubuntu-20-install/">https://ailog.tw/lifelog/2021/05/15/ubuntu-20-install/</a><br />
</span></p>
<p><strong><span style="font-size: 14pt;">02、下載Firewall Analyzer軟體(30天免費授權)<br />
</span></strong><span style="font-size: 14pt;">Linux 32位元下載網址：<br />
<a href="https://www.manageengine.com/products/firewall/61794333/ManageEngine_FirewallAnalyzer.bin">https://www.manageengine.com/products/firewall/61794333/ManageEngine_FirewallAnalyzer.bin</a></span></p>
<p><span style="font-size: 14pt;">Linux 64位元下載網址：<br />
<a href="https://download.manageengine.com/products/firewall/61794333/ManageEngine_FirewallAnalyzer_64bit.bin">https://download.manageengine.com/products/firewall/61794333/ManageEngine_FirewallAnalyzer_64bit.bin</a></span></p>
<p>[直接在Linux系統下載檔案]<br />
指令：<br />
sudo wget https://download.manageengine.com/products/firewall/61794333/ManageEngine_FirewallAnalyzer_64bit.bin<br />
<img decoding="async" class="alignnone size-full wp-image-8292" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-01.png" alt="" width="819" height="339" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-01.png 819w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-01-300x124.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-01-768x318.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p><strong><span style="font-size: 14pt;">03、設定安裝檔成可執行的檔案<br />
</span></strong><span style="font-size: 14pt;">sudo chmod 755 ManageEngine_FirewallAnalyzer_64bit.bin<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8294" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-02.png" alt="" width="876" height="113" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-02.png 876w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-02-300x39.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-02-768x99.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></span></p>
<p><strong><span style="font-size: 14pt;">04、安裝<strong>Firewall Analyzer軟體</strong><br />
</span></strong><span style="font-size: 14pt;">sudo ./ManageEngine_FirewallAnalyzer_64bit.bin</span><strong><span style="font-size: 14pt;"><br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8298" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-03-1.png" alt="" width="798" height="92" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-03-1.png 798w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-03-1-300x35.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-03-1-768x89.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><br />
</span></strong></p>
<p><strong><span style="font-size: 14pt;">05、同意軟體授權</span></strong><br />
按下鍵盤「enter」進入同意相關授權步驟<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8296" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-04.png" alt="" width="818" height="158" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-04.png 818w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-04-300x58.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-04-768x148.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>過程持續按鍵盤「enter」<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8299" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-05.png" alt="" width="488" height="195" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-05.png 488w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-05-300x120.png 300w" sizes="auto, (max-width: 488px) 100vw, 488px" /></p>
<p>最後按下「Y」接受授權<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8300" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-06.png" alt="" width="742" height="197" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-06.png 742w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-06-300x80.png 300w" sizes="auto, (max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></p>
<p>06、是否註冊技術支援服務<br />
本範例選：N<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8301" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-07.png" alt="" width="883" height="145" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-07.png 883w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-07-300x49.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-07-768x126.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>07、軟體安裝路徑<br />
採用預設安裝路徑，按下Enter即可<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8302" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-08.png" alt="" width="703" height="194" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-08.png 703w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-08-300x83.png 300w" sizes="auto, (max-width: 703px) 100vw, 703px" /></p>
<p>08、設定web連線服務Port<br />
本範例採用預設值：8060<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8303" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-09.png" alt="" width="579" height="134" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-09.png 579w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-09-300x69.png 300w" sizes="auto, (max-width: 579px) 100vw, 579px" /></p>
<p>09、確認安裝資訊<br />
按下「ENTER」繼續安裝<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8305" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-10.png" alt="" width="568" height="342" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-10.png 568w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-10-300x181.png 300w" sizes="auto, (max-width: 568px) 100vw, 568px" /><br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8306" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-11.png" alt="" width="828" height="195" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-11.png 828w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-11-300x71.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-11-768x181.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>10、安裝完成畫面<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8307" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-12.png" alt="" width="871" height="427" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-12.png 871w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-12-300x147.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-12-768x377.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>11、將<strong><span style="font-size: 14pt;">Firewall Analyzer安裝成Service型態<br />
</span></strong>cd /opt/ManageEngine/OpManager/bin<br />
sudo sh linkAsService.sh<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8310" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-13.png" alt="" width="937" height="382" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-13.png 937w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-13-300x122.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-13-768x313.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>12、啟動<strong><span style="font-size: 14pt;">Firewall Analyzer軟體<br />
</span></strong><span style="font-size: 14pt;">sudo systemctl start OpManager.service</span><strong><span style="font-size: 14pt;"><br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8311" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-14.png" alt="" width="703" height="49" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-14.png 703w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-14-300x21.png 300w" sizes="auto, (max-width: 703px) 100vw, 703px" /><br />
</span></strong></p>
<p>13、檢查服務Port是否有啟動<br />
ss -an | grep 8060<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8312" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-15.png" alt="" width="929" height="67" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-15.png 929w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-15-300x22.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-15-768x55.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>14、登入Fortigate防火牆設定log server<br />
透過SSH或Console登入，輸入下令指令：<br />
(1)、啟動syslog並指定傳送到Firewall Analyzer主機上，範例中的192.168.5.243為小編的Firewall Analyzer Server IP，請自行更改為自己相對應的IP。<br />
config log syslogd setting<br />
set status enable<br />
set server <span style="color: #ff0000;">192.168.5.243</span><br />
set port 1514<br />
end</p>
<p>(2)、設定要傳送什麼loh內容<br />
config log syslogd filter<br />
set severity information<br />
set forward-traffic enable<br />
set local-traffic enable<br />
set anomaly enable</p>
<p>15、透過瀏覽器登入系統<br />
預設帳號：admin<br />
預設密碼：admin<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8313" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-16.png" alt="" width="506" height="479" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-16.png 506w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-16-300x284.png 300w" sizes="auto, (max-width: 506px) 100vw, 506px" /></p>
<p>16、點選「Dashboard」→「VPN」即可看到防火牆的VPN相關的狀態<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8316" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-17.png" alt="" width="196" height="265" /></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-8317" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-18.png" alt="" width="752" height="360" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-18.png 752w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-18-300x144.png 300w" sizes="auto, (max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></p>
<p>17、查看VPN歷史報表<br />
點選「Reports」 → 「VPN Reports」即可觀看VPN的歷史紀錄<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8320" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-19.png" alt="" width="299" height="397" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-19.png 299w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-19-226x300.png 226w" sizes="auto, (max-width: 299px) 100vw, 299px" /></p>
<p>18、變更系統介面語系<br />
(1)、點選右上角齒輪圖示<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8482" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-22.png" alt="" width="275" height="212" /></p>
<p>(2)、選擇左邊的「Language Selector」，接著選擇右邊的「Chinese(Traditional)繁体中文」<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8484" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-23.png" alt="" width="439" height="440" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-23.png 439w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-23-300x300.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-23-150x150.png 150w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-23-100x100.png 100w" sizes="auto, (max-width: 439px) 100vw, 439px" /></p>
<p>(3)、網頁會自動重新整理，接著就可以看到中文網頁了<img loading="lazy" decoding="async" class="alignnone size-full wp-image-8485" src="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-24.png" alt="" width="582" height="170" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-24.png 582w, https://ailog.tw/lifelog/wp-content/uploads/2021/05/fw-log-24-300x88.png 300w" sizes="auto, (max-width: 582px) 100vw, 582px" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>因應疫情遠距上班，企業開放VPN前請先檢查是否有漏洞尚未修補。</title>
		<link>https://ailog.tw/lifelog/2020/03/25/sslvpn/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 25 Mar 2020 15:14:18 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[IPSec]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[因應疫情遠距上班，企業開放VPN前請先檢查是否有漏洞尚未修補。]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=2722</guid>

					<description><![CDATA[COVID-19疫情持續升溫，許多企業紛紛籌備遠距上班的方案，其中最常見的方法為透過VPN讓員工可以連線回公司 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2020/03/25/sslvpn/" class="more-link">閱讀全文<span class="screen-reader-text">〈因應疫情遠距上班，企業開放VPN前請先檢查是否有漏洞尚未修補。〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>COVID-19疫情持續升溫，許多企業紛紛籌備遠距上班的方案，其中最常見的方法為透過VPN讓員工可以連線回公司存取企業內部資源<span id="more-2722"></span>，但在開放VPN服務前，小編提醒大家記得先檢查一下VPN設備是否有完成漏洞更新，避免服務開放後又掀起另一波災情。</p>
<p>OpenVPN：CVE-2019-14899<br />
<a href="https://securityboulevard.com/2019/12/statement-from-protonvpn-regarding-cve-2019-14899/">https://securityboulevard.com/2019/12/statement-from-protonvpn-regarding-cve-2019-14899/</a></p>
<p>Fortigate：CVE-2018-13379 (FG-IR-18-384) 及CVE-2018-13383 (FG-IR-18-388)<br />
<a href="https://kb.fortinet.com/kb/microsites/microsite.do?cmd=displayKC&amp;docType=kc&amp;externalId=FD46513">https://kb.fortinet.com/kb/microsites/microsite.do?cmd=displayKC&amp;docType=kc&amp;externalId=FD46513</a></p>
<p>CISCO：CVE-2019-12677<br />
<a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ssl-vpn-dos">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-asa-ssl-vpn-dos</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FortiGate SSL VPN漏洞(CVE-2018-13380)</title>
		<link>https://ailog.tw/lifelog/2019/09/16/fortigate-ssl-cve-2018-13380/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Mon, 16 Sep 2019 05:11:54 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CVE-2018-13380]]></category>
		<category><![CDATA[FG-IR-18-383]]></category>
		<category><![CDATA[fortigate]]></category>
		<category><![CDATA[FortiGate SSL VPN漏洞(CVE-2018-13380)]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=864</guid>

					<description><![CDATA[FortiGate  SSL VPN漏洞(CVE-2018-13380)，原廠在2019年5月份已釋出解決方案 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2019/09/16/fortigate-ssl-cve-2018-13380/" class="more-link">閱讀全文<span class="screen-reader-text">〈FortiGate SSL VPN漏洞(CVE-2018-13380)〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>FortiGate  SSL VPN漏洞(CVE-2018-13380)，原廠在2019年5月份已釋出解決方案，有啟用SSL VPN的網友，可以參考一下相關風險的解決方案。<span id="more-864"></span></p>
<p>發布日期：2019年5月24日<br />
IR號碼：FG-IR-18-383</p>
<p>影響：<br />
未能清除SSL VPN Web認證畫面中的錯誤或消息處理參數可能允許攻擊者執行跨站點腳本(XSS)攻擊。</p>
<p>受影響的產品：<br />
FortiOS 6.0系列：6.0.0至6.0.4。<br />
FortiOS 5.6系列：5.6.0至5.6.7。<br />
FortiOS 5.4系列：5.4及以下版本。</p>
<p>解決方案：<br />
直接升級到6.2.0或參考下列各版更新資訊。<br />
FortiOS 6.0系列：升級到6.0.5或更高版本。<br />
FortiOS 5.6系列：升級到5.6.8或更高版本。</p>
<p>臨時性方案：<br />
關閉SSL-VPN web認證畫面</p>
<p>原廠說明網址：<br />
https://fortiguard.com/psirt/FG-IR-18-383</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Google Cloud Platform(GCP)與Fortigate建立Site to Site IPSec連線</title>
		<link>https://ailog.tw/lifelog/2019/09/11/gcp-ipsec/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 11 Sep 2019 14:24:40 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[Virtualization]]></category>
		<category><![CDATA[40F]]></category>
		<category><![CDATA[60B]]></category>
		<category><![CDATA[60D]]></category>
		<category><![CDATA[60E]]></category>
		<category><![CDATA[80C]]></category>
		<category><![CDATA[fortigate]]></category>
		<category><![CDATA[GCP]]></category>
		<category><![CDATA[Google Cloud Platform]]></category>
		<category><![CDATA[Google Cloud Platform(GCP)與Fortigate建立Site to Site IPSec連線]]></category>
		<category><![CDATA[IPSec]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=788</guid>

					<description><![CDATA[Google Cloud Platform(GCP)是唯一在台灣本島內的雲端系統，因此也吸引不少企業選擇使用G &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2019/09/11/gcp-ipsec/" class="more-link">閱讀全文<span class="screen-reader-text">〈Google Cloud Platform(GCP)與Fortigate建立Site to Site IPSec連線〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>Google Cloud Platform(GCP)是唯一在台灣本島內的雲端系統，因此也吸引不少企業選擇使用Google的平台<span id="more-788"></span>，雲端系統跟公司內部難免會有些敏感資料交換，這時就需要透過VPN加密通道來傳輸資料，趕緊跟著小編一起來建立GCP的IPSec VPN吧!</p>
<p>本範例使用Fortigate與Google Cloud Platform建立IPSec VPN。</p>
<p>步驟一：準備相關資訊<br />
(1)、Google Cloud Platform平台建立VPN時，所產生的真實IP位址。<br />
(2)、Google Cloud Platform平台建立VPN時，所產生的IKE金鑰。<br />
(3)、Google Cloud Platform平台建立VPN時，選擇區域後的相對內部虛擬網段。<br />
(4)、Fortigate的外部IP位址。<br />
(5)、公司內部IP網段。</p>
<p>步驟二：登入Google Cloud Platform平台建立VPN連線相關設定<br />
(1)、點選「混合式連線」→點選「VPN」<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-790 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-001.png" alt="" width="429" height="842" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-001.png 429w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-001-153x300.png 153w" sizes="auto, (max-width: 429px) 100vw, 429px" /></p>
<p>(2)、點選「建立VPN連線」<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-791 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-002.png" alt="" width="731" height="338" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-002.png 731w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-002-300x139.png 300w" sizes="auto, (max-width: 731px) 100vw, 731px" /></p>
<p>(3)、點選「傳統VPN」<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-792 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-003.png" alt="" width="478" height="311" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-003.png 478w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-003-300x195.png 300w" sizes="auto, (max-width: 478px) 100vw, 478px" /></p>
<p>(4)、輸入VPN相關資訊(phase 1)<br />
名稱：<br />
輸入phase 1連線名稱，不重複即可。</p>
<p>網路：<br />
除非必要不然別更改預設值，直接選default。</p>
<p>地區：<br />
請與VM主機選擇同一區，asia-east1為台灣地區。</p>
<p>IP位址：<br />
請建立真實IP位址，並記錄下該資訊，稍後設定Fortigate VPN時會需要該資訊。<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-793 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-004.png" alt="" width="486" height="483" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-004.png 486w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-004-150x150.png 150w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-004-300x298.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-004-100x100.png 100w" sizes="auto, (max-width: 486px) 100vw, 486px" /></p>
<p>(5)、輸入VPN相關資訊(phase 2)<br />
名稱：<br />
輸入phase 2連線名稱，不重複即可。<br />
遠端對等互連IP位址：輸入Fortigate WAN端真實IP(也就是要進行VPN連線的真實IP)。</p>
<p>IKE版本：<br />
必須與對接的防火牆一致，本版範例選擇IKEv1版本。</p>
<p>IKE預先共用金鑰：<br />
點「選產生並複製」，小編極力推薦用這個步驟用系統來產生金鑰確保金鑰的複雜度，提升資訊安全管控。</p>
<p>遠端網路IP範圍：<br />
輸入要與公司內部網路連線的網段，該範例輸入192.168.0.0/16，這部份請依據自己的需求變更。</p>
<p>本機子網路IP範圍：<br />
除非必要不然別更改預設值，直接選default。</p>
<p>接著點選「完成」→「建立」來完成GCP的VPN設定。<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-794 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-005.png" alt="" width="485" height="858" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-005.png 485w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-005-170x300.png 170w" sizes="auto, (max-width: 485px) 100vw, 485px" /></p>
<p>步驟三：登入Fortigate建立VPN連線相關設定<br />
(1)、點選「VPN」→「IPsec隧道」<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-795 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-006.png" alt="" width="255" height="328" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-006.png 255w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-006-233x300.png 233w" sizes="auto, (max-width: 255px) 100vw, 255px" /></p>
<p>(2)、輸入VPN相關資訊(phase 1)<br />
用戶名：<br />
輸入phase 1連線名稱，不重複即可。</p>
<p>範本類型：<br />
點選「自訂」</p>
<p>點選「下一步」進行下一步驟<img loading="lazy" decoding="async" class="alignnone wp-image-812 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-007.png" alt="" width="752" height="223" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-007.png 752w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-007-300x89.png 300w" sizes="auto, (max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /></p>
<p>遠程網路閘：<br />
選擇「靜態IP地址」</p>
<p>IP地址：<br />
輸入在步驟二之(4)在GCP平台所產生的真實IP</p>
<p>介面：<br />
選擇Fortigate要進行VPN連線的Wan端介面，該範例為Wan01。<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-816 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-008.png" alt="" width="636" height="472" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-008.png 636w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-008-300x223.png 300w" sizes="auto, (max-width: 636px) 100vw, 636px" /></p>
<p>認證方式：<br />
點選「預共享密鑰」</p>
<p>預共享密鑰：<br />
輸入在步驟二之(5)GCP平台所產生的「IKE預先共用金鑰」</p>
<p>IKE：<br />
該選項必須與GCP平台設定一致，本範例選擇「1」</p>
<p>模式：<br />
選擇「主動模式(ID保護)」<img loading="lazy" decoding="async" class="alignnone wp-image-809 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-009.png" alt="" width="622" height="191" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-009.png 622w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-009-300x92.png 300w" sizes="auto, (max-width: 622px) 100vw, 622px" /></p>
<p>phase 1加密：<br />
選擇「AES128」</p>
<p>phase 1認證：<br />
選擇「SHA1」</p>
<p>Diffie-Hellman群組：<br />
點選「2」</p>
<p>密碼週期(秒)：<br />
輸入「36600」<img loading="lazy" decoding="async" class="alignnone wp-image-810 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-010.png" alt="" width="621" height="204" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-010.png 621w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-010-300x99.png 300w" sizes="auto, (max-width: 621px) 100vw, 621px" /></p>
<p>(3)、輸入VPN相關資訊(phase 2)<br />
用戶名：<br />
輸入phase 2連線名稱，不重複即可</p>
<p>本地位址：<br />
輸入要與公司內部網路連線的網段，該範例輸入192.168.0.0/16，這部份請依據自己的需求變更。</p>
<p>遠端地址：<br />
輸入步驟二之(5)GCP平台「本機子網路IP範圍」的IP網段。</p>
<p>phase 2加密：<br />
選擇「AES128」</p>
<p>phase 2認證：<br />
選擇「SHA1」</p>
<p>Diffie-Hellman群組：<br />
點選「2」</p>
<p>自動協商：<br />
勾選</p>
<p>密碼週期(秒)：<br />
輸入「10800」<img loading="lazy" decoding="async" class="alignnone wp-image-811 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-011.png" alt="" width="619" height="699" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-011.png 619w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-011-266x300.png 266w" sizes="auto, (max-width: 619px) 100vw, 619px" /></p>
<p>點選「確定」完成VPN設定<img loading="lazy" decoding="async" class="alignnone wp-image-831 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-012.png" alt="" width="680" height="128" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-012.png 680w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-012-300x56.png 300w" sizes="auto, (max-width: 680px) 100vw, 680px" /></p>
<p><strong>步驟四：新增靜態路由</strong><br />
(1)、點選「網路」→點選「靜態路由」。<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-832" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-013.png" alt="" width="235" height="267" /></p>
<p>(2)、點選「+新建」進行靜態路由新增。<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-833" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-014.png" alt="" width="293" height="48" /></p>
<p>輸入「目的網段」資訊：<br />
該數值則為步驟二之(5)GCP平台「本機子網路IP範圍」的IP網段。</p>
<p>介面：<br />
該介面為Fortigate與GCP進行VPN連線的虛擬介面，本範例為GCP-VPN。</p>
<p>狀態：<br />
已啟用</p>
<p>點選「確定」完成靜態路由設定步驟。<img loading="lazy" decoding="async" class="alignnone wp-image-843 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-015.png" alt="" width="569" height="362" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-015.png 569w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-015-300x191.png 300w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p>步驟五：設定防火牆政策規則(公司內部網路To GCP內部網路)<br />
(1)、點選「政策&amp;物件」→「IPv4政策」<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-835" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-016.png" alt="" width="235" height="284" /></p>
<p>(2)、點選「+新建」進行防火牆政策規則新增。<img loading="lazy" decoding="async" class="alignnone wp-image-836 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-017.png" alt="" width="353" height="81" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-017.png 353w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-017-300x69.png 300w" sizes="auto, (max-width: 353px) 100vw, 353px" /></p>
<p>用戶名：<br />
輸入不重複的防火牆政策名稱即可。</p>
<p>進入介面：<br />
該介面為公司的內部網路介面，本範例為IDC_LAN。</p>
<p>出去介面：<br />
該介面為Fortigate與GCP進行VPN連線的虛擬介面，本範例為GCP-VPN。</p>
<p>來源：<br />
all，本範例採來源IP全面放行，建議在實際的應用勿使用該方式設定，請依據實際需求設定來源IP。</p>
<p>目的：<br />
all，本範例採目的IP全面放行，建議在實際的應用勿使用該方式設定，請依據實際需求設定目的IP。</p>
<p>服務：<br />
all，本範例採服務全面放行，建議在實際的應用勿使用該方式設定，請依據實際需求設定服務項目。<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-839 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-020.png" alt="" width="416" height="443" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-020.png 416w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-020-282x300.png 282w" sizes="auto, (max-width: 416px) 100vw, 416px" /></p>
<p>啟動這個政策：<br />
開啟政策</p>
<p>點選「確定」，完成「公司內部網路」連線到「GCP雲端內部網路」的防火牆政策規則設定。</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-838 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-019.png" alt="" width="426" height="116" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-019.png 426w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-019-300x82.png 300w" sizes="auto, (max-width: 426px) 100vw, 426px" /></p>
<p>步驟六：設定防火牆政策規則(GCP內部網路 To 公司內部網路)<br />
(1)、點選「政策&amp;物件」→「IPv4政策」<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-835" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-016.png" alt="" width="235" height="284" /></p>
<p>(2)、點選「+新建」進行防火牆政策規則新增。<img loading="lazy" decoding="async" class="alignnone wp-image-836 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-017.png" alt="" width="353" height="81" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-017.png 353w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-017-300x69.png 300w" sizes="auto, (max-width: 353px) 100vw, 353px" /></p>
<p>用戶名：<br />
輸入不重複的防火牆政策名稱即可。</p>
<p>進入介面：<br />
該介面為Fortigate與GCP進行VPN連線的虛擬介面，本範例為GCP-VPN。</p>
<p>出去介面：<br />
該介面為公司的內部網路介面，本範例為IDC_LAN。</p>
<p>來源：<br />
all，本範例採來源IP全面放行，建議在實際的應用勿使用該方式設定，請依據實際需求設定來源IP。</p>
<p>目的：<br />
all，本範例採目的IP全面放行，建議在實際的應用勿使用該方式設定，請依據實際需求設定目的IP。</p>
<p>服務：<br />
all，本範例採服務全面放行，建議在實際的應用勿使用該方式設定，請依據實際需求設定服務項目。<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-837 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-018.png" alt="" width="387" height="446" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-018.png 387w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-018-260x300.png 260w" sizes="auto, (max-width: 387px) 100vw, 387px" /></p>
<p>點選「確定」，完成「GCP雲端內部網路」連線到「公司內部網路」的防火牆政策規則設定。</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-838 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-019.png" alt="" width="426" height="116" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-019.png 426w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-019-300x82.png 300w" sizes="auto, (max-width: 426px) 100vw, 426px" /></p>
<p>步驟七：檢查VPN連線狀態<br />
點選「VPN」→「IPsec隧道」<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-795 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-006.png" alt="" width="255" height="328" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-006.png 255w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-006-233x300.png 233w" sizes="auto, (max-width: 255px) 100vw, 255px" /></p>
<p>如下圖顯示，代表與GCP完成VPN連線。<img loading="lazy" decoding="async" class="alignnone wp-image-841 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-022.png" alt="" width="1009" height="95" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-022.png 1009w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-022-300x28.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2019/09/VPN-022-768x72.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>怎麼查詢正在使用FortiGate IPSec VPN的使用者呢</title>
		<link>https://ailog.tw/lifelog/2019/08/05/fortigate-ipsecuser/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Mon, 05 Aug 2019 14:11:43 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[40F]]></category>
		<category><![CDATA[60B]]></category>
		<category><![CDATA[60D]]></category>
		<category><![CDATA[60E]]></category>
		<category><![CDATA[80C]]></category>
		<category><![CDATA[fortigate]]></category>
		<category><![CDATA[IPSec]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[怎麼查詢正在使用FortiGate IPSec VPN的使用者呢]]></category>
		<category><![CDATA[線上使用者]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=218</guid>

					<description><![CDATA[小編的公司常有些外勤人員在外面趴趴走，所以當要存取公司內部資源就得靠VPN連線了，但最近常遇到使用者明明沒進行 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2019/08/05/fortigate-ipsecuser/" class="more-link">閱讀全文<span class="screen-reader-text">〈怎麼查詢正在使用FortiGate IPSec VPN的使用者呢〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>小編的公司常有些外勤人員在外面趴趴走，所以當要存取公司內部資源就得靠VPN連線了<span id="more-218"></span>，但最近常遇到使用者明明沒進行VPN連線，卻死命的報修說無法連線所以無法存取系統上傳檔案&#8230;&#8230;.這也太玄了吧，只好線上跟User對質瞜，快跟著小編一起了解如何查詢FortiGate IPSec VPN的線上使用者吧。</p>
<p>步驟1：登入FortiGate防火牆設備<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-219 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0001.png" alt="" width="386" height="224" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0001.png 386w, https://ailog.tw/lifelog/wp-content/uploads/2019/08/0001-300x174.png 300w" sizes="auto, (max-width: 386px) 100vw, 386px" /></p>
<p>步驟2：點選左方功能列裡面的「監測」<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-220 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0002.png" alt="" width="254" height="425" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0002.png 254w, https://ailog.tw/lifelog/wp-content/uploads/2019/08/0002-179x300.png 179w" sizes="auto, (max-width: 254px) 100vw, 254px" /></p>
<p>步驟3：接著點選「IPSec監視器」<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-221 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0003.png" alt="" width="247" height="398" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0003.png 247w, https://ailog.tw/lifelog/wp-content/uploads/2019/08/0003-186x300.png 186w" sizes="auto, (max-width: 247px) 100vw, 247px" /></p>
<p>步驟4：接著右方視窗就可以看見目前線上的VPN使用者資訊瞜<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-222 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0004.png" alt="" width="810" height="267" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/08/0004.png 810w, https://ailog.tw/lifelog/wp-content/uploads/2019/08/0004-300x99.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2019/08/0004-768x253.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></p>
<p>那個某某某你根本沒連線厚，別在呼嚨你的主管了，快把業績報告傳進公司系統吧!!!(握拳~)</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
