이 게시글이 무엇에 관한 것인지 한국어로 설명해줬으면 좋겠어요.
FortiGate Security Policies and Best Practices for Real-World Administration (FCP_FGT_AD-7.6 Exam Guide)
Security policies are the foundation of every FortiGate deployment and one of the most important subjects in the FCP – FortiGate 7.6 Administrator (FCP_FGT_AD-7.6) exam. You are expected to understand how to design, configure, and optimize firewall policies that securely control traffic while maintaining performance and usability.
This guide explains FortiGate security policies, best-practice configurations, and exam-focused scenarios to help you master this topic—knowledge that becomes even more valuable when practicing FCP_FGT_AD-7.6 sample questions.
Understanding FortiGate Security Policies
A FortiGate security policy defines how traffic is handled between source and destination networks. Each policy specifies:
- Source and destination interfaces
- Source and destination addresses
- Services and ports
- Action (accept or deny)
- NAT settings
- Security profiles (AV, IPS, web filter, application control, etc.)
Policies are processed top-down, and the first matching policy determines how traffic is handled.
Exam focus: You must know policy order behavior and how FortiGate evaluates traffic flows.
Types of FortiGate Policies
1. IPv4 and IPv6 Policies
Used to control standard network traffic. IPv6 policies are separate from IPv4 and must be configured independently.
2. Identity-Based Policies
Apply rules based on user identity instead of only IP addresses. These are commonly used with:
- Active Directory integration
- SSL VPN users
- FortiClient authentication
3. Policy with Security Profiles
Policies can apply security inspection, such as:
- Antivirus
- IPS
- Web filtering
- Application control
- SSL inspection
These profiles protect traffic while allowing legitimate communication.
NAT and Security Policies
Network Address Translation (NAT) is often combined with firewall policies to allow internal users to access the Internet.
Key NAT Concepts
- Source NAT is used for outbound traffic.
- Destination NAT (VIPs) is used for publishing internal services.
- Central NAT can be used instead of policy-based NAT for large environments.
Exam tip: Be able to identify when NAT should be enabled or turned on or off in a policy and how VIPs work with firewall rules.
Policy Order and Optimization
Policy Order Best Practices
- Place more specific rules above general rules.
- Keep the deny rules at the bottom unless explicitly required.
- Avoid overlapping or duplicate policies.
Policy Optimization
- Combine similar rules when possible.
- Use address groups and service groups.
- Enable logging on critical policies for troubleshooting.
Exam scenario: You may be asked why traffic matches an incorrect policy due to rule order or overlapping definitions.
Security Profiles and Inspection Modes
Security profiles add inspection and threat protection to firewall policies.
Common Security Profiles
- Antivirus
- IPS
- Web filter
- DNS filter
- Application control
Inspection Modes
- Flow-based inspection (faster, lower resource usage)
- Proxy-based inspection (deeper inspection, higher resource usage)
Exam focus: Understand when to use flow-based vs proxy-based inspection and how SSL inspection affects traffic.
Best Practices for Secure Policy Design
- Least Privilege Principle
- Only allow required services and networks.
- Use Zones and Address Groups
- Simplify policy management and reduce errors.
- Enable Logging on Critical Policies
- Helps with auditing and troubleshooting.
- Apply Security Profiles Where Needed
- Protect internet-bound traffic and critical services.
- Regular Policy Review and Cleanup
- Remove unused or outdated rules.
- Avoid Any-Any Policies
- These are insecure and often appear in exam trick questions.
Real-World Exam Scenarios
Scenario 1: Internet Access Not Working
Check:
- Policy order
- NAT enabled
- Correct source and destination interfaces
- Routing table
Scenario 2: Application Blocked Unexpectedly
Check:
- Application control profile
- Web filter category
- IPS signatures
- SSL inspection settings
Scenario 3: Published Server Not Reachable
Check:
- VIP configuration
- Destination NAT policy
- Security profile blocking traffic
- Logging to identify drops
How Security Policies Integrate with Other Exam Topics
- VPNs: Policies allow traffic through IPsec and SSL VPN tunnels.
- Routing & SD-WAN: Policies depend on correct routing decisions.
- HA: Policies are synchronized across HA cluster members.
- Security Fabric: Policies integrate with centralized management and automation.
- Logging & Monitoring: Logs show which policy handled traffic and why.
Understanding these relationships is key to answering scenario-based exam questions.
Frequently Asked Questions (FAQ)
Q1: Why is policy order important in FortiGate?
Because FortiGate processes policies from top to bottom and stops at the first match.
Q2: What is the difference between flow-based and proxy-based inspection?
Flow-based inspects traffic in real time, while proxy-based buffers traffic for deeper analysis.
Q3: Should NAT be enabled for internal to internet traffic?
Yes, in most cases, source NAT is required unless using routed public IPs.
Q4: How can you identify which policy blocked traffic?
By checking traffic logs and filtering by source IP or destination service.
Final Thoughts
FortiGate security policies are at the heart of the FCP_FGT_AD-7.6 exam and real-world firewall administration. Mastering policy types, NAT behavior, security profiles, and best-practice design will help you solve complex scenario questions and build secure networks in production environments.
Practice designing policies in a lab and analyzing logs to reinforce your understanding.