ICSA Labs | Fortinet
FortiGate 60F 3G/4G-Rugged FortiGate/FortiWifi 61E. FortiGate 80F/81F. FortiGate 81E/FortiWifi 81E-POE. FortiGate 90D-Rugged. FortiGate/FortiWifi 91E.
Firewall Certification Testing Report Fortinet, Inc. Fortinet Consolidated Security Platforms Tested against these standards ICSA Labs Firewall Certification Criteria Baseline Module Version 4.2 ICSA Labs Firewall Certification Criteria Corporate Module Version 4.2 October 12, 2020 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report Table of Contents Executive Summary ................................................................................................................1 Introduction .........................................................................................................................1 Summary of Findings ..........................................................................................................1 Product Overview ................................................................................................................1 Scope of Assessment..........................................................................................................1 Continuous Deployment and Spot Checks ..........................................................................1 Tested Firewall Product Components......................................................................................2 Hardware ............................................................................................................................2 Software ..............................................................................................................................2 Documentation ....................................................................................................................2 Product Family Members.....................................................................................................2 Installation and Configuration ..................................................................................................3 Required Services Security Policy Transition ..........................................................................4 Expectation .........................................................................................................................4 Results ................................................................................................................................4 Logging ...................................................................................................................................5 Expectation .........................................................................................................................5 Results ................................................................................................................................5 Administration .........................................................................................................................5 Expectation .........................................................................................................................5 Results ................................................................................................................................5 Persistence .............................................................................................................................6 Expectation .........................................................................................................................6 Results ................................................................................................................................6 Documentation ........................................................................................................................6 Expectation .........................................................................................................................6 Results ................................................................................................................................6 Functional and Security Testing ..............................................................................................6 Expectation .........................................................................................................................6 Results ................................................................................................................................7 Criteria Violations and Resolutions..........................................................................................7 Introduction .........................................................................................................................7 Results ................................................................................................................................7 ICSA Labs Certified Firewalls..................................................................................................7 Authority .................................................................................................................................. 8 FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page i of i Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report Executive Summary Introduction The goal of ICSA Labs certification testing is to increase user and enterprise trust in information security products and solutions. For nearly 30 years, ICSA Labs, an independent division of Verizon, has been providing credible, independent, 3rd-party security product testing and certification for many of the world's top security product developers and service providers. Enterprises worldwide rely on ICSA Labs to set and apply objective testing and certification criteria measuring product security, compliance and performance. Summary of Findings Following rigorous firewall security testing at ICSA Labs, the FortiGate VM04 satisfied all of the security testing requirements in both the ICSA Labs baseline firewall and ICSA Labs corporate firewall testing standards. As a result, both the FortiGate VM04 and the entire Fortinet Consolidated Security Platforms family of products retained ICSA Labs Firewall Certification having met all of the testing requirements. Product Overview With models ranging from those suited for small businesses to models designed for large enterprises, service providers and carriers, FortiGate Consolidated Security Platforms combine the FortiOSTM security operating system with FortiASIC processors and other hardware to provide a comprehensive and high-performance array of security and networking functions FortiGate Consolidated Security Platforms provide costeffective, comprehensive protection against network, content, and application-level threats - including complex attacks favored by cybercriminals - without degrading network availability and uptime. FortiGate platforms incorporate sophisticated networking features, such as high availability (active/active, active/passive) for maximum network uptime, and virtual domain capabilities to separate various networks requiring different security policies. Scope of Assessment ICSA Labs tests firewall products against its industry-approved set of testing criteria. Over time, this set of testing criteria became an industry standard. Testing requirements evolved with input from a consortium of firewall vendors, end users, and ICSA Labs. The present iteration of The Firewall Certification Criteria is version 4.2. Continuous Deployment and Spot Checks Following security testing by ICSA Labs, all tested firewall products remain continuously deployed at the labs for the length of the testing contract. When relevant new attacks and vulnerabilities are discovered, all deployed firewall models may be periodically checked to ensure they provide the requisite protection. In the event that any firewall is found susceptible to new attacks or vulnerabilities during a check, ICSA Labs FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 1 of 8 Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report works with the security product vendor to resolve the shortcomings in order for the product to maintain its ICSA Labs Firewall Certification. Tested Firewall Product Components Hardware For firewall security certification testing, ICSA Labs installed the FortiGate VM04 (FGVM04) Firewall using ESXi 6.5 on Dell server hardware. Software Testing was successfully completed with firmware version 6.4.0 build 1579(GA). Documentation To satisfy documentation requirements, Fortinet Consolidated Security Platforms provided ICSA Labs with the following document in order to assist in the installation, configuration, and administration of their firewall product: FortiOS Administration Guide Version 6.4.0 Product Family Members ICSA Labs Corporate Firewall Certification extends beyond the most recently tested model (identified in the "Hardware" section above) to the other members of the Fortinet Consolidated Security Platforms. Therefore all of the models from the family listed below are ICSA Labs Certified Firewalls. For that reason, ICSA Labs periodically tests other physical and/or virtual models in the family or series. Finally, note that any models found on the security vendor's datasheet for this product family that is neither listed below nor listed on the ICSA Labs certified product list is not considered ICSA Labs Certified: FortiGate/FortiWifi 30E FortiGate 40F FortiGate/FortiWifi 51E FortiGate 60F FortiGate/FortiWifi 61E FortiGate 81E/FortiWifi 81E-POE FortiGate/FortiWifi 91E FortiGate 100E/101E FortiGate 100F/101F FortiGate 200E/201E FortiGate 300D FortiGate 300E/301E FortiGate 400E/401E FortiGate 500E/501E FortiGate 600D FortiGate 600E/601E FortiGate 800D FortiGate 1000D FortiGate 1100E/1101E FortiGate 1200D FortiGate 1500D FortiGate 2000E FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 2 of 8 Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report FortiGate 2200E/2201E FortiGate 2500E FortiGate 3000D FortiGate 3300E/3301E FortiGate 3700D FortiGate 3800D FortiGate 3960E FortiGate 3980E FortiGate 5000 FortiGate 6300E/6301E FortiGate 6500E/6501E FortiGate 7030E FortiGate 7040E FortiGate 7060E FortiGate VM Installation and Configuration Firewall products can be configured different ways; therefore, ICSA Labs typically makes many configuration related decisions prior to adding a security policy to the firewall. Because ICSA Labs attempts to exploit the product under test, configuration decisions were made in an attempt to make exploitation less likely. ICSA Labs installed and configured the security vendor's product following the firewall product documentation. Any special configuration changes or deviations from the documentation that were necessary to execute a test or meet a requirement are documented in this section. ICSA Labs configured the FGVM04 in routing mode for both inbound and outbound traffic. In addition to security policy rule changes, ICSA labs made the following configuration changes to prepare the FGVM04 for testing: Modified the configuration to log out of state ICMP packets. #config log setting (setting)# set log-invalid-packet enable (setting)#end Restricted management connections to use secure ciphers. #config system global (global)# set admin-https-ssl-versions tlsv1-2 (global)#end Modified configuration to block fragmented packets #config system interface (interface)# edit [port #] (port#)# set drop-fragment enable (port#) end Blocked packets with spoofed source addresses. #config system settings (settings)# set strict-src-check enable (port#)# end FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 3 of 8 Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report Enabled IPS rule to block FTP bounce attack. #config config ips sensor (sensor)# edit [policy name] (policy name)# config entries (entries)# edit [id] (id)# set rule 109445133 (id)# set status enable (id)# set action block (id)# set rate-count 1 (id)# set rate-duration 10 (id)# end (entries)# next (Sensor)# end Enabled IPS rule to block Cert vulnerability 328867, an FTP state-related exploit from traversing the firewall. #config config ips sensor (sensor)# edit [policy name] (policy name)# config entries (entries)# edit [id] (id)# set rule 32481 (id)# set status enable (id)# set action block (id)# end (entries)# next (Sensor)# end Required Services Security Policy Transition Expectation Each phase of firewall testing is performed predominantly while enforcing a particular security policy. Firewall products must be configurable to minimally enforce a security policy such as the one specified in The Modular Firewall Certification Criteria, referred to as the Required Services Security Policy or RSSP. The RSSP permits a set of common Internet services inbound and outbound while dropping or denying all other network traffic. Results ICSA Labs performed port scans followed by additional scans and other tests to ensure that the security vendor's product was indeed configured according to the RSSP and that no other TCP, UDP, ICMP, or other IP protocol traffic was permitted to or through the firewall in either direction. After performing the scans mentioned above, ICSA Labs verified that the firewall properly handled all permitted outbound and inbound service requests. ICSA Labs also confirmed that no other traffic traversed the firewall in either direction that would violate the security policy. ICSA Labs determined through testing that virtual model FGVM04 from the Fortinet Consolidated Security Platforms met all the security policy transition requirements. FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 4 of 8 Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report Logging Expectation Firewalls destined for enterprise and government organizations as well as firewalls provided by managed security services providers need to provide an extensive logging capability. This explains why the breadth and depth of ICSA Labs firewall log testing is so extensive. ICSA Labs tested the logging functionality provided by the firewall product under test ensuring that all permitted and denied traffic was logged. Analysts in the lab sent traffic both to and (attempted to send traffic) through the product. Other events that must be logged are system startups, time changes, access control rule changes, and administrative login attempts. ICSA Labs typically configures firewall products to send log data for logged events to an external server such as a syslog server. For all logged events ICSA Labs verified that the appropriate, required log data was recorded. Results With the Fortinet Consolidated Security Platforms product, including the FGVM04, logs can be retrieved locally via the web UI, or log events can be sent to an external server such as a syslog server. For this round of certification testing, ICSA Labs configured the tested model to send log messages to a private syslog server. The following depicts how the FGVM04 logs a system time change: Sep 30 13:54:44 205.160.12.254 date=2020-09-30 time=14:09:27 devname="FGVM4VTM20002077" devid="FGVM4VTM20002077" logid="0100032140" type="event" subtype="system" level="notice" vd="root" eventtime=1601499600000425591 tz="-0700" logdesc="Global time setting changed by user" user="admin" ui="GUI(172.26.25.234)" srcip=0.0.0.0 action="time_change" field="date-time" msg="User admin changed time from Wed Sep 30 14:09:27 2020 to Wed Sep 30 14:00:00 2020" ICSA Labs determined through testing that virtual model FGVM04 from the Fortinet Consolidated Security Platforms met all the logging requirements. Administration Expectation Firewall products often have more than a single method by which administration is possible. Whether the product can be administered remotely using vendor provided administration software, from a web browser based interface, via some non-networked connection such as a serial port, or some other means, authentication must be possible before access to administrative functions is granted. ICSA Labs tested not only that authentication mechanisms existed but also that they could not be bypassed and that remote administration traffic was encrypted. Results ICSA Labs remotely administered the FGVM04 in the lab from the private network using the available webbased GUI via HTTPS. Attempts to bypass the authentication mechanism for all means of administration were unsuccessful. ICSA Labs determined through testing that virtual model FGVM04 from the Fortinet Consolidated Security Platforms met all the administration requirements. FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 5 of 8 Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report Persistence Expectation Power outages, electrical storms, and inadvertent power losses should not cause the firewall to lose valuable information such as the remote administration configuration, security policy being enforced, log data, time and date, and authentication data. This section documents the findings of ICSA Labs testing of the firewall product against the persistence requirements. Results The tested FGVM04 firewall product continued to maintain its configuration, settings, and data following a forced power outage. Similarly, the products continued to enforce the configured security policy following the outage. ICSA Labs determined through testing that virtual model FGVM04 from the Fortinet Consolidated Security Platforms met all the persistence requirements. Documentation Expectation ICSA Labs expects firewall documentation to be accurate and applicable to the version tested. The documentation should minimally provide appropriate guidance for installation, configuration and administration. Results ICSA Labs determined that the documentation provided was adequate and accurate for the purposes of product installation and administration. The documentation provided by Fortinet met all of the documentation requirements. Functional and Security Testing Expectation Once configured to enforce a security policy an ICSA Labs certified firewall must properly permit the services allowed by that policy. In this case, "properly" means that the service functions correctly. The firewall must be capable of preventing well-known, potentially harmful behavior found in some network protocols while at the same time maintaining compliance with applicable network protocol standards in all other ways. In the event of a conflict between these two things, a firewall tested and certified by ICSA Labs must defer to providing increased security. During functional testing ICSA Labs checked to ensure proper protocol behavior for the permitted services. During security testing, ICSA Labs used commercial, in-house, and freely available testing tools to attack and probe the firewall. ICSA Labs used these tools to attempt to defeat or circumvent the security policy enforced. Additionally, using Denial-of-Service and fragmentation attacks ICSA Labs attempted to overwhelm, bypass or otherwise defeat the enforced security policy. Since there is overlap between functional and security testing, the results of both phases of testing are presented here. FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 6 of 8 Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report Results The FGVM04 from the Fortinet Consolidated Security Platforms met all Functional and Security Testing requirements. No violations were found in this area throughout testing. Criteria Violations and Resolutions Introduction In the event that ICSA Labs uncovers criteria violations while testing a firewall product, the security vendor must make repairs before testing is successfully completed and certification granted. The section that follows documents all criteria violations discovered during testing. Results The FGVM04 from the Fortinet Consolidated Security Platforms met all Corporate Firewall Certification Criteria requirements. No violations were found during the test cycle. ICSA Labs Certified Firewalls Because the FGVM04 virtual firewall model passed all of the firewall security test cases performed by ICSA Labs and as the tested product met the entire set of testing criteria requirements, ICSA Labs is pleased to state that both it and the other models comprising the Fortinet Consolidated Security Platforms retained ICSA Labs Corporate Firewall Certification. FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 7 of 8 Fortinet Inc. Fortinet Consolidated Security Platforms Firewall Certification Testing Report Authority This report is issued by the authority of the General Manager, ICSA Labs. Tests are done under normal operating conditions. ICSA Labs The goal of ICSA Labs is to significantly increase user and enterprise trust in information security products and solutions. For nearly 30 years, ICSA Labs, an independent division of Verizon, has been providing credible, independent, 3rd party security product testing and certification for many of the world's top security product developers and service providers. Enterprises worldwide rely on ICSA Labs to set and apply objective testing and certification criteria for measuring product compliance and performance. Fortinet, Inc. Fortinet's portfolio of security gateways, subscription services, and complementary products delivers high levels of network, content, and application security for enterprises of all sizes, managed service providers, and telecommunications carriers, while reducing total cost of ownership and providing a flexible, scalable path for expansion. www.icsalabs.com www.fortinet.com FW-Fortinet-2020-1012-01 Copyright © 2020 ICSA Labs. All rights reserved. Page 8 of 8Microsoft Word 2013 Microsoft Word 2013