# Annexes (William)
## Fortigate
### Créer une aggrégat d'interfaces :
To create an aggregate interface using the GUI:
Go to *Network* > *Interfaces* and select *Create New* > *Interface*.
For *Interface Name*, enter *Aggregate*.
For the *Type*, select *802.3ad Aggregate*.
In the *physical Interface Members*, click to add interfaces and select ports 4, 5, and 6.
For *Addressing mode*, select *Manual*.
For the IP address for the port, enter 10.1.1.123/24.
For*Administrative Access*, select *HTTPS* and *SSH*.
Select *OK*.
To create an aggregate interface using the CLI:
```
FG140P3G15800330 (aggregate) # show
config system interface
edit "aggregate"
set vdom "root"
set ip 10.1.1.123 255.255.255.0
set allowaccess ping https ssh snmp http fgfm radius-acct capwap ftm
set type aggregate
set member "port3" "port4" "port5"
set device-identification enable
set lldp-transmission enable
set fortiheartbeat enable
set role lan
set snmp-index 45
next
end
```
### Configurer une interface externe
```
config system interface
edit external
set mode static
set ip 172.16.21.2 255.255.255.0
end
```
### Configurer une interface VLAN
To add VLAN subinterfaces:
```
config system interface
edit VLAN_100
set vdom root
set interface internal
set type vlan
set vlanid 100
set mode static
set ip 10.1.1.1 255.255.255.0
set allowaccess https ping
next
edit VLAN_200
set vdom root
set interface internal
set type vlan
set vlanid 200
set mode static
set ip 10.1.2.1 255.255.255.0
set allowaccess https ping
end
To add the firewall addresses:
config firewall address
edit VLAN_100_Net
set type ipmask
set subnet 10.1.1.0 255.255.255.0
next
edit VLAN_200_Net
set type ipmask
set subnet 10.1.2.0 255.255.255.0
end
```
### Configurer un serveur DHCP sur une interface
To add a DHCP server on the GUI:
```
1. Go to Network > Interfaces.
2. Edit an interface.
3. Enable the DHCP Server option and configure the settings.
```
To add a DHCP server on the CLI:
```
config system dhcp server
edit 1
set dns-service default
set default-gateway 192.168.1.2
set netmask 255.255.255.0
set interface "port1"
config ip-range
edit 1
set start-ip 192.168.1.1
set end-ip 192.168.1.1
next
edit 2
set start-ip 192.168.1.3
set end-ip 192.168.1.254
next
end
set timezone-option default
set tftp-server "172.16.1.2"
next
end
```
### Configuration d'un VPN IPSec site-à-site avec certificat
```
1. Import the certificate.
2. Configure user peers.
3. Configure the HQ1 FortiGate.
a. Go to VPN > IPsec Wizard and configure the following settings for VPN Setup:
i. Enter a VPN name.
ii. For Template Type, select Site to Site.
iii. For Remote Device Type, select FortiGate.
iv. For NAT Configuration, select No NAT Between Sites.
v. Click Next.
b. Configure the following settings for Authentication:
i. For Remote Device, select IP Address.
ii. For the IP address, enter 172.16.202.1.
iii. For Outgoing interface, enter port1.
iv. For Authentication Method, select Signature.
v. In the Certificate name field, select the imported certificate.
vi. From the Peer Certificate CA dropdown list, select the desired peer CA certificate.
vii. Click Next.
c. Configure the following settings for Policy & Routing:
i. From the Local Interface dropdown menu, select the local interface.
ii. Configure the Local Subnets as 10.1.100.0.
iii. Configure the Remote Subnets as 172.16.101.0.
iv. Click Create.
4. Configure the HQ2 FortiGate.
a. Go to VPN > IPsec Wizard and configure the following settings for VPN Setup:
i. Enter a VPN name.
ii. For Template Type, select Site to Site.
iii. For Remote Device Type, select FortiGate.
iv. For NAT Configuration, select No NAT Between Sites.
v. Click Next.
b. Configure the following settings for Authentication:
i. For Remote Device, select IP Address.
ii. For the IP address, enter 172.16.2001.
iii. For Outgoing interface, enter port25.
iv. For Authentication Method, select Signature.
v. In the Certificate name field, select the imported certificate.
vi. From the Peer Certificate CA dropdown list, select the peer CA certificate.
vii. Click Next.
c. Configure the following settings for Policy & Routing:
i. From the Local Interface dropdown menu, select the local interface.
ii. Configure Local Subnets as 172.16.101.0.
iii. Configure the Remote Subnets as 10.1.100.0.
iv. Click Create.
```
### Configuration d'un VPN SSL pour l'accès nomades
To configure SSL VPN using the GUI:
```
1. Configure the interface and firewall address:
a. Go to Network > Interfaces and edit the wan1 interface.
b. Set IP/Network Mask to 172.20.120.123/255.255.255.0.
c. Edit port1 interface and set IP/Network Mask to 192.168.1.99/255.255.255.0.
d. Click OK.
2. Configure user and user group:
a. Go to User & Authentication > User Definition to create a local user sslvpnuser1.
b. Go to User & Authentication > User Groups to create a group sslvpngroup with the member sslvpnuser1.
3. Configure SSL VPN web portal:
a. Go to VPN > SSL-VPN Portals to create a tunnel mode only portal my-full-tunnel-portal.
b. Disable Split Tunneling.
4. Configure SSL VPN settings:
a. Go to VPN > SSL-VPN Settings.
b. For Listen on Interface(s), select wan1.
c. Set Listen on Port to 10443.
d. Choose a certificate for Server Certificate. The default is Fortinet_Factory.
e. In Authentication/Portal Mapping All Other Users/Groups, set the Portal to tunnel-access.
f. Create new Authentication/Portal Mapping for group sslvpngroup mapping portal my-full-tunnel-portal.
5. Configure SSL VPN firewall policies to allow remote user to access the internal network:
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. Set Name to sslvpn tunnel mode access.
c. Set Incoming Interface to SSL-VPN tunnel interface(ssl.root).
d. Set Outgoing Interface to port1.
e. Set the Source Address to all and User to sslvpngroup.
f. Set Destination to all, Schedule to always, Service to ALL, and Action to Accept.
g. Click OK.
h. Click Create New.
i. Set Name to sslvpn tunnel mode outgoing.
j. Configure the same settings as the previous policy, except set Outgoing Interface to wan1.
k. Click OK.
```
## Cisco
### Configuration PAgP
To configure interface to talk actively with PAgP packects (desirable mode):
```
Switch#configure terminal
Switch(configure)#interface range f0/1 - 2
Switch(configure-if-range)#channel-group 5 mode desirable
Switch(configure-if-range)#end
```
To verify if the ether channel is formed use following show command:
`Switch#show ethernet channel summary`
### Configuration VTP
1. configuration domaine VTP qu’on appelle TEST:
```
Switch>enable
Switch#configure terminal
Switch(config)#vtp domain TEST
Changing VTP domain name from NULL to TEST
```
2. configuration du mode Server:
```
Switch(config)#vtp mode server
Device mode already VTP SERVER.
```
3. activation de la fonction pruning (à partir du switch Server):
```
Switch(config)#vtp pruning
Pruning switched on
```
4. configuration d’un mot de passe VTP (cisco123):
```
Switch(config)#vtp password cisco123
Setting device VLAN database password to cisco123
```
5. activation de la version 2 de VTP (à faire sur tous les switchs!):
`Switch(config)#vtp version 2`
Vérifications :
1. visualisation du mot de passe configuré
Switch#show vtp password
VTP Password: cisco123
2. vérification des compteurs des messages VTP envoyés et reçus:
Switch#show vtp counters
## Bitdefender
### Installation appliance Bitdefender
For installation and initial setup, you must have the following at hand:
● DNS names or fixed IP addresses (either by static configuration or via a DHCP
reservation) for the GravityZone appliances
● Username and password of a domain administrator
● vCenter Server, XenServer details (hostname or IP address, communication
port, administrator username and password)
● License keys (check the trial registration or purchase email)
● Outgoing mail server settings
● If needed, proxy server settings
● Security certificates
To deploy and set up GravityZone:
1. Download the GravityZone virtual appliance image from the Bitdefender website
(link provided in registration or purchase email).
2. Import the GravityZone virtual appliance image in your virtualized environment.
3. Power on the appliance.
4. From your virtualization management tool, access the console interface of the
GravityZone appliance.
5. Configure the password for bdadmin, the built-in system administrator.


To configure the hostname settings:
1. From the main menu, select Configure Hostname Settings.
2. Enter the hostname of the appliance and the Active Directory domain name (if
needed).
3. Select OK to save the changes.
You can configure the appliance to automatically obtain network settings from the
DHCP server or you can manually configure network settings. If you choose to use
DHCP, you must configure the DHCP Server to reserve a specific IP address for the
appliance.
1. From the main menu, select Configure Network Settings.

2. Select the network interface.
3. Select the configuration method:
● Configure network settings manually. You must specify the IP address,
network mask, gateway address and DNS server addresses.
● Obtain network settings automatically via DHCP. Use this option only if you
have configured the DHCP Server to reserve a specific IP address for the
appliance.

4. You can check current IP configuration details or link status by selecting the corresponding options.