LAB 13 - Data Leak Prevention (DLP) PDF
LAB 13 - Data Leak Prevention (DLP) PDF
© FORTINET
Lab 13: Data Leak Prevention (DLP)
In this lab, you will use data leak prevention (DLP) rules and sensors to block sensitive data from leaving the
private network.
Objectives
l Configure DLP to block ZIP files.
l Read and interpret DLP log entries.
l Set up DLP banning and quarantining.
l Configure DLP fingerprinting.
Time to Complete
Estimated: 30 minutes
Prerequisites
Before beginning this lab, you must restore a configuration file to Local-FortiGate.
There are multiple ways to configure DLP to prevent sensitive information from leaving your network.
In this exercise, you will configure DLP to block files by file type, and apply DLP to a firewall policy. Then, you will
test the configuration and view the logs.The DLP feature is only available in the proxy mode.
Enable DLP
By default, DLP is not enabled in the GUI. You will enable DLP to be visible in the GUI.
To enable DLP
1. On the Local-Windows VM, open a browser and log in to the Local-FortiGate GUI at 10.0.1.254 with the user
name admin and password password.
2. Click System > Feature Visibility.
3. In the Security Features section, enable DLP.
4. Click Apply.
You will configure a new DLP sensor, and create a DLP filter to block ZIP files.
© FORTINET
Field Value
Type Files
Tip: On right side of the screen, type the name in the search box, and
then click file types to add.
Action Block
© FORTINET
6. Click OK.
7. Click Apply.
You can also block traffic based on a file name of *.zip, but it is not recommended. A
person could circumvent that type of DLP by changing the filename to, for example,
*.zp1, or *.txt.
By comparison, file type identification works by analyzing the binary layout of the file.
Now that you have created a DLP sensor, you will edit the existing firewall policy to apply the DLP sensor to it.
If you require assistance, or to verify your work, use the step-by-step instructions that follow.
After you complete the challenge, see Test the DLP Sensor on page 217 .
© FORTINET
To apply a DLP sensor to firewall policy
1. Continuing on the Local-FortiGate GUI, click Policy & Objects > IPv4 Policy.
2. Right-click the ID column for the DLP firewall policy and click Edit.
3. In the Security Profiles section, enable DLP Sensor, and from the drop-down menu, select No_ZIP_files.
4. Click OK.
5. Optionally, if you would like to see the default proxy options profile that is selected in the firewall policy, click
Security Profiles > Proxy Options.
This profile determines how FortiGate’s proxies pick up protocols. For example, the HTTP listening port is set
to port 80.
© FORTINET
Test the DLP Sensor
Now, you will test the DLP sensor by trying to transmit a ZIP file by uploading the file to a web URL.
http://10.200.1.254/fileupload.html
Now, you will check the logs related to DLP for the test you performed previously.
4. On the right side of the screen, the Details tab shows the forward traffic log information, such as NAT translation,
NAT IP, policy ID, and security action.
© FORTINET
You can also view DLP logs under Log & Report > Data Leak Prevention.
The DLP logs section will not display if there are no DLP logs. FortiGate will show it
after creating logs. If the DLP menu item does not display in the GUI, refresh your
browser or log out of the Local-FortiGate GUI and log back in again.
You can configure the DLP filter to quarantine IP addresses that are trying to leak sensitive information. The
quarantined IP address will be blocked from accessing the network so that you have time to investigate the issue.
Quarantine an IP Address
Now, you will modify the action of the previously configured DLP filter to quarantine the IP address.
To quarantine an IP address
1. On the Local-Windows VM, open a browser and log in to the Local-FortiGate GUI at 10.0.1.254 with the user
name admin and password password.
2. Click Security Profiles > Data Leak Prevention.
3. In the upper-right corner of the screen, from the drop-down menu, select No_ZIP_files.
6. Click OK.
7. Click Apply.
Now, you will test the quarantine action by trying to upload a ZIP file.
http://10.200.1.254/fileupload.html
© FORTINET
The DLP block message will appear.
5. On the Local-Windows VM, open a few new web browser tabs and go to the following websites:
l http://10.200.1.254
l http://10.200.3.254
A replacement message appears instead of the website. This occurs because the IP address that is sending
the request has been quarantined and is not allowed through the firewall policy on FortiGate.
Now, you will remove the quarantined IP address from the banned entry list so that you can access the network.
DLP fingerprinting is a technique that uses content-based filtering and identifies specific files using one or more
cyclic redundancy checks (CRC) for the files in the configured network share.
A network share is preconfigured on the Local-Windows VM with a user account of Administrator and share
name of DLPshare.
In the configuration that you uploaded at the beginning of this exercise, FortiGate is preconfigured to access the
network share.
In this procedure, you will first view the DLP configuration for the network share, and then you will configure a new
filter for DLP fingerprinting.
You will notice that the Local-FortiGate is configured to access the network share configured on Local-
Windows with an IP address of 10.0.1.10.
4. Enter the following commands to configure a new filter for DLP fingerprinting in the DLP sensor named No_ZIP_
files:
config dlp sensor
edit No_ZIP_files
config filter
edit 2
set proto http-post
set filter-by fingerprint
set fp-sensitivity Critical
set action block
end
end
© FORTINET
The DLP fingerprinting filter can be configured using only the CLI. After it is
configured, it is visible on the GUI.
3. Click OK.
4. Click Save File.
5. Click OK.
The file saves to the Downloads folder.
7. Click the down arrow download icon on the top right of the browser.
8. Right-click the backup file for your configuration, and then click Open Containing Folder.
© FORTINET
Now, you will test DLP fingerprinting for the file you added to the network share. DLP fingerprinting is configured
based on a schedule. For the purpose of this lab, we will trigger fingerprint checksums manually, using CLI
commands. This is because training is conducted at different times globally, and a configured schedule may not
work correctly.
© FORTINET
http://10.200.1.254/fileupload.html
4. On the web page, click Browse, and go to C: > DLPshare > Local-FortiGate_
<yourtimestamp>.conf.
5. Click Open.
6. Click Submit the file.
The file upload should be blocked.
5. Close Notepad++.
© FORTINET
Test DLP Fingerprinting With the Modified File
Now, you will test DLP fingerprinting using the modified file in the network share. DLP fingerprinting is configured
based on schedule. For the purpose of this lab, you will trigger fingerprint checksums manually, using CLI
commands. This is because training is conducted at different times globally and using a configured schedule
might not work correctly.
Tip: You can press the up button on your keyboard twice to get that command you entered previously.
2. Run the following command to check the updated checksum:
http://10.200.1.254/fileupload.html
Fingerprinting breaks the file into chunks and performs checksums on each part. By
default, DLP will detect a match if any part's checksum from the fingerprint matches.