• Contact
  • About Me
  • Privacy Policy
  • Disclaimer
DefenceDev
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos
No Result
View All Result
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos
No Result
View All Result
DefenceDev
No Result
View All Result
ADVERTISEMENT
Home Network Tutorials FortiGate

Home Lab with Fortinet FortiGate 60D Firewall

neo by neo
August 4, 2025
in FortiGate
0
Home Lab with Fortinet FortiGate 60D Firewall

Home Lab with Fortinet FortiGate 60D Firewall

0
SHARES
11
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT
Table of Contents
  • Home Lab with FortiGate 60D
    • Main Functions I Use
      • Firewall Rules and Network Segmentation
      • Geo-Blocking to Restrict Access from Unwanted Countries
      • Security Profiles (Without Active Subscription)
      • DNS Server Together with PiHole and AdGuard
      • SSL VPN Server for Remote Access
      • Internal and External Traffic Routing
      • Hosting Multiple Servers and Applications on My Network
  • Conclusion

Home Lab with FortiGate 60D

I run a small home lab, and at the core of my network stands a FortiGate 60D—a firewall model released around 2013, making it over 10 years old today. This device hasn’t had any active Fortinet security subscriptions for several years, and I don’t plan to purchase them either. Despite that, the 60D still plays a vital role in securing and organizing my home environment. Its hardware may be outdated by enterprise standards, but its built-in capabilities are far from obsolete.

Here’s how I use the FortiGate 60D in my network without any licensed services:

  • Firewall rules and network segmentation
    • Geo-blocking to restrict access from unwanted countries
  • Security profiles: IPS, Antivirus, and Application Control
  • DNS Server Together with PiHole and AdGuard
  • SSL VPN server for secure remote access
  • Internal and external traffic routing
  • Hosting self-hosted applications like Nextcloud, Immich, and WordPress

Main Functions I Use

Even though my FortiGate 60D hasn’t had active security subscriptions in years, I still take full advantage of the built-in features. These functions are more than enough to secure and manage a small home lab or advanced home network. Below are the key features I rely on daily.

At the core of any firewall is the ability to define access rules between network segments. I’ve configured the FortiGate to divide my home network into multiple zones—such as IoT devices, servers, test machines, and user devices. Each zone has its own set of firewall rules that limit what kind of traffic can flow in or out.

Firewall Rules and Network Segmentation

At the core of any firewall is the ability to define access rules between network segments. I’ve configured the FortiGate to divide my home network into multiple zones—such as IoT devices, servers, test machines, and user devices. Each zone has its own set of firewall rules that limit what kind of traffic can flow in or out.

For example, my IoT devices cannot communicate with my NAS or management systems. Similarly, guest devices get internet access but have no visibility into the internal network. This segmentation greatly reduces risk in case one of the devices becomes compromised.

If you want to dive deeper into FortiGate firewall policies and how to implement them effectively, check out these detailed guides on my blog:

  • Fortinet FortiGate Policy Implementation
  • Fortinet FortiGate Firewall Policies Best Practices

Geo-Blocking to Restrict Access from Unwanted Countries

To further harden my home network, I’ve implemented geo-blocking using FortiGate’s built-in capabilities. Even without a FortiGuard subscription, the firewall allows me to create policies that block or allow traffic based on geographic location.

For example, I only allow SSL VPN and management access from specific countries where I live or frequently travel. All other regions are denied by default. This drastically reduces the number of scanning attempts, brute-force logins, and other unwanted access from high-risk IP ranges.

Geo-blocking is also applied to public-facing services like my WordPress test environments, where I restrict access to only a few selected countries. This adds another layer of security on top of strong passwords, firewall rules, and segmentation.

If you’re interested in applying geo-based restrictions to your FortiGate setup, check out this detailed guide on my blog:

  • FortiGate: Restrict Access to the Open Ports for Specific Country

Security Profiles (Without Active Subscription)

While the IPS, Antivirus, and Application Control profiles work best with active FortiGuard updates, the base definitions and logic still remain usable. I apply these profiles to certain internal policies, especially between the less trusted zones.

The IPS module helps detect basic intrusion patterns and web attacks, while Application Control restricts unauthorized or risky applications. Even with outdated signatures, the Antivirus module can catch known threats circulating inside the home network. Although it’s not as powerful as a fully licensed setup, these security profiles add a meaningful layer of defense.

ADVERTISEMENT

If you want to learn more about configuring and optimizing these features on FortiGate, here are some useful articles from my blog:

  • FortiGate Antivirus Configuration: Best Practices and Troubleshooting
  • FortiGate IPS: Detect Web Attacks
  • Protect a Self-Hosted Application from Brute-Force Attacks with FortiGate
  • FortiGate DDoS Protection

DNS Server Together with PiHole and AdGuard

In my home lab, DNS resolution is handled through a combination of FortiGate’s built-in DNS features and two powerful tools: PiHole and AdGuard Home. I’ve configured the FortiGate as the main DNS forwarder on the network. All client DNS requests are forwarded from FortiGate to either PiHole or AdGuard, depending on the segment or specific need.

This layered approach gives me flexibility and visibility. PiHole is great for blocking ads and trackers across all devices, while AdGuard Home adds more fine-grained control and filtering features, including DNS rewrites and HTTPS blocking.

Having the FortiGate in front allows me to define access policies, log DNS traffic, and even segment DNS behavior per VLAN. This is especially useful for isolating IoT devices or testing different DNS filtering setups.

If you want to implement a similar setup in your network, these articles will guide you step-by-step:

  • FortiGate DNS Server Configuration
  • AdGuard Install and Configure

SSL VPN Server for Remote Access

One of the most useful features I rely on is the SSL VPN server built into the FortiGate 60D. It allows me to securely access my home network from anywhere in the world. Whether I’m traveling or working remotely, I can connect to internal resources such as my Nextcloud, WordPress development servers, or Immich media library with full encryption.

The setup doesn’t require any active license or FortiGuard subscription. I use the FortiClient VPN on both desktop and mobile devices to establish the connection. Once connected, I have access to my internal VLANs just as if I were physically at home.

The FortiGate also gives me full control over who can connect and what resources they can reach, thanks to user-based firewall policies and group restrictions.

For additional insight, especially if you’re troubleshooting more advanced VPN scenarios, such as site-to-site connectivity or routing issues, take a look at this guide:

  • Fortinet FortiGate Site-to-Site Troubleshooting

Internal and External Traffic Routing

The FortiGate 60D also handles all routing tasks in my network. Whether it’s routing between VLANs or directing specific traffic via different gateways (for example, VPNs), the firewall provides full control.

Policy-based routing allows me to define traffic paths based on source, destination, or service. This helps when I want certain devices to use a different WAN connection or bypass DNS filtering for testing purposes. Despite its age, routing performance remains solid for typical home lab traffic.

ADVERTISEMENT

For a deeper look into how I manage routing on the FortiGate, explore the following posts:

  • FortiGate: Check the Routing Table in the CLI
  • FortiGate Routing Design Best Practices

Hosting Multiple Servers and Applications on My Network

Inside my home lab, I run several servers hosting different applications that I rely on daily. For example, I use Nextcloud for personal cloud storage and file synchronization across devices. It gives me control over my data without depending on third-party cloud providers.

Nextcloud – Personal Cloud Storage and Sync

Nextcloud serves as my private cloud platform for storing files, syncing data across devices, and sharing documents securely. It gives me full control over my data without relying on public cloud services, which is especially important for privacy.

Thanks to integration with my FortiGate firewall, I can control access tightly and protect Nextcloud from external threats. For deeper insights on Nextcloud in my network, check out these articles:

  • Nextcloud Security Concept with FortiGate Firewall
  • Nextcloud Manual Upgrade from 25.0 to 26.0
  • Nextcloud Top 5 Apps
Immich – Photo and Video Backup Solution

I use Immich, an open-source application designed for organizing and backing up photos and videos securely within my home network. Immich simplifies media management and keeps my personal memories safe from cloud vulnerabilities.

ADVERTISEMENT

By running Immich behind the FortiGate firewall, I ensure it remains accessible only to authorized users and protected against internet threats. Learn more about how I use Immich and manage it here:

  • Immich Migration to New Server
  • Organizing and Managing Photos with Immich
  • Immich Resource Usage Monitoring for 4 Users
WordPress – Hosting Multiple Websites

I also host several WordPress websites on my home lab servers. These sites serve various purposes—from blogging to testing new configurations and plugins.

The FortiGate firewall helps me isolate these web servers on dedicated VLANs with specific firewall policies. This way, I protect my main network while still maintaining easy remote access for updates and maintenance via the SSL VPN.

Conclusion

Even though the FortiGate 60D is over a decade old and runs without any active security services, it still performs exceptionally well in a home lab setup. With smart configuration, it provides reliable segmentation, secure remote access, and decent inspection capabilities. It’s a reminder that older enterprise hardware can still serve a valuable role—especially when you know how to leverage its features.

About The Author

neo

See author's posts

Tags: fortigate
ADVERTISEMENT
Previous Post

My Way to Organize a Git Repository for Bash, Mikrotik, FortiGate and other Scripts

Next Post

Nextcloud Access with Multiple Domains – Redirect and SSL Issues (Proxy Manager & Direct Port Forwarding)

neo

neo

Related Posts

My Ultimate FortiGate Command Cheat Sheet
FortiGate

My Ultimate FortiGate Command Cheat Sheet

Setting Up IPS (Intrusion Detection System) Profiles on FortiGate to Detect Web Attacks
FortiGate

Setting Up IPS (Intrusion Detection System) Profiles on FortiGate to Detect Web Attacks

Protect a Self-Hosted Application from Brute Force Attacks with FortiGate
FortiGate

How to Protect a Self-Hosted Application from Brute Force Attacks with FortiGate

FortiGate DDoS Protection: Configure DoS Policies to Secure Self-Hosted Applications
FortiGate

FortiGate DDoS Protection: Configure DoS Policies to Secure Self-Hosted Applications

Fortinet FortiGate Site-to-Site IPsec VPN Troubleshooting
FortiGate

Fortinet FortiGate Site-to-Site IPsec VPN Troubleshooting

Why Upgrade to a FortiGate Firewall? Enhanced Security, Visibility & Performance for Businesses
FortiGate

Why Upgrade to a FortiGate Firewall? Enhanced Security, Visibility & Performance for Businesses

Next Post
Nextcloud Access with Multiple Domains – Redirect and SSL Issues (Proxy Manager & Direct Port Forwarding)

Nextcloud Access with Multiple Domains – Redirect and SSL Issues (Proxy Manager & Direct Port Forwarding)

Leave a Reply

Your email address will not be published. Required fields are marked *


Recommended

Descripton for kill command on Ubuntu

How to Kill All Processes which are using wget on Linux

FortiGate Antivirus: Configuration, Best Practices, and Troubleshooting

FortiGate Antivirus: Configuration, Best Practices, and Troubleshooting

Nextcloud Access with Multiple Domains – Redirect and SSL Issues (Proxy Manager & Direct Port Forwarding)

Nextcloud Access with Multiple Domains – Redirect and SSL Issues (Proxy Manager & Direct Port Forwarding)

Home Lab with Fortinet FortiGate 60D Firewall

Home Lab with Fortinet FortiGate 60D Firewall

My Way to Organize a Git Repository for Bash, Mikrotik, FortiGate and other Scripts

My Way to Organize a Git Repository for Bash, Mikrotik, FortiGate and other Scripts

Categories

  • Blog
  • Cloud
    • Private
  • Linux Tutorials
    • Bash Scripting Tutorials
    • Commands
    • Networking
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Solutions
    • Docker
  • Video Tutorials
    • MikroTik Videos
ADVERTISEMENT

DefenceDev Tutorials

defencedev Logo

Whether you’re just starting or looking to expand your skills, I hope you find useful information and engaging discussions here. Let me take you through my journey and the goals behind this space!

Follow Us

Recent News

Nextcloud Access with Multiple Domains – Redirect and SSL Issues (Proxy Manager & Direct Port Forwarding)

Nextcloud Access with Multiple Domains – Redirect and SSL Issues (Proxy Manager & Direct Port Forwarding)

Home Lab with Fortinet FortiGate 60D Firewall

Home Lab with Fortinet FortiGate 60D Firewall

  • Site Map
  • Privacy Policy
  • Facebook Page
  • Disclaimer
  • Contact
  • About Me

© 2025 defencedev.com - All rights reserved.

No Result
View All Result
  • Home
  • Blog
  • Linux Tutorials
    • Bash Scripting Lessons
    • Commands
    • Networking
    • Bash Scripts
  • Solutions
    • Docker
  • Network Tutorials
    • FortiGate
    • MikroTik
  • Projects
    • AdGuard
    • Immich
    • Nextcloud
    • WordPress
  • Cloud
  • Video Tutorials
    • YouTube Channel
    • MikroTik Videos

© 2025 defencedev.com - All rights reserved.