Behind the Firewall: A Deep Dive into FortiGate Architecture
Here’s a fact that many organizations are gradually becoming aware of: traditional, perimeter-only firewall models are outdated.
In today’s threat-dense ecosystem, attacks are quicker, encrypted, evasive, and increasingly targeted at users in distributed networks. New tools are needed to hold off these threats and better round out cohesive enterprise-level security.
FortiGate’s security-driven networking architecture is one such solution. Unlike traditional solutions, FortiGate isn’t just a firewall, but a consolidated security platform built around dedicated processors (NP/CP), threat intelligence, and a unified operating system (FortiOS).
Thus, whether your organization is looking to secure branches, cloud workloads, or data centres, the FortiGate architecture will ensure performance, visibility, and deep protection without compromise.
In this blog, we will guide you through FortiGate’s architecture and demonstrate how it can strengthen your security posture organization-wide.
Why Your Organization Needs FortiGate: Important Enterprise Use Cases
FortiGate comes bundled with a lot of features right under the hood, and offers even more when integrated across your organization.
Here are some of the top use cases for this platform:
- Web Filtering for Safe Internet Access
Problem: Most organizations have employees regularly accessing hundreds of websites, some intentionally, some accidentally. However, they rarely filter whether these sites contain any malicious content.
How FortiGate Works: FortiGate’s Web Filtering feature protects your organization by blocking malicious URLs, preventing phishing attempts, and ensuring browsing remains productive and risk-free. It also enforces compliance and acceptable use policies without slowing down browsers.
- Intrusion Prevention System (IPS) for Attack Defence
Problem: Many organizations have unidentified weak spots in their network that attackers can constantly scan.
How FortiGate Works: FortiGate’s Intrusion Prevention System (IPS) watches traffic in real time and stops attacks before they reach your servers or applications. This allows your team to focus on genuine incidents instead of chasing false alarms or missing critical ones buried in a noisy environment.
- Micro Segmentation for Internal Threats
Problem: Organizations worry about threats originating from outside, but sometimes internal threats infect devices or compromise user accounts, causing major damage to their internal infrastructure.
How FortiGate Works: It enables you to segment your internal network so that even if one system is compromised, the threat cannot spread freely.
- SSL Inspection for Traffic Visibility
Problem: Most traffic that organizations receive today is encrypted, which is beneficial for privacy, but also advantageous for attackers who hide malware within encrypted channels.
How FortiGate Works: It enables you to decrypt, inspect, and re-encrypt traffic at high speed. This allows your organization to watch what’s actually happening rather than relying on guesswork.
- Secure SD-WAN for Branch Performance
Problem: In your organization there are various challenges associated with the maintenance of performance and security in multiple branches.
How FortiGate Works: FortiGate’s Secure SD-WAN capability intelligently routes traffic based on the application and its requirements. Your branches get faster performance, and security stays consistent everywhere.
- Advanced Malware Protection
Problem: Most organizations have extensive networks, and if a suspicious file enters it, how can it be flagged?
How FortiGate Works: It can automatically send it to FortiSandbox for analysis. If it turns out to be malware, FortiGate reacts instantly, blocking the threat, isolating the device, or triggering a workflow. This automation helps your organization, reduce manual work and enables you to respond to incidents faster.
The Differences That Matter
Now, let's dive deeper into a few important components of the FortiGate architecture to understand what happens behind the scenes.
To truly understand how FortiGate works, you should know: the Network Processor (NP), the Content Processor (CP), within the Security Processing Unit (SPU), and how each plays a critical role in offloading tasks from the CPU to deliver fast, secure network processing.
SPU serves as a decision-making component of Fortinet's hardware architecture and decides whether the packet should be operated by NP or CP. Together, they accelerate traffic flow, enforce security policies, and enable FortiGate’s high-performance inspection.
Understanding FortiGate Architecture
Now, you might be wondering what happens before a packet is allowed into your organization’s network. In most cases, the firewall must answer a few critical questions: What is this packet? Where is it going? Is it safe? Does it match an existing security policy? Should it be scanned deeply or just glanced at?
FortiGate makes these decisions instantly by leveraging its Security Processing Unit (SPU) architecture, which includes Network Processors(NP) and Content Processors (CP). Together, these help maintain and maximize both security and performance. Here’s what really happens:
Step 1: Identify Incoming Traffic
To begin with, your organization should understand how traffic enters your firewall. You need to check which interfaces receive traffic, what types of packets are entering your environment and which flows are considered trusted or not trusted. This helps you to map where FortiGate becomes the enforcement point and what type of traffic will be evaluated first.
Step 2: Firewall Policy Evaluation
Once a packet reaches FortiGate, the firewall checks which policy applies to it. At this stage, FortiGate determines if the packet will be allowed or denied, and if allowed, does it require deep inspection? This ensures that traffic is processed using the correct rule set configured by your organization.
Step 3: Initial Session Validation by the CPU
After policy evaluation, the packet is examined by the CPU. The CPU checks whether the packet belongs to an existing session and validates whether it should proceed with deeper security analysis.
Step 4: SPU Decides the Processing Path
Fotigate’s Security Processing Unit (SPU) then decides how the traffic should be processed. Based on your configuration, the SPU routes the packet either to:
- Network Processor(NP) for high-speed and shallow inspection
- Content Processor(CP), or deep inspection.
This ensures your traffic is handled efficiently without compromising security.
Step 5: Enforcement of Final Security Decision
Once NP/CP processing is completed, the CPU applies the final decision. You must track whether the packet was allowed or blocked, which aligns with your security policies.
Step 6: Tracking and Monitoring Packet Flow
Finally, you should continuously track and monitor packet flow to ensure proper visibility. This includes: Reviewing session tables, ensuring the packet follows the desired path, and checking NP/CP usage.
Conclusion
Where traditional firewalls are about merely blocking traffic, FortiGate’s architecture is about providing your organization with a high-performing, deeply integrated security foundation capable of defending against today’s evolving threats.
With dedicated hardware acceleration (NP/CP), consolidated security services, and advanced analytics, FortiGate enables your IT and security teams to operate with clarity, speed, and confidence. So, whether your organization is expanding, transitioning to the cloud, or enforcing strict compliance, FortiGate provides the architectural backbone to support both growth and security.
Is your organization looking to set up any integrations with Fortinet or having trouble connecting security apps with its infrastructure? For any queries or integration needs related to cybersecurity platforms, please feel free to reach out to us at connect@metronlabs.com.