Fortinet white logo
Fortinet white logo

Test cases

Test cases

The following are test cases performed using the HA setup configured here: FortiAnalyzer HA setup with non-public IP as VIP

Prerequisite

After configuring the HA setup, the following are further prerequisites completed before performing the test cases.

Enable shell on FortiAnalyzer:

In the FortiAnalyzer CLI, enter the following command:

config system admin setting

set shell-access enable

set shell-password `your_secret_password`

end

Checking which CA certificate is retrieved by each FortiAnalyzer:

In the fazha001 CLI, enter the following command:

execute shell

Enter password: `your_secret_password`

bash$

bash$ curl -k -v https://management.azure.com//subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01

* Trying 13.69.114.0:443...

* Connected to management.azure.com (13.69.114.0) port 443 (#0)

* ALPN: offers http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.2 (IN), TLS handshake, Certificate (11):

* TLSv1.2 (IN), TLS handshake, Server key exchange (12):

* TLSv1.2 (IN), TLS handshake, Server finished (14):

* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):

* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.2 (OUT), TLS handshake, Finished (20):

* TLSv1.2 (IN), TLS handshake, Finished (20):

* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384

* ALPN: server accepted http/1.1

* Server certificate:

* subject: C=US; ST=WA; L=Redmond; O=Microsoft Corporation; CN=management.azure.com

* start date: Dec 26 18:48:58 2022 GMT

* expire date: Dec 21 18:48:58 2023 GMT

* issuer: C=US; O=Microsoft Corporation; CN=Microsoft Azure TLS Issuing CA 06

* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.

> GET //subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01 HTTP/1.1

> Host: management.azure.com

> User-Agent: curl/7.84.0

> Accept: */*

>

* Mark bundle as not supporting multiuse

< HTTP/1.1 401 Unauthorized

< Cache-Control: no-cache

< Pragma: no-cache

< Content-Type: application/json; charset=utf-8

< Expires: -1

< WWW-Authenticate: Bearer authorization_uri="https://login.windows.net/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", error="invalid_token", error_description="The authentication failed because of missing 'Authorization' header."

< x-ms-failure-cause: gateway

< x-ms-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-correlation-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-routing-request-id: WESTEUROPE:20230202T130102Z:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< Strict-Transport-Security: max-age=31536000; includeSubDomains

< X-Content-Type-Options: nosniff

< Date: Thu, 02 Feb 2023 13:01:01 GMT

< Connection: close

< Content-Length: 115

<

* Closing connection 0

* TLSv1.2 (OUT), TLS alert, close notify (256):

{"error":{"code":"AuthenticationFailed","message":"Authentication failed. The 'Authorization' header is missing."}}

In the fazha002 CLI, enter the following command:

execute shell

Enter password: `your_secret_password`

bash$

bash$ curl -k -v https://management.azure.com//subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01

* Trying 20.61.101.39:443...

* Connected to management.azure.com (20.61.101.39) port 443 (#0)

* ALPN: offers http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.2 (IN), TLS handshake, Certificate (11):

* TLSv1.2 (IN), TLS handshake, Server key exchange (12):

* TLSv1.2 (IN), TLS handshake, Server finished (14):

* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):

* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.2 (OUT), TLS handshake, Finished (20):

* TLSv1.2 (IN), TLS handshake, Finished (20):

* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384

* ALPN: server accepted http/1.1

* Server certificate:

* subject: C=US; ST=WA; L=Redmond; O=Microsoft Corporation; CN=management.azure.com

* start date: Dec 26 18:48:58 2022 GMT

* expire date: Dec 21 18:48:58 2023 GMT

* issuer: C=US; O=Microsoft Corporation; CN=Microsoft Azure TLS Issuing CA 06

* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.

> GET //subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01 HTTP/1.1

> Host: management.azure.com

> User-Agent: curl/7.84.0

> Accept: */*

>

* Mark bundle as not supporting multiuse

< HTTP/1.1 401 Unauthorized

< Cache-Control: no-cache

< Pragma: no-cache

< Content-Type: application/json; charset=utf-8

< Expires: -1

< WWW-Authenticate: Bearer authorization_uri="https://login.windows.net/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", error="invalid_token", error_description="The authentication failed because of missing 'Authorization' header."

< x-ms-failure-cause: gateway

< x-ms-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-correlation-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-routing-request-id: WESTEUROPE:20230202T144644Z:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< Strict-Transport-Security: max-age=31536000; includeSubDomains

< X-Content-Type-Options: nosniff

< Date: Thu, 02 Feb 2023 14:46:44 GMT

< Connection: close

< Content-Length: 115

<

* Closing connection 0

* TLSv1.2 (OUT), TLS alert, close notify (256):

{"error":{"code":"AuthenticationFailed","message":"Authentication failed. The 'Authorization' header is missing."}}

Note

In the output above we can identify that the issuer of the used server certifcate is called Microsoft Azure TLS Issuing CA 06. This CA certificate can be downloaded from here: https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/certificate-authorities

DUT:

Name

URL or public IP

private IP

User

PWD

FAZHA001

https://13.69.84.16/p/login/

10.0.10.4

myadmin

*****

FAZHA002

https://20.234.143.77/p/login/

10.0.10.5

myadmin

*****

lynx001

ssh azureuser@4.231.109.9

10.0.10.6

azureuser

*****

Network overview:

Test cases

Test cases

The following are test cases performed using the HA setup configured here: FortiAnalyzer HA setup with non-public IP as VIP

Prerequisite

After configuring the HA setup, the following are further prerequisites completed before performing the test cases.

Enable shell on FortiAnalyzer:

In the FortiAnalyzer CLI, enter the following command:

config system admin setting

set shell-access enable

set shell-password `your_secret_password`

end

Checking which CA certificate is retrieved by each FortiAnalyzer:

In the fazha001 CLI, enter the following command:

execute shell

Enter password: `your_secret_password`

bash$

bash$ curl -k -v https://management.azure.com//subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01

* Trying 13.69.114.0:443...

* Connected to management.azure.com (13.69.114.0) port 443 (#0)

* ALPN: offers http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.2 (IN), TLS handshake, Certificate (11):

* TLSv1.2 (IN), TLS handshake, Server key exchange (12):

* TLSv1.2 (IN), TLS handshake, Server finished (14):

* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):

* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.2 (OUT), TLS handshake, Finished (20):

* TLSv1.2 (IN), TLS handshake, Finished (20):

* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384

* ALPN: server accepted http/1.1

* Server certificate:

* subject: C=US; ST=WA; L=Redmond; O=Microsoft Corporation; CN=management.azure.com

* start date: Dec 26 18:48:58 2022 GMT

* expire date: Dec 21 18:48:58 2023 GMT

* issuer: C=US; O=Microsoft Corporation; CN=Microsoft Azure TLS Issuing CA 06

* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.

> GET //subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01 HTTP/1.1

> Host: management.azure.com

> User-Agent: curl/7.84.0

> Accept: */*

>

* Mark bundle as not supporting multiuse

< HTTP/1.1 401 Unauthorized

< Cache-Control: no-cache

< Pragma: no-cache

< Content-Type: application/json; charset=utf-8

< Expires: -1

< WWW-Authenticate: Bearer authorization_uri="https://login.windows.net/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", error="invalid_token", error_description="The authentication failed because of missing 'Authorization' header."

< x-ms-failure-cause: gateway

< x-ms-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-correlation-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-routing-request-id: WESTEUROPE:20230202T130102Z:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< Strict-Transport-Security: max-age=31536000; includeSubDomains

< X-Content-Type-Options: nosniff

< Date: Thu, 02 Feb 2023 13:01:01 GMT

< Connection: close

< Content-Length: 115

<

* Closing connection 0

* TLSv1.2 (OUT), TLS alert, close notify (256):

{"error":{"code":"AuthenticationFailed","message":"Authentication failed. The 'Authorization' header is missing."}}

In the fazha002 CLI, enter the following command:

execute shell

Enter password: `your_secret_password`

bash$

bash$ curl -k -v https://management.azure.com//subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01

* Trying 20.61.101.39:443...

* Connected to management.azure.com (20.61.101.39) port 443 (#0)

* ALPN: offers http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.2 (IN), TLS handshake, Certificate (11):

* TLSv1.2 (IN), TLS handshake, Server key exchange (12):

* TLSv1.2 (IN), TLS handshake, Server finished (14):

* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):

* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.2 (OUT), TLS handshake, Finished (20):

* TLSv1.2 (IN), TLS handshake, Finished (20):

* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384

* ALPN: server accepted http/1.1

* Server certificate:

* subject: C=US; ST=WA; L=Redmond; O=Microsoft Corporation; CN=management.azure.com

* start date: Dec 26 18:48:58 2022 GMT

* expire date: Dec 21 18:48:58 2023 GMT

* issuer: C=US; O=Microsoft Corporation; CN=Microsoft Azure TLS Issuing CA 06

* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.

> GET //subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/CMM_RG_FAZHA/providers/Microsoft.Network/networkInterfaces/?api-version=2021-08-01 HTTP/1.1

> Host: management.azure.com

> User-Agent: curl/7.84.0

> Accept: */*

>

* Mark bundle as not supporting multiuse

< HTTP/1.1 401 Unauthorized

< Cache-Control: no-cache

< Pragma: no-cache

< Content-Type: application/json; charset=utf-8

< Expires: -1

< WWW-Authenticate: Bearer authorization_uri="https://login.windows.net/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", error="invalid_token", error_description="The authentication failed because of missing 'Authorization' header."

< x-ms-failure-cause: gateway

< x-ms-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-correlation-request-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< x-ms-routing-request-id: WESTEUROPE:20230202T144644Z:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

< Strict-Transport-Security: max-age=31536000; includeSubDomains

< X-Content-Type-Options: nosniff

< Date: Thu, 02 Feb 2023 14:46:44 GMT

< Connection: close

< Content-Length: 115

<

* Closing connection 0

* TLSv1.2 (OUT), TLS alert, close notify (256):

{"error":{"code":"AuthenticationFailed","message":"Authentication failed. The 'Authorization' header is missing."}}

Note

In the output above we can identify that the issuer of the used server certifcate is called Microsoft Azure TLS Issuing CA 06. This CA certificate can be downloaded from here: https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/certificate-authorities

DUT:

Name

URL or public IP

private IP

User

PWD

FAZHA001

https://13.69.84.16/p/login/

10.0.10.4

myadmin

*****

FAZHA002

https://20.234.143.77/p/login/

10.0.10.5

myadmin

*****

lynx001

ssh azureuser@4.231.109.9

10.0.10.6

azureuser

*****

Network overview: