Integrate FortiDeceptor with FortiGate over Fabric
This topic describes how to integrate FortiDeceptor with FortiGate over Fabric in FortiOS versions 7.2.1 and 7.2.0.
FortiGate 7.2.1 has a bug which prevents adding and displaying the FortiDeceptor information widgets in the dashboard. |
Integrate FortiDeceptor with FortiGate over Fabric:
- Configure the Fabric Connector on FortiGate.
- Configure the upstream FortiDeceptor.
- Authorize FortiDeceptor on FortiGate.
- Configure the automation on FortiGate.
- Create a stitch for manual block on FortiGate.
- Create a stitch for manual unblock.
- Check the quarantine status in FortiDeceptor.
- Check quarantine status on FortiGate.
1. Configure the Fabric Connector on FortiGate
1.1 Create the administrator profile in FortiGate
- In FortiGate, go to System > Admin Profiles.
- Select prof_admin or super_admin and click Create New. The New Admin Profile page opens.
- Configure the profile Access Permissions. The following are the minimum required permissions.
Access Control
Permissions
Security Fabric Read/Write FortiView Read User & Device Read/Write Firewall Read Log & Report Read Network Read System Read/Write Security Profile Read VPN Read WAN Opt & Cache Read WiFi & Switch Read - Click OK.
1.2 Configure the Fabric Connector using the FortiGate profile
Enable the Security Fabric. For more information, see Configuring the root FortiGate and downstream FortiGates.
- Go to Security Fabric > Fabric Connectors.
- Double-click the Security Fabric Setup tile. The Edit Fabric Connector window opens.
- Configure the following settings and click OK.
Security Fabric role Select Serve as Fabric Root. Allow downstream device REST API access Enable.
Enabling Allow downstream device REST API access is mandatory.
Administrator profile Select the profile you create in Step 1.1 Create the administrator profile in FortiGate.
2. Configure the upstream FortiDeceptor
- In FortiDeceptor, go to Fabric > Quarantine Integration.
- Configure the Fabric Upstream settings and click Apply.
Enabled Enable. Upstream IP address Enter the IP of the upstream FortiGate Quarantine Via Upstream Enable.
3. Authorize FortiDeceptor on FortiGate
3.1 Update the device status
- Go to System > Fabric Management.
- Select the FortiDeceptor with a status of Waiting for authorization and click "Authorize.
3.2 Add the fabric device widget in FortiGate Dashboard
- Go to Dashboard > Status and click Add Widget. The Add Dashboard Widget menu opens.
- Under Security Fabric, click Fabric Device.
- From the Device dropdown, select the FortiDeceptor.
- Configure the other settings and click Add Widget.
3.3 Monitor the FortiDeceptor widgets on FortiGate
Use the FortiDeceptor Fabric Device widget to monitor FortiDeceptor System Information and Deception Decoys information.
4. Configure the automation on FortiGate
4.1 Create Stitch for automated quarantine on FortiGate side
- Go to Security Fabric >Automation.
- In the banner click Action.
- Click Create New and then click IP Ban. The Create New Automation Action page opens.
- Enter a descriptive name Name such as
fdc_ban-ip
and a Description such asFor fabric
and click OK.
4.2. Create a trigger for automated quarantine
- In FortiGate go to Fabric > Automation.
- In the banner, click Trigger.
- Click Create New and then click the Fabric Connector Event tile.
- Configure the following settings, and click OK.
Name Give the connector a descriptive name such as FDC_Insider_Threat
.Description Enter a description such as FDC mitigation
.Connector Select the upsream FortiDeceptor device. Event name Select Insider Threat.
4.3 Create a stitch for automated quarantine
- In FortiGate go to Security Fabric > Automation.
- In the banner, click Stitch and then click Create New.
- Give the Stitch a descriptive name such as
FDC_ban
. - Click the Trigger tile and select the trigger you created in Step 4.2. Create Trigger for automated quarantine (
FDC_Insider_Threat).
- Click the Action tile and select the Action you created (
fdc_ban-ip
).
5. Create a stitch for manual block on FortiGate
5.1 Create an Action for manual block
- In FortiGate go to Security Fabric > Automation.
- In the banner, click Action.
- Click Create New and then click the IP Ban tile.
- Give the Action a descriptive Name such as
ipban
and enter a Description such asblock the IP
and click OK.
5.2 Create a trigger for manual block
- In FortiGate, go to Security Fabric > Automation.
- In the banner, click Trigger;
- Click Create New and then click the Fabric Connector Event tile.
- Configure the following settings and click OK.
Name Enter a descriptive name such as manual-ban
.Connector Select the downstream FortiDeceptor device. Event Name Select Notify Ban.
5.3 Create a stitch for manual block
- Go to Security Fabric > Automation.
- In the banner, click Stitch, and then click Create New.
- Give the Stitch a descriptive name such as
FDC_Manual_Block
. - Click the Trigger tile and select the trigger you created in 5.2 Create Trigger for manual block (
manual-ban
). - Click the Action tile and select the Action you created in Step 5.1 Create Action for manual block (
ipban
)
6. Create a stitch for manual unblock
6.1 Create an Action for manual unblock
- In FortiGate go to Security Fabric > Automation.
- In the banner, click Action.
- Click Create New and then scroll down and click the CLI Script tile.
- Give the action an descriptive Name such as
unblock
. - In the CLI Script > Script field enter the following command and click OK.
diagnose user banned-ip delete src4 %%log.srcip%%
6.2 Create a trigger for manual unblock
- In FortiGate, go to Security Fabric > Automation.
- In the banner, click Trigger
- Click Create New, then configure the following settings and click OK.
Name Give the trigger a descriptive name such as Trigger-unban
.Connector Select the downstream FortiDeceptor device. Event name Select Notify Unban.
6.3 Create a stitch for manual unblock
- Go to Security Fabric > Automation.
- In the banner, click Stitch, and then click Create New.
- Give the Stitch a descriptive name such as
FDC_Manual_Unblock
. - Click the Trigger tile and select the trigger you created in 6.2 Create Trigger for manual unblock (
unblock
) . - Click the Action tile and select the Action you created in Step 6.1 Create Action for manual unblock (
Trigger-ban
).
7. Check the quarantine status in FortiDeceptor
- In FortiDeceptor, go to Fabric > Quarantine Status.
- For Type > Auto quarantine, verify the Status is Quarantined.
- (Optional) Trigger a manual block.
- Select a device with Type > Manual quarantine.
- In the toolbar, click Block.
8. Check quarantine status on FortiGate
To view the quarantine status with the FortiGate GUI:
Go to Dashboard > Users & Devices and expand the Quarantine widget.
To view quarantine status with FortiGate CLI:
Run the following command:
diagnose user quarantine list
To view the debug log for quarantine with the FortiGate CLI:
Run the following command:
diagnose debug en