Fortinet white logo
Fortinet white logo

New Features

Cloud-based Fabric Feed synchronization

Cloud-based Fabric Feed synchronization

Introducing Fabric Feed, an improvement to the existing external feeds feature, which is formerly known as threat feeds. This update lets FortiAnalyzer upload Fabric Feeds directly to the Cloud AMQP server. Once uploaded, these feeds are automatically synchronized with FortiGate devices linked to the same FortiCare account. This enhancement introduces a centralized, cloud-native approach to distributing feed intelligence, improving operational efficiency and consistency across the Security Fabric.

CLI syntax

The config system external-resource command includes new default external resources that are disabled by default and have update-method set to fortimq:

config system external-resource
    edit "IP_Blocked_by_Fabric_SecOps"
        set uuid 495e0cb0-3d94-51f0-7ec7-f0ff45079b48
        set status disable
        set type address
        set update-method fortimq
    next
    edit "Domain_Blocked_by_Fabric_SecOps"
        set uuid 495e126e-3d94-51f0-755a-1240f7ba7742
        set status disable
        set type domain
        set update-method fortimq
    next
    edit "URL_Blocked_by_Fabric_SecOps"
        set uuid 495e1430-3d94-51f0-b321-be7c2ba63e2c
        set status disable
        set update-method fortimq
    next
    edit "MAC_Blocked_by_Fabric_SecOps"
        set uuid 495e15ca-3d94-51f0-ff6a-5d03040d6215
        set status disable
        set type mac-address
        set update-method fortimq
    next

Option

Description

edit <external resource name>

Edit resource. The following default external resources are available and disabled by default:

  • IP_Blocked_by_Fabric_SecOps is type address.

  • Domain_Blocked_by_Fabric_SecOps is type domain.

  • URL_Blocked_by_Fabric_SecOps

  • MAC_Blocked_by_Fabric_SecOps is type mac-address.

Each type of external resource can only be enabled once for each VDOM.

status {enable | disable}

Enable/disable user resource.

update-method {feed | push | fortimq}

External resource update method.

  • feed: FortiGate unit will pull update from the external resource.

  • push: External resource update is pushed to the FortiGate unit through the FortiGate unit's RESTAPI/CLI.

  • fortimq: External resource update is pushed to the FortiGate unit through the Fortinet Message Queue fabric.

GUI configuration

On the Security Fabric > External Connectors pane, click Create New to access and enable one or more Fabric Feeds.

Scope and limitations

FortiAnalyzer 8.0.0 and later is required.

Example

This example describes how to enable and use FortiMQ with FortiAnalyzer and FortiGate. Following is the high-level procedure:

  1. On FortiAnalyzer, enable the FortiMQ connector and define indicators for the block list. See Enabling FortiMQ on FortiAnalyzer.

  2. On FortiGate, enable Fabric Feeds using the GUI or CLI. See Enabling Fabric Feeds on FortiGate.

    After FortiGate synchronizes Fabric Feeds with FortiMQ server, the Fabric Feeds are ready to use. Apply Fabric Feeds to a firewall policy for use in blocking traffic and view the results in traffic logs.

Enabling FortiMQ on FortiAnalyzer

To enable the FortiMQ connector on FortiAnalyzer:
  1. On FortiAnalyzer, go to Incidents & Events > Automation, and enable the FortiMQ Connector.

  2. Go to Indicators to define indicators and their block status. The following types of indicators are supported: Domain, URL, IP, and MAC address.

  3. Go to FortiGate and enable Fabric Feeds using the GUI or CLI. See Enabling Fabric Feeds on FortiGate.

Enabling Fabric Feeds on FortiGate

After the FortiMQ connector is enabled on FortiAnalyzer and indicators defined, you must enable Fabric Feeds on FortiGate to use the FortiAnalyzer indicators. Fabric Feeds can be enabled using the the GUI or CLI.

To enable Fabric Feeds in the FortiGate GUI:
  1. On FortiGate, enable Fabric Feeds:

    1. Go to Security Fabric > External Connectors pane, and click Create New.

    2. Under Fabric Feeds, select a Fabric Feed and click OK to enable it.

    3. Repeat this step to enable additional Fabric Feeds.

  2. After synchronizing with the FortiMQ Cloud server, the Fabric Feeds are available on the Security Fabric > External Connectors pane and ready to use:

  3. IP Address Fabric Feeds and MAC Address Fabric Feeds can be applied directly to a policy.

    For Domain Name Fabric Feeds, a DNS Filter profile is required.

    For Category Fabric Feeds, a Web Filter profile is required.

    In the Remote Categories section of the corresponding DNS or Web Filter profile, set the Fabric Feed action, such as Block, Monitor, or Warning, as required. After that, apply the appropriate profile to a policy to enforce the feed.

    Remote Categories fall under the FortiGuard Category Based Filter, and this feature must be enabled for them to function. It is recommended to avoid using the Allow action for remote categories, as it will not override the original action defined in the FortiGuard Category Based Filter. In contrast, actions such as Block or Monitor can override the original action specified in the FortiGuard Category Based Filter.

  4. Go to Log & Report > Forward Traffic and view the logs.

To enable Fabric Feeds in the CLI:
  1. On FortiGate, enable the default Fabric Feeds (also known as external resources) that correspond to the FortiAnalyzer indicators.

    FortiAnalyzer indicator

    FortiGate default Fabric Feed

    Domain

    Domain_Blocked_by_Fabric_SecOps

    URL

    URL_Blocked_by_Fabric_SecOps

    IP

    IP_Blocked_by_Fabric_SecOps

    MAC address

    MAC_Blocked_by_Fabric_SecOps

    In this example, all default Fabric Feeds are enabled.

    config system external-resource
        edit "IP_Blocked_by_Fabric_SecOps"
            set uuid 495e0cb0-3d94-51f0-7ec7-f0ff45079b48
            set status enable
            set type address
            set update-method fortimq
        next
        edit "Domain_Blocked_by_Fabric_SecOps"
            set uuid 495e126e-3d94-51f0-755a-1240f7ba7742
            set status enable
            set type domain
            set update-method fortimq
        next
        edit "URL_Blocked_by_Fabric_SecOps"
            set uuid 495e1430-3d94-51f0-b321-be7c2ba63e2c
            set status enable
            set update-method fortimq
        next
        edit "MAC_Blocked_by_Fabric_SecOps"
            set uuid 495e15ca-3d94-51f0-ff6a-5d03040d6215
            set status enable
            set type mac-address
            set update-method fortimq
        next
  2. After synchronizing with the FortiMQ Cloud server, the Fabric Feeds are ready to use.

  3. Apply the Fabric Feeds to a policy.

  4. View the logs.

    Following is an example of a log of traffic blocked by the Fabric Feed.

    4: date=2025-07-08 time=15:37:54 eventtime=1752014274607868096 tz="-0700" logid="0000000013" type="traffic" subtype="forward" level="notice" vd="vdom1" srcip=10.1.100.22 srcport=33532 srcintf="port2" srcintfrole="undefined" dstip=172.16.200.207 dstport=80 dstintf="port1" dstintfrole="undefined" dstthreatfeed="IP_Blocked_by_Fabric_SecOps" srccountry="Reserved" dstcountry="Reserved" sessionid=105067 proto=6 action="deny" policyid=1 policytype="policy" poluuid="04c3e4b6-5091-51f0-7e99-3984037e433c" policyname="firewall policy" service="HTTP" trandisp="noop" appcat="unscanned" duration=0 sentbyte=0 rcvdbyte=0 sentpkt=0 rcvdpkt=0 fctuid="F56F1D334C0B4CF599F47C9B4F013EDE" unauthuser="fosqa" unauthusersource="forticlient" srcremote=172.18.62.231 crscore=30 craction=131072 crlevel="high"

Cloud-based Fabric Feed synchronization

Cloud-based Fabric Feed synchronization

Introducing Fabric Feed, an improvement to the existing external feeds feature, which is formerly known as threat feeds. This update lets FortiAnalyzer upload Fabric Feeds directly to the Cloud AMQP server. Once uploaded, these feeds are automatically synchronized with FortiGate devices linked to the same FortiCare account. This enhancement introduces a centralized, cloud-native approach to distributing feed intelligence, improving operational efficiency and consistency across the Security Fabric.

CLI syntax

The config system external-resource command includes new default external resources that are disabled by default and have update-method set to fortimq:

config system external-resource
    edit "IP_Blocked_by_Fabric_SecOps"
        set uuid 495e0cb0-3d94-51f0-7ec7-f0ff45079b48
        set status disable
        set type address
        set update-method fortimq
    next
    edit "Domain_Blocked_by_Fabric_SecOps"
        set uuid 495e126e-3d94-51f0-755a-1240f7ba7742
        set status disable
        set type domain
        set update-method fortimq
    next
    edit "URL_Blocked_by_Fabric_SecOps"
        set uuid 495e1430-3d94-51f0-b321-be7c2ba63e2c
        set status disable
        set update-method fortimq
    next
    edit "MAC_Blocked_by_Fabric_SecOps"
        set uuid 495e15ca-3d94-51f0-ff6a-5d03040d6215
        set status disable
        set type mac-address
        set update-method fortimq
    next

Option

Description

edit <external resource name>

Edit resource. The following default external resources are available and disabled by default:

  • IP_Blocked_by_Fabric_SecOps is type address.

  • Domain_Blocked_by_Fabric_SecOps is type domain.

  • URL_Blocked_by_Fabric_SecOps

  • MAC_Blocked_by_Fabric_SecOps is type mac-address.

Each type of external resource can only be enabled once for each VDOM.

status {enable | disable}

Enable/disable user resource.

update-method {feed | push | fortimq}

External resource update method.

  • feed: FortiGate unit will pull update from the external resource.

  • push: External resource update is pushed to the FortiGate unit through the FortiGate unit's RESTAPI/CLI.

  • fortimq: External resource update is pushed to the FortiGate unit through the Fortinet Message Queue fabric.

GUI configuration

On the Security Fabric > External Connectors pane, click Create New to access and enable one or more Fabric Feeds.

Scope and limitations

FortiAnalyzer 8.0.0 and later is required.

Example

This example describes how to enable and use FortiMQ with FortiAnalyzer and FortiGate. Following is the high-level procedure:

  1. On FortiAnalyzer, enable the FortiMQ connector and define indicators for the block list. See Enabling FortiMQ on FortiAnalyzer.

  2. On FortiGate, enable Fabric Feeds using the GUI or CLI. See Enabling Fabric Feeds on FortiGate.

    After FortiGate synchronizes Fabric Feeds with FortiMQ server, the Fabric Feeds are ready to use. Apply Fabric Feeds to a firewall policy for use in blocking traffic and view the results in traffic logs.

Enabling FortiMQ on FortiAnalyzer

To enable the FortiMQ connector on FortiAnalyzer:
  1. On FortiAnalyzer, go to Incidents & Events > Automation, and enable the FortiMQ Connector.

  2. Go to Indicators to define indicators and their block status. The following types of indicators are supported: Domain, URL, IP, and MAC address.

  3. Go to FortiGate and enable Fabric Feeds using the GUI or CLI. See Enabling Fabric Feeds on FortiGate.

Enabling Fabric Feeds on FortiGate

After the FortiMQ connector is enabled on FortiAnalyzer and indicators defined, you must enable Fabric Feeds on FortiGate to use the FortiAnalyzer indicators. Fabric Feeds can be enabled using the the GUI or CLI.

To enable Fabric Feeds in the FortiGate GUI:
  1. On FortiGate, enable Fabric Feeds:

    1. Go to Security Fabric > External Connectors pane, and click Create New.

    2. Under Fabric Feeds, select a Fabric Feed and click OK to enable it.

    3. Repeat this step to enable additional Fabric Feeds.

  2. After synchronizing with the FortiMQ Cloud server, the Fabric Feeds are available on the Security Fabric > External Connectors pane and ready to use:

  3. IP Address Fabric Feeds and MAC Address Fabric Feeds can be applied directly to a policy.

    For Domain Name Fabric Feeds, a DNS Filter profile is required.

    For Category Fabric Feeds, a Web Filter profile is required.

    In the Remote Categories section of the corresponding DNS or Web Filter profile, set the Fabric Feed action, such as Block, Monitor, or Warning, as required. After that, apply the appropriate profile to a policy to enforce the feed.

    Remote Categories fall under the FortiGuard Category Based Filter, and this feature must be enabled for them to function. It is recommended to avoid using the Allow action for remote categories, as it will not override the original action defined in the FortiGuard Category Based Filter. In contrast, actions such as Block or Monitor can override the original action specified in the FortiGuard Category Based Filter.

  4. Go to Log & Report > Forward Traffic and view the logs.

To enable Fabric Feeds in the CLI:
  1. On FortiGate, enable the default Fabric Feeds (also known as external resources) that correspond to the FortiAnalyzer indicators.

    FortiAnalyzer indicator

    FortiGate default Fabric Feed

    Domain

    Domain_Blocked_by_Fabric_SecOps

    URL

    URL_Blocked_by_Fabric_SecOps

    IP

    IP_Blocked_by_Fabric_SecOps

    MAC address

    MAC_Blocked_by_Fabric_SecOps

    In this example, all default Fabric Feeds are enabled.

    config system external-resource
        edit "IP_Blocked_by_Fabric_SecOps"
            set uuid 495e0cb0-3d94-51f0-7ec7-f0ff45079b48
            set status enable
            set type address
            set update-method fortimq
        next
        edit "Domain_Blocked_by_Fabric_SecOps"
            set uuid 495e126e-3d94-51f0-755a-1240f7ba7742
            set status enable
            set type domain
            set update-method fortimq
        next
        edit "URL_Blocked_by_Fabric_SecOps"
            set uuid 495e1430-3d94-51f0-b321-be7c2ba63e2c
            set status enable
            set update-method fortimq
        next
        edit "MAC_Blocked_by_Fabric_SecOps"
            set uuid 495e15ca-3d94-51f0-ff6a-5d03040d6215
            set status enable
            set type mac-address
            set update-method fortimq
        next
  2. After synchronizing with the FortiMQ Cloud server, the Fabric Feeds are ready to use.

  3. Apply the Fabric Feeds to a policy.

  4. View the logs.

    Following is an example of a log of traffic blocked by the Fabric Feed.

    4: date=2025-07-08 time=15:37:54 eventtime=1752014274607868096 tz="-0700" logid="0000000013" type="traffic" subtype="forward" level="notice" vd="vdom1" srcip=10.1.100.22 srcport=33532 srcintf="port2" srcintfrole="undefined" dstip=172.16.200.207 dstport=80 dstintf="port1" dstintfrole="undefined" dstthreatfeed="IP_Blocked_by_Fabric_SecOps" srccountry="Reserved" dstcountry="Reserved" sessionid=105067 proto=6 action="deny" policyid=1 policytype="policy" poluuid="04c3e4b6-5091-51f0-7e99-3984037e433c" policyname="firewall policy" service="HTTP" trandisp="noop" appcat="unscanned" duration=0 sentbyte=0 rcvdbyte=0 sentpkt=0 rcvdpkt=0 fctuid="F56F1D334C0B4CF599F47C9B4F013EDE" unauthuser="fosqa" unauthusersource="forticlient" srcremote=172.18.62.231 crscore=30 craction=131072 crlevel="high"