Simultaneous FortiSandbox Cloud and on-premise integration
FortiGate now support simultaneous use of FortiSandbox Cloud and on-premise, enabling antivirus profiles to route files based on policy or auto-selection. This hybrid approach offers flexible sandboxing, data privacy, and compliance. Signature and URL databases are combined.
To enable FortiSandbox Cloud and on-premise integration in the GUI:
-
Go to Security Fabric > Fabric Connectors and double-click the Sandbox card.
-
In the FortiSandbox section, set Status to Enable and configure the settings as required. See FortiSandbox appliance.
-
In the FortiSandbox Cloud section, setStatus to Enable and configure the settings as required. See FortiSandbox Cloud (FortiSandbox PaaS).
-
Set Preferred FortiSandbox device to FortiSandbox or FortiSandbox Cloud.
-
Click OK.
To enable FortiSandbox Cloud and on-premise integration in the CLI:
Only one can be set as the default.
config system fortisandbox
edit "sandbox"
set status enable
set default enable
next
edit "sandbox-cloud"
set status enable
set default enable
next
end
To configure an antivirus profile:
-
Go to Security Profiles > AntiVirus and click Create New.
-
Set Feature set to Flow-based or Proxy-based.
-
Enable the protocols to inspect.
-
Enable Send files to FortiSandbox for inspection.
-
Set FortiSandbox destination to Auto, FortiSandbox, or FortiSandbox Cloud.
-
Configure the remaining settings as required, then click OK.
See Antivirus for more information.
To add the antivirus profile to a policy:
-
Go to Policy & Objects > Firewall Policy, and click Create New or edit an existing policy.
-
Set Inspection mode to Flow-based or Proxy-based.
-
In the Security Profiles section, enable AntiVirus and select the antivirus profile from the drop-down list.
-
Configure the remaining settings as needed, then click OK.
Use cases
Use case 1: Default on-premise, post transfer, proxy mode
In this use case, the system is set to default to an on-premise FortiSandbox appliance. All file submissions are routed to the on-premise FortiSandbox for post transfer analysis.
Configure the following:
|
Option |
Settings |
|
|---|---|---|
|
Sandbox Settings |
|
|
|
|
FortiSandbox |
|
|
FortiSandbox Cloud |
|
|
|
Default FortiSandbox Device |
|
|
|
Antivirus profile: fsa_dual_auto_post_transfer_proxy |
|
|
|
Policy |
|
|
Download a file from https://www.fortiguard.com/sample-files and check the logs on FortiGate to see the analytics submission log showing that the antivirus profile was applied, and the verdict returned from the FortiSandbox showing that the detection type was FortiSandbox.
Use case 2: Default cloud, post transfer, flow mode
In this use case, the system is set to default to FortiSandbox Cloud. All file submissions are routed to FortiSandbox Cloud for post transfer analysis.
Configure the following:
|
Option |
Settings |
|
|---|---|---|
|
Sandbox Settings |
|
|
|
|
FortiSandbox |
|
|
FortiSandbox Cloud |
|
|
|
Default FortiSandbox Device |
|
|
|
Antivirus profile: fsa_dual_auto_post_transfer_flow |
|
|
|
Policy |
|
|
Download a file from https://www.fortiguard.com/sample-files and check the logs on FortiGate to see the analytics submission log showing that the antivirus profile was applied, and the verdict returned from FortiSandbox Cloud showing that the detection type was FortiSandbox.
Use case 3: On-premise override, inline scan
In this use case, FortiSandbox cloud is set as the default, but the user explicitly assigns an antivirus profile that forces traffic to the on-premise FortiSandbox. All file submissions are routed to the on-premise FortiSandbox for real-time analysis.
Configure the following:
|
Option |
Settings |
|
|---|---|---|
|
Sandbox Settings |
|
|
|
|
FortiSandbox |
|
|
FortiSandbox Cloud |
|
|
|
Default FortiSandbox Device |
|
|
|
Antivirus profile: fsa_dual_inline_override_fortisandbox |
|
|
|
Policy |
|
|
Attempt to download a file from https://www.fortiguard.com/sample-files. The file should be blocked.
Check the log on the FortiGate to see that the file was blocked.
Check the on-premise FortiSandbox to confirm the override selection.
Use case 4: Cloud override, inline scan
In this use case, on-premise FortiSandbox is set as the default, but the user explicitly assigns an antivirus profile that forces traffic to the FortiSandbox cloud. All file submissions are routed to FortiSandbox Cloud for real-time analysis.
Configure the following:
|
Option |
Settings |
|
|---|---|---|
|
Sandbox Settings |
|
|
|
|
FortiSandbox |
|
|
FortiSandbox Cloud |
|
|
|
Default FortiSandbox Device |
|
|
|
Antivirus profile: fsa_dual_inline_override_fortisandboxcloud |
|
|
|
Policy |
|
|
Download a file from https://www.fortiguard.com/sample-files and check the logs on FortiGate to see that the file was detected.
Check the FortiSandbox Cloud Job Events to confirm.
Use case 5: Split by policy, post transfer
In this use case, the system is set to default to an on-premise FortiSandbox appliance. Two firewall policies are configured with different antivirus profiles, one targeting the on-premise FortiSandbox (proxy-based) and the other targeting the FortiSandbox cloud (flow-based).
Routine traffic is routed to FortiSandbox Cloud and sensitive traffic is directed to the on-premise FortiSandbox for post transfer analysis.
Configure the following:
|
Option |
Settings |
|
|---|---|---|
|
Sandbox Settings |
|
|
|
|
FortiSandbox |
|
|
FortiSandbox Cloud |
|
|
|
Default FortiSandbox Device |
|
|
|
Antivirus profile 1: fsa_dual_post_override_fortisandbox |
|
|
|
Antivirus profile 2: fsa_dual_post_override_fortisandboxcloud |
|
|
|
Policy 1 |
|
|
|
Policy 1 |
|
|
Download a file from a client that is routed to the non-sensitive policy and check the logs on FortiGate.
Download a file from a client that is routed to the sensitive policy and check the logs on FortiGate.
Add the FortiSandbox Files widget to a dashboard and then expand it to see that both submissions have verdicts returned from separate FortiSandboxes.
Check the FortiSandbox Cloud Job Events for the non-sensitive file log.
Check the on-premise FortiSandbox for the sensitive file log.
Use case 6: Split by policy, inline scan
In this use case, the system is set to default to an on-premise FortiSandbox appliance. Two firewall policies are configured with different antivirus profiles, one using the on-premise FortiSandbox and the other using FortiSandbox cloud.
File submissions are inspected in real-time based on the antivirus profile assigned to each policy, allowing simultaneous inline use of both the on-premise FortiSandbox and FortiSandbox Cloud.
Configure the following:
|
Option |
Settings |
|
|---|---|---|
|
Sandbox Settings |
|
|
|
|
FortiSandbox |
|
|
FortiSandbox Cloud |
|
|
|
Default FortiSandbox Device |
|
|
|
Antivirus profile 1: fsa_dual_inline_auto_selection |
|
|
|
Antivirus profile 2: fsa_dual_inline_override_fortisandboxcloud |
|
|
|
Policy 1 |
|
|
|
Policy 2 |
|
|
Attempt to download a file from a client that is routed to the non-sensitive policy and submits files to FortiSandbox Cloud. The file should be blocked.
Check the log on the FortiGate to see that the file was blocked.
Attempt to download a file from a client that is routed to the sensitive policy and submits files to the on-premise FortiSandbox. The file should be blocked.
Check the log on the FortiGate to see that the file was blocked.
Check the FortiSandbox Cloud Job Events for the non-sensitive file log.
Check the on-premise FortiSandbox for the sensitive file log.
Use case 7: Combined analytics, broader coverage
In this use case, dual FortiSandbox appliances provides access to merged signature and URL databases across both the on-premise FortiSandbox and FortiSandbox Cloud. Any antivirus profile applied to a firewall policy utilizes data from both sources, resulting in broader detection coverage.
Configure the following:
|
Option |
Settings |
|
|---|---|---|
|
Sandbox Settings |
|
|
|
|
FortiSandbox |
|
|
FortiSandbox Cloud |
|
|
|
Default FortiSandbox Device |
|
|
|
Antivirus profile 1: fsa_dual_post_db_on_fsa_cld |
|
|
|
Antivirus profile 2: fsa_dual_post_db_on_auto |
|
|
|
Policy 1 |
|
|
|
Policy 2 |
|
|
Download a file from https://www.fortiguard.com/sample-files and check the logs on FortiGate to see the analytics submission and verdict logs.
Download the same file again using the same client. The file should be blocked. Check the log on the FortiGate to see that the file was blocked.
Download the same file again using the other policy that is pointing to the other FortiSandbox. The file should be blocked. Check the log on the FortiGate to see that the file was blocked.