Configure Azure Config Settings
Starting in FortiSandbox Version 5.0.0, FortiSandbox only supports importing Azure settings using the Service Principal method. The Azure settings are required from Microsoft to log into the Azure portal, control the Virtual Machines and communication between network interfaces.
In FortiSandbox Azure, there are features require operations on the Azure portal. These include:
-
HA failover with cluster IP transferred to new Primary.
-
Import/install/activate/delete/startup/shutdown/communicate Customized VMs for Non-Nested mode
Configure Guest VM Running mode
The Guest VM Running mode can be switched between Nested and Non-Nested mode.
To switch from Nested and Non-Nested mode.
-
Enter the page System > Azure Config.
-
The switch button will show the status as:
OR:
The green button display the current mode.
-
Before switching, please make sure your FortiSandbox match the requirements.
-
Switching requirements:
|
Port3 Interface |
Local VM |
Unit Type |
---|---|---|---|
Non-Nested > Nested |
Must exist |
There is no local VM |
Standalone |
Nested > Non-Nested |
|
The clone number of local VM must be 0 |
Standalone |
-
Click the button with write color, the switching of Guest VM Running mode will be triggered.
-
If all the conditions matched, after answer ‘OK’ to the confirmation question, the mode will be switched and system will reboot.
-
After switching, the local VMs will be deleted.
Create an App registration in Azure Portal
This task is only required when the FortiSandbox instance is using the Service Principle method to communicate with the Azure platform.
To create an App registration:
-
Log in to the Azure portal.
-
Go to Azure Active Directory > App registrations and click New registration.
Name |
Enter the application display name. |
Supported account types |
Select Accounts in this organizational directory only (Default Directory only –Single tenant). |
Redirect URI |
This section is optional. |
-
Go to Manage > App Roles.
-
Click Create app role and configure the following settings:
Display name |
Enter the display name for the app role. |
Allowed member types |
Select Both (Users/Groups + Applications). |
-
Go to Manage > Certificates & secrets and click create a New client secret.
-
Go to API permissions. As a minimum requirement, the following items should be granted API permissions.
For items:
Azure Service Management |
This is for managing deployments, hosted services, and storage accounts. |
Azure Storage |
This is for programmatic access to the Blob, Queue, Table, and File services in Azure or in the development environment via the storage emulator. |
- Click Add a permission.
- Click the item name.
- Click the Delegated permission tab.
- Select
user_impersonation
. - Click Add permissions.
For Microsoft Graph:
Files |
ReadWrite This allows FortiSandbox to read, create, update, and delete the signed-in user's files. |
User |
Read This allows FortiSandbox to read the signed-in user's information. |
-
Click Add a permission.
-
Click the item name.
-
Click the Delegated permission tab.
-
Select the permissions.
-
Click Add permissions.
Configure Service Principal Settings
If your guest VM mode is in non-nested mode, or you want your instance will work as a node in a cluster, you need to configure Service Principle value in Azure Config page. To find the Service Principal settings, you need to get the client and tenant IDs from the Azure portal and then enter them into FortiSandbox using the GUI.
Requirements:
To get client and tenant IDs in the Azure portal:
-
In the Azure portal, go to Azure Active Directory > App registrations and locate the service principal information in the application you created.
For information, see Create an App registration in Azure Portal.
-
Go to Manage > Certificates & Secrets. The service principal information is located in the Application (client) ID and Directory (tenant) ID fields.
To configure Azure service principal in FortiSandbox:
-
In FortiSandbox, go to System > Azure Config.
-
In FortiSandbox, enter the following Azure configuration settings and then click Submit.
Client id |
Enter the Application (client) ID from the Azure portal. |
||
Client Secret |
Enter the client secret. |
||
Tenant id |
Enter the Directory (tenant) ID from the Azure portal. |
||
Subscription ID |
Your subscription ID. |
||
Resource group |
Resource group. The Client ID, Client Secret, Location, Subscription ID and Resource group will be used to log into the Azure portal. |
||
Storage account |
Storage account name. This name will be used to import/install/activate/delete/startup/shutdown/communicate Customized VMs. |
||
Storage account access key |
Storage account access key. Please visit Azure patrol Resource group > Storage account > Access keys to find your access key This key will be used to import/install/activate/delete/startup/shutdown/communicate Customized VMs. |
||
Monitor storage account |
Monitor account name. This account will be used to import/install/activate/delete/startup/shutdown/communicate Customized VMs. |
||
Monitor account access key |
Monitor account access key. Please visit Azure patrol Resource group > Storage account > Access keys to find your access key This key will be used to import/install/activate/delete/startup/shutdown/communicate Customized VMs. |
||
Network security group |
The security group you created for FortiSandbox port2. This port2 in FortiSandbox Azure is used to communicate with Virtual Machines in FortiSandbox. The network security group will be used to import/install/activate/delete/startup/shutdown/communicate Customized VMs, and HA Cluster failover. |
||
Virtual network |
Name of the virtual network you created. Virtual Network name will be used to import/install/activate/delete/startup/shutdown/communicate Customized VMs, and HA Cluster failover. |
||
Subnet |
Use the subnet created for the local Windows or Linux VM communication (port2) if one exists. Otherwise, select the management subnet. This port2 in FortiSandbox Azure is used to communicate with Virtual Machines in FortiSandbox. Subnet name will be used to import/install/activate/delete/startup/shutdown/communicate Customized VMs, and HA Cluster failover. |
||
VM Type |
The VM type of custom VM clone(s).
|
||
Cloud Environment URLs |
Custom Azure environment setting. |
||
Agent Endpoint |
Custom Azure environment setting. |
||
Allow Hot-Standby VM |
After Allow Hot-Standby VM is enabled, FortiSandbox will perform VM initialization again to apply changes to existing custom VM clones or prepare new clone(s). This option is hidden in Nested mode. See, Appendix B - Reduce scan time in custom Windows VM. |
||
Disk Type |
The disk storage type of the new installed custom VM. This option is hidden in Nested mode. Disk Types:
After the custom VM is created, please go to Azure patrol to check the Disks >Storage type of the VM. |
||
Deallocate custom VM instance when Idle |
FortiSandbox will deallocate the custom VM instance after it remains idle from job scan until the idle timeout value (minutes). By clicking Enabled, an idle time must be entered, otherwise, 0 means disabled. |
||
|
|
||
Idle time before deallocate custom VM instance in minutes |
FortiSandbox will deallocate the custom VM instance after it remains idle from job scan until the idle timeout value (minutes). By clicking Enabled, an idle time must be entered, otherwise, 0 means disabled. This option is hidden in Nested mode.
|