Fortinet black logo

Fortinet FortiGate

Fortinet FortiGate v5.2.2

About the connector

Fortinet FortiGate enterprise firewall provide high performance, consolidated advanced security and granular visibility for broad protection across the entire digital attack surface.

This document provides information about the Fortinet FortiGate Connector, which facilitates automated interactions, with a Fortinet FortiGate server using FortiSOAR™ playbooks. Add the Fortinet FortiGate Connector as a step in FortiSOAR™ playbooks and perform automated operations with Fortinet FortiGate.

Version information

Connector Version: 5.2.2

FortiSOAR™ Version Tested on: 7.4.0-3024

Fortinet FortiGate Version Tested on: FortiGate VM64 v7.2.3 build1262

Authored By: Fortinet

Certified: Yes

Release Notes for version 5.2.2

Following enhancements have been made to the Fortinet FortiGate Connector in version 5.2.2:

  • Fixed a bug that caused 20 seconds delay for all GET actions
  • Fixed bug where Update Service Group and Update Address Group actions were failing to add and remove members in one request
  • Fixed Update Policy to add and remove Source, Destination and Services in one request

Installing the connector

Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.

You can also use the yum command as a root user to install the connector:

yum install cyops-connector-fortigate-firewall

Prerequisites to configuring the connector

  • You must have the IP address or Hostname of the Fortinet FortiGate server to which you will connect and perform the automated operations and the API Key to access that server.
  • The FortiSOAR™ server should have outbound connectivity to port 443 on Fortinet FortiGate.
  • To block or unblock IP addresses, URLs, or applications, you need to add the necessary configuration to Fortinet FortiGate. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
  • VDOM is configured using a network interface in FortiGate which has its own IP address with different subnets (separate from global or root VDOM). When users select VDOM in the connector Configuration, users should specify the VDOM interface IP in the Hostname section, otherwise, an Unauthorized Error is encountered. See the following screenshots for VDOM-specific connector configuration:


Minimum Permissions Required

  • Ensure the user has the permissions required for the actions you wish to perform in Fortinet FortiGate.
  • To execute Fortinet FortiGate connector actions, the following minimal profile permissions are required:
    • User and Device: Read and Write permissions.
    • Firewall: Read and Write permissions for Policy, Address, and Service.
    • Security Profile: Read and Write permissions for Web Filter and Application Control.
    • Security Fabric - Read and Write permissions.
    • WiFi & Switch - Read and Write permissions.
    • Log & Report - Read and Write permissions.

Configuring the connector

For the procedure to configure a connector, click here

Configuration parameters

In FortiSOAR™, on the Connectors page, click the Fortinet FortiGate connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:

Parameter Description
Hostname IP address or Hostname of the Fortinet FortiGate endpoint server to which you will connect and perform the automated operations.
API Key API Key of the Fortinet FortiGate endpoint server to which you will connect and perform the automated operations. You can get the API key from the administration settings in FortiGate. Important:To create a REST API key from Fortinet FortiGate, see the "Create a REST API administrator" section in the Fortinet FortiGate Documentation.
Port Port number used for connecting to the Fortinet FortiGate server. Defaults to 443.
Web Filter Profile Name Name of the Web Filter Profile that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in the Fortinet FortiGate section.
Application Control Profile Name Name of the Application Control Profile that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in the Fortinet FortiGate section.
VDOM VDOMs, in the CSV or List format, if the VDOM mode is enabled.
Verify SSL Specifies whether the SSL certificate for the server is to be verified or not.
By default, this option is set as True.

Actions supported by the connector

The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 and onwards:

Function Description Annotation and Category
Get Applications Detail Retrieves a list of all application names and associated details from the Fortinet FortiGate server. get_app_details
Investigation
Get Blocked IP Addresses Retrieves a list of IP Addresses that are blocked on Fortinet FortiGate. get_blocked_ip
Investigation
Get Blocked Applications Retrieves a list of application names that are blocked on Fortinet FortiGate. get_blocked_app
Investigation
Get Blocked URLs Retrieves a list of URLs that are blocked on Fortinet FortiGate. get_blocked_url
Investigation
Block IP Address Blocks IP addresses on Fortinet FortiGate using the IPv4 Block Policy that you have specified as the "action" parameter of Fortinet FortiGate or by Quarantine based- adds IP into the banned IP list. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. block_ip
Containment
Block Application Blocks applications on Fortinet FortiGate using the Application Control Profile Name that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. block_app
Containment
Block URL Blocks URLs on Fortinet FortiGate using the Web Filter Profile Name Policy that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. block_url
Containment
Unblock IP Address Unblocks IP addresses on Fortinet FortiGate using the IPv4 Block Policy that you have specified as the "action" parameter of Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. unblock_ip
Remediation
Unblock Application Unblocks applications on Fortinet FortiGate using the Application Control Profile Name that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. unblock_app
Remediation
Unblock URL Unblocks URLs on Fortinet FortiGate using the Web Filter Profile Name that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. unblock_url
Remediation
Quarantine Host Quarantines hosts on the Fortinet Fortigate server based on MAC addresses and other input parameters you have specified quarantine_host
Containment
Unquarantine Host Unquaratines host entries from the Fortinet Fortigate server based on MAC addresses and other input parameters you have specified. unquarantine_host
Containment
Get Quarantine Hosts Retrieves a list of all quarantine hosts from Fortinet FortiGate. get_quarantine_hosts
Investigation
Create Address Create a new address in Fortinet FortiGate based on the name of the address, type, and other input parameters you have specified. create_address
Investigation
Get Addresses Retrieves a list of all addresses or specific addresses that are configured on Fortinet FortiGate based on the input parameters you have specified. get_addresses
Investigation
Update Address Update an existing address in Fortinet FortiGate based on the address name, type, and other input parameters you have specified. update_address
Investigation
Delete Address Deletes an address that is configured on Fortinet FortiGate based on the name of the address and other input parameters you have specified delete_address
Investigation
Create Address Group Creates a new address group in Fortinet FortiGate based on the name of the address group, members of the group, and other input parameters you have specified. create_address_group
Investigation
Get Address Groups Retrieves a list of all address groups or specific address groups that are configured on Fortinet FortiGate based on the input parameters you have specified. get_address_groups
Investigation
Update Address Group Updates an existing address group in Fortinet FortiGate based on the name of the address group, members of the group, and other input parameters you have specified. update_address_group
Investigation
Delete Address Group Deletes an address group that is configured on Fortinet FortiGate based on the name of the address group and other input parameters you have specified. delete_address_group
Investigation
Create Service Create a new service in Fortinet FortiGate based on the name of the service and other input parameters you have specified. create_firewall_service
Investigation
Get Services Retrieves a list of all firewalls services or specific services that are configured on Fortinet FortiGate based on the input parameters you have specified get_firewall_services
Investigation
Update Service Creates an existing service in Fortinet FortiGate based on the name of the service and other input parameters you have specified update_firewall_service
Investigation
Delete Service Deletes a firewall service that is configured on Fortinet FortiGate based on the name of the address group and other input parameters you have specified. delete_firewall_service
Investigation
Create Service Group Creates a new service group in Fortinet FortiGate based on the name of the service group, members of the group, and other input parameters you have specified. create_service_group
Investigation
Get Service Groups Retrieves a list of all service groups or specific service groups that are configured on Fortinet FortiGate based on the input parameters you have specified. get_service_groups
Investigation
Update Service Group Updates an existing service group in Fortinet FortiGate based on the name of the service group, members of the group, and other input parameters you have specified. update_service_group
Investigation
Delete Service Group Deletes a service group that is configured on Fortinet FortiGate based on the name of the service group and other input parameters you have specified delete_service_group
Investigation
Create Policy Creates a new firewall policy in Fortinet FortiGate based on the name of the policy, names of the incoming and outgoing interfaces, and other input parameters you have specified. create_policy
Investigation
Get List of Policies Retrieves a list and details for all IPv4 policies or specific IPv4 policies that are configured on Fortinet FortiGate based on the input parameters you have specified get_policies
Investigation
Update Policy Updates an existing firewall policy in Fortinet FortiGate based on the ID of the policy, names of the incoming and outgoing interfaces, and other input parameters you have specified. update_policy
Investigation
Delete Policy Deletes a policy that is configured on Fortinet FortiGate based on the ID of the policy and other input parameters you have specified. delete_policy
Investigation
Execute Command Executes a CLI command on the FortiOS console based on the commands and other input parameters you have specified. execute_command
Investigation
Create User Creates a new user in the Fortinet FortiGate server based on the username, authentication type, and other input parameters you have specified. create_user
Investigation
Get Users Retrieves a list of all users that are configured on Fortinet FortiGate based on the input parameters you have specified. get_users
Investigation
Update User Updates an existing user in the Fortinet FortiGate server based on the username, authentication type, and other input parameters you have specified. update_user
Investigation
Delete User Deletes a user who is configured on Fortinet FortiGate based on the name of the user you have specified. delete_user
Investigation
Get System Events Retrieves system log data from the Fortinet FortiGate server, based on the input parameters you have specified get_system_events
Investigation
Get User Last Login Details Retrieves the last login details for a specified user from the Fortinet FortiGate server, based on the username you have specified. get_user_list_login_details
Investigation

operation: Get Applications Detail

Input parameters

None.

Output

The output contains the following populated JSON schema:
{
"status": "",
"http_status": "",
"http_method": "",
"results": [
{
"q_origin_key": "",
"q_name": "",
"protocol": "",
"q_type": "",
"q_path": "",
"id": "",
"category": "",
"q_ref": "",
"q_no_rename": "",
"sub-category": "",
"risk": "",
"metadata": [
{
"id": "",
"q_origin_key": "",
"metaid": "",
"valueid": ""
}
],
"q_static": "",
"technology": "",
"vendor": "",
"weight": "",
"popularity": "",
"q_mkey_type": "",
"q_class": "",
"behavior": "",
"name": "",
"parameter": ""
}
],
"vdom": "",
"build": "",
"serial": "",
"version": "",
"name": "",
"revision": "",
"path": ""
}

operation: Get Blocked IP Addresses

Input parameters

Parameter Description
Block Method Method to be used for retrieving a list of IP Addresses that are blocked on Fortinet FortiGate. You can choose from Quarantine Based or Policy Based. If you choose Quarantine Based, then you can specify the following parameter: VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format. If you choose Policy Based, then you can specify the following parameters: IPv4 Policy Name: Name of the IPv4 Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses and whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. Address Group Name: Name of the IP address group name that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Quarantine Based'
  • VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Policy Based'
  • Policy Name: Name of the Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses and whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
  • Address Group Name: Name of the IP address group name, in the "CSV" or "list" format, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section
  • VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters.

Output

The output contains the following populated JSON schema:

Output schema when you choose "Block Method" as "Quarantine Based":
{
"vdom_not_exist": [],
"result": [
{
"name": "",
"version": "",
"vdom": "",
"serial": "",
"results": [
{
"ipv6": "",
"source": "",
"created": "",
"ip_address": "",
"expires": ""
}
],
"build": "",
"http_method": "",
"status": "",
"path": ""
}
]
}

Output schema when you choose "Block Method" as "Policy Based":
{
"policy_name": "",
"srcaddr": [],
"dstaddr": [],
"addrgrp": [
{
"name": "",
"member": []
}
],
"addrgrp_not_exist": []
}

operation: Get Blocked Applications

Input parameters

Parameter Description
VDOM (Optional) VDOM on which you want to perform automated operations, i.e., the VDOM whose associated list of blocked applications you want to retrieve from Fortinet FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field.Ensure that the specified VDOM contains the required\"Application Control Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the Configuration Parameters while configuring this connector.

Output

The output contains the following populated JSON schema:
{
"id": "",
"name": "",
"risk": "",
"q_ref": "",
"q_name": "",
"q_path": "",
"q_type": "",
"vendor": "",
"weight": "",
"q_class": "",
"behavior": "",
"category": "",
"metadata": [
{
"id": "",
"metaid": "",
"valueid": "",
"q_origin_key": ""
}
],
"protocol": "",
"q_static": true,
"parameter": "",
"popularity": "",
"technology": "",
"q_mkey_type": "",
"q_no_rename": false,
"q_origin_key": "",
"sub-category": "",
"q_global_entry": ""
}

operation: Get Blocked URLs

Input parameters

Parameter Description
VDOM (Optional) VDOM on which you want to perform automated operations, i.e., the VDOM whose associated list of blocked URLs you want to retrieve from Fortinet FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. Ensure that the specified VDOM contains the required\"Web Filter Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the Configuration Parameters while configuring this connector.

Output

The output contains the following populated JSON schema:
{
"type": "",
"id": "",
"action": "",
"status": "",
"url": "",
"q_origin_key": "",
"exempt": "",
"referrer-host": "",
"web-proxy-profile": "",
"dns-address-family": ""
}

operation: Block IP Address

Input parameters

Parameter Description
Block Method Method to be used for blocking IP addresses using Fortinet FortiGate. You can choose from Quarantine Based or Policy Based. If you choose Quarantine Based, then you must specify the following parameters: IP Addresses: IP addresses that you want to block using Fortinet FortiGate, in the "CSV" or "list" format. For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2". Time to Live: Time till when the IP addresses will remain in the Block status. You can choose between the following options: 1 Hour, 6 Hour, 12 Hour, 1 Day, 6 Months, 1 Year, or Custom Time. Note: If you select Custom Time then the Time to Live (Seconds) field is displayed in which you must specify the Time to Live in seconds. VDOM: (Optional) VDOM that is used to block IP addresses. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format. If you choose Policy Base, then you must specify the following parameters: IPv4 Policy Name: Name of the IPv4 Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. Address Group Name: Name of the IP address group name that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. IP Addresses: IP addresses that you want to block using Fortinet FortiGate in the "CSV" or "list" format. For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2". VDOM: (Optional) VDOM that are used to block IP address. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Quarantine Based'
  • IP Addresses: IP addresses that you want to block on the Fortinet FortiGate, in the CSV or list format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
  • Time to Live: Time till when the IP addresses are in the Block status.You can choose between the following options: 1 Hour, 6 Hour, 12 Hour, 1 Day, 6 Months, 1 Year, or Custom Time. Note: If you select Custom Time then the Time to Live (Seconds) field is displayed in which you must specify the Time to Live in seconds.
  • If you choose 'Custom Time'
    • Time to Live: User must specify the Time to Live in seconds.
  • VDOM: VDOM that is used to perform automated operations in provided VDOMs. Notes:- You can specify the VDOM here, as a configuration parameter, or you can also specify the VDOM as a function parameter.- You can provide VDOM in the CSV or the list format.
If you choose 'Policy Based'
  • Policy Name: Name of the Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
  • IP Type: IP Type that you want to block on the FortiOS server.You can choose between IPv4 and IPv6.
  • If you choose 'IPv4'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IP Address: IP addresses that you want to block using Fortinet FortiGate in the "CSV" or "list" format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
    If you choose 'IPv6'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IPv6 Address: IP addresses that you want to block on the FortiGate server, in the .csv or list format.For example, ff06::
  • VDOM: VDOM that is used to perform automated operations in provided VDOMs. Notes:- You can specify the VDOM here, as a configuration parameter, or you can also specify the VDOM as a function parameter. Provide only single VDOM.

Output

The output contains the following populated JSON schema:

Output schema when you choose "Block Method" as "Quarantine Based":
{
"newly_blocked": [],
"vdom_not_exist": [],
"already_blocked": [],
"error_with_block": []
}

Output schema when you choose "Block Method" as "Policy Based":
{
"already_blocked": [],
"newly_blocked": [],
"error_with_block": []
}

operation: Block Application

Input parameters

Parameter Description
Application Names List of application names that you want to block on Fortinet FortiGate. Application names must be in the list format if you want to block more than one application. For example, for a list of applications enter ["Application_Name1", "Application_Name2"] in this field. For a single application enter Application_Name. Note: You can retrieve application names using the Get Application Details action.
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated applications you want to block in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Application Control Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"name": "",
"status": "",
"message": ""
}

operation: Block URL

Input parameters

Parameter Description
URL List of URLs that you want to block on Fortinet FortiGate. URLs must be in the list format if you want to block more than one URL. For example, for a list of URLs, enter:[\"URL1\", \"URL2\"] in this field. For a single URL enter: /'example.com/'
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated URLs you want to block in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Web Filter Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"already_blocked": [],
"newly_blocked": [],
"not_block": []
}

operation: Unblock IP Address

Input parameters

Parameter Description
Unblock Method Method to be used for unblocking IP addresses using Fortinet FortiGate. You can choose from Quarantine Based or Policy Based.If you choose Quarantine Based, then you must specify the following parameters:IP Addresses: IP addresses that you want to unblock using Fortinet FortiGate, in the "CSV" or "list" format. For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".VDOM: (Optional) VDOM that is used to unblock IP addresses. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format If you choose Policy Based, then you must specify the following parameters:IPv4 Policy Name: Name of the IP Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.IP Addresses: IP addresses that you want to unblock using Fortinet FortiGate in the "CSV" or "list" format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".VDOM: (Optional) VDOM that is used to unblock IP addresses. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Quarantine Based'
  • IP Addresses: IP addresses that you want to unblock from the Fortinet FortiGate in the CSV or list format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
If you choose 'Policy Based'
  • Policy Name: Name of the IPv4 Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
  • IP Type: IP Type that you want to unblock on the FortiOS server. You can choose between IPv4 and IPv6.
  • If you choose 'IPv4'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IP Address: IP addresses that you want to unblock using Fortinet FortiGate in the "CSV" or "list" format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
    If you choose 'IPv6'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IPv6 Address: IP addresses that you want to unblock from the FortiGate server, in the .csv or list format.For example, ff06::/120
VDOM VDOM that is used to perform automated operations in provided VDOMs. Notes:- You can specify the VDOM here, as a configuration parameter, or you can also specify the VDOM as a function parameter.

Output

The output contains the following populated JSON schema:

Output schema when you choose "Unblock Method" as "Quarantine Based":
{
"newly_unblocked": [],
"ip_not_exist": [],
"vdom_not_exist": [],
"error_with_unblock": []
}

Output schema when you choose "Unblock Method" as "Policy Based":
{
"not_exist": [],
"newly_unblocked": [],
"error_with_unblock": []
}

operation: Unblock Application

Input parameters

Parameter Description
Application Names List of application names that you want to block on Fortinet FortiGate. Application names must be in the list format if you want to unblock more than one application. For example, for a list of applications enter ["Application_Name1", "Application_Name2"] in this field. For a single application enter Application_Name.
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated applications you want to unblock in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Application Control Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"name": "",
"status": "",
"message": ""
}

operation: Unblock URL

Input parameters

Parameter Description
URL List of URLs that you want to unblock on Fortinet FortiGate. URLs must be in the list format if you want to unblock more than one URL. For example, for a list of URLs, enter:[\"URL1\", \"URL2\"] in this field. For a single URL enter: /'example.com/'
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated URLs you want to unblock in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Web Filter Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"not_exist": [],
"newly_unblocked": [],
"not_unblock": []
}

operation: Quarantine Host

Input parameters

Parameter Description
MAC Address List of MAC addresses of the hosts you want to quarantine on Fortinet FortiGate. For example, 00:15:00:e8:27:25 or ['00:15:00:e8:27:25', '00:15:00:e8:27:26']
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"already_quarantine": [],
"newly_quarantine": [],
"not_quarantine": []
}

operation: Unquarantine Host

Input parameters

Parameter Description
MAC Address List of MAC addresses of the hosts whose entries you want to remove from the quarantine on Fortinet FortiGate. For example, 00:15:00:e8:27:25 or ['00:15:00:e8:27:25', '00:15:00:e8:27:26']
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"not_exist": [],
"newly_unquarantine": [],
"not_unquarantine": []
}

operation: Get Quarantine Hosts

Input parameters

Parameter Description
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"results": {
"targets": [
{
"macs": [
{
"mac": "",
"drop": "",
"parent": "",
"entry-id": "",
"description": "",
"q_origin_key": ""
}
],
"entry": "",
"description": "",
"q_origin_key": ""
}
],
"quarantine": "",
"traffic-policy": "",
"firewall-groups": ""
},
"version": "",
"revision": "",
"http_method": "",
"http_status": ""
}

operation: Create Address

Input parameters

Parameter Description
Address Category Select address category you wants to create
If you choose 'IPv4 Address'
  • Address Name: The name of the address that you want to create in Fortinet FortiGate
  • Type: Type of address
  • If you choose 'Subnet'
    • IP/Netmask: IP address or Netmask name of the address that you want to create in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable.
    If you choose 'IP Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable
    If you choose 'FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to create in Fortinet FortiGate
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable.
    If you choose 'Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to create in Fortinet FortiGate.
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • Comments: (Optional) Comment to be added to the address that you want to create in Fortinet FortiGate.
If you choose 'IPv6 Address'
  • Address Name: The name of the address that you want to create in Fortinet FortiGate
  • Type: Type of address
  • If you choose 'IPv6 Subnet'
    • IPv6 Address: IP address or Netmask name of the address that you want to create in Fortinet FortiGate.
    If you choose 'IPv6 Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    If you choose 'IPv6 FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to create in Fortinet FortiGate
    If you choose 'IPv6 Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to create in Fortinet FortiGate.
    If you choose 'IPv6 Fabric Connector Address'
    • SDN Connector: Enter SDN Connector name
    If you choose 'IPv6 Template'
    • IPv6 Address Template: Enter IPv6 Address Template
    • Host Type: Select host type
    • If you choose 'Specific'
      • Host: Enter IPv6 Host address
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • Comments: (Optional) Comment to be added to the address that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Get Addresses

Input parameters

Parameter Description
Address Category Select address type whose details you want to retrieve from Fortinet FortiGate.
Address Name The name of the address whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"uuid": "",
"subnet": "",
"type": "",
"sub-type": "",
"clearpass-spt": "",
"start-mac": "",
"end-mac": "",
"country": "",
"cache-ttl": "",
"sdn": "",
"fsso-group": [],
"interface": "",
"obj-type": "",
"comment": "",
"associated-interface": "",
"color": "",
"filter": "",
"sdn-addr-type": "",
"obj-id": "",
"list": [],
"tagging": [],
"allow-routing": "",
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"mkey": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Address

Input parameters

Parameter Description
Address Category Select address category you wants to update
If you choose 'IPv4 Address'
  • Address Name: The name of the address that you want to update in Fortinet FortiGate.
  • Type: Select Type of address which you wants to update
  • If you choose 'Subnet'
    • IP/Netmask: IP address or Netmask name of the address that you want to update in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable
    If you choose 'IP Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable
    If you choose 'FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to update in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable.
    If you choose 'Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to update in Fortinet FortiGate.
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to update in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to update in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to update in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • New Address Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address that you want to update in Fortinet FortiGate.
If you choose 'IPv6 Address'
  • Address Name: The name of the address that you want to update in Fortinet FortiGate.
  • Type: Type of address
  • If you choose 'IPv6 Subnet'
    • IPv6 Address: IP address or Netmask name of the address that you want to update in Fortinet FortiGate.
    If you choose 'IPv6 Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    If you choose 'IPv6 FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to update in Fortinet FortiGate
    If you choose 'IPv6 Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to update in Fortinet FortiGate.
    If you choose 'IPv6 Fabric Connector Address'
    • SDN Connector: Enter SDN Connector name
    If you choose 'IPv6 Template'
    • IPv6 Address Template: Enter IPv6 Address Template
    • Host Type: Select host type
    • If you choose 'Specific'
      • Host: Enter Host
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • New Address Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Delete Address

Input parameters

Parameter Description
Address Category Select address type that you want to delete from Fortinet FortiGate.
Address Name Address name to delete
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Create Address Group

Input parameters

Parameter Description
Address Group Category Select address group category to create group
If you choose 'IPv4 Group'
  • Group Name: Name of address group that you want to create in Fortinet FortiGate
  • Members: List of IP address names to add to the address group you want to create in Fortinet FortiGate.
  • Type: Type of address group that you want to create in Fortinet FortiGate. You can choose between Group or Folder.Group: This is the default address group type (address might belong to multiple groups).Folder: The address folder group (members cannot belong to any other group).
  • Exclude: Select this checkbox, i.e., set it to True, to enable address exclusion. If you select this checkbox, then in the Exclude Members field, specify the list of IP addresses or URLs that you want to add to the exclusion list in Fortinet FortiGate.
  • If you choose 'true'
    • Exclude Members: List of IP address names/URL names to add into exclusion list
  • Comments: (Optional) Comment to be added to the address group that you want to create in Fortinet FortiGate.
  • Static Route Configuration: Select the Enable option to enable usage of this address group in the static route configuration, else select Disable
If you choose 'IPv6 Group'
  • Group Name: Name of address group that you want to create in Fortinet FortiGate
  • Members: List of IP address names to add to the address group you want to create in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address group that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get Address Groups

Input parameters

Parameter Description
Address Group Category Select address group type whose details you want to retrieve from Fortinet FortiGate.
Address Group Name The name of the address group whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"type": "",
"uuid": "",
"member": [
{
"name": "",
"q_origin_key": ""
},
{
"name": "",
"q_origin_key": ""
},
{
"name": "",
"q_origin_key": ""
}
],
"comment": "",
"exclude": "",
"exclude-member": [],
"color": "",
"tagging": [],
"allow-routing": "",
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"mkey": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Address Group

Input parameters

Parameter Description
Address Group Category Select address group category to update group
If you choose 'IPv4 Group'
  • Group Name: Name of address group that you want to update in Fortinet FortiGate.
  • New Group Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate
  • Add Members: List of IP address names to add to the address group you want to update in Fortinet FortiGate.
  • Remove Members: List of IP address names to remove from the address group you want to update in Fortinet FortiGate.
  • Exclude: Enable/disable address exclusion.
  • If you choose 'true'
    • Add Exclude Members: Specify the list of IP address names that you want to add to the exclusion list in Fortinet FortiGate
    • Remove Exclude Members: Specify the list of IP address names that you want to remove from the exclusion list in Fortinet FortiGate
  • Comments: (Optional) Comment to be added to the address group that you want to update in Fortinet FortiGate.
  • Static Route Configuration: Select the Enable option to enable usage of this address group in the static route configuration, else select Disable.
If you choose 'IPv6 Group'
  • Group Name: Name of address group that you want to update in Fortinet FortiGate.
  • New Group Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate
  • Add Members: List of IP address names to add to the address group you want to update in Fortinet FortiGate.
  • Remove Members: List of IP address names to remove from the address group you want to update in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address group that you want to update in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Address Group

Input parameters

Parameter Description
Address Group Category Select address group type that you want to delete from Fortinet FortiGate.
Address Group Name Name of address group that you want to delete from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Create Service

Input parameters

Parameter Description
Name Name of the service that you want to create in Fortinet FortiGate.
Category Category of the service that you want to create in Fortinet FortiGate. For example, Email, Authentication, General, Remote Access, etc.
Protocol Protocol type based on IANA numbers.
If you choose 'TCP/UDP/SCTP'
  • Address: Type of address to associate with the service that you want to create in Fortinet FortiGate. You can choose from IP Range or FQDN
  • If you choose 'IP Range'
    • IP Range: specify the starting and ending IP addresses that constitute the IP range associated with the service. For example, 0.0.0.0-0.0.0.10
    If you choose 'FQDN'
    • FQDN: Specify the Fully qualified domain name associated with the service
  • TCP Port Range: Specify multiple TCP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'TCP Port Low-TCP Port High:Source Port Low-Source Port High'
  • UDP Port Range: Multiple UDP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'UDP Port Low-UDP Port High:Source Port Low-Source Port High'
  • SCTP Port Range: Multiple SCTP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'SCTP Port Low-SCTP Port High:Source Port Low-Source Port High'
If you choose 'ICMP'
  • Type: Type of ICMP to associate with the service that you want to create in Fortinet FortiGate.
  • Code: ICMP Code to associate with the service that you want to create in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'ICMP6'
  • Type: Type of ICMP6 to associate with the service that you want to create in Fortinet FortiGate.
  • Code: ICMP6 Code to associate with the service that you want to create in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'IP'
  • Protocol Number: Protocol Number of the IP you want to associate with the service to be created in Fortinet FortiGate. Maximum: 254 Minimum: 0
Comments (Optional) Comment to be added to the service that you want to create in Fortinet FortiGate.
Show in Service List Select the Enable option to enable the visibility of the service on the GUI, else select Disable.
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get Services

Input parameters

Parameter Description
Name The name of the service whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"proxy": "",
"category": "",
"protocol": "",
"helper": "",
"iprange": "",
"fqdn": "",
"tcp-portrange": "",
"udp-portrange": "",
"sctp-portrange": "",
"tcp-halfclose-timer": "",
"tcp-halfopen-timer": "",
"tcp-timewait-timer": "",
"udp-idle-timer": "",
"session-ttl": "",
"check-reset-range": "",
"comment": "",
"color": "",
"visibility": "",
"app-service-type": "",
"app-category": [],
"application": [],
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"mkey": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Service

Input parameters

Parameter Description
Name Name of the service that you want to update in Fortinet FortiGate.
New Name (Optional) Specify a new name for the service if you want to update its name in Fortinet FortiGate.
Category Category of the service that you want to create in Fortinet FortiGate. For example, Email, Authentication, General, Remote Access, etc.
Protocol Protocol type based on IANA numbers.
If you choose 'TCP/UDP/SCTP'
  • Address: Type of address to associate with the service that you want to update in Fortinet FortiGate. You can choose from IP Range or FQDN
  • If you choose 'IP Range'
    • IP Range: Start and end of the IP range associated with service. E.g. 0.0.0.0-0.0.0.10
    If you choose 'FQDN'
    • FQDN: Specify the Fully qualified domain name associated with the service.
  • TCP Port Range: Multiple TCP port ranges. e.g 0-22:55-75 55-77:88-100 in the format of 'TCP Port Low-TCP Port High:Source Port Low-Source Port High'
  • UDP Port Range: UDP Port Range: Multiple UDP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'UDP Port Low-UDP Port High:Source Port Low-Source Port High'
  • SCTP Port Range: Multiple SCTP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'SCTP Port Low-SCTP Port High:Source Port Low-Source Port High'
If you choose 'ICMP'
  • Type: Type of ICMP to associate with the service that you want to update in Fortinet FortiGate.
  • Code: ICMP Code to associate with the service that you want to update in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'ICMP6'
  • Type: Type of ICMP6 to associate with the service that you want to update in Fortinet FortiGate.
  • Code: ICMP6 Code to associate with the service that you want to update in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'IP'
  • Protocol Number: Protocol Number of the IP you want to associate with the service to be updated in Fortinet FortiGate. Maximum: 254 Minimum: 0
Comments (Optional) Comment to be added to the service that you want to update in Fortinet FortiGate.
Show in Service List Enable/disable the visibility of the service on the GUI.
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Service

Input parameters

Parameter Description
Name Name of the service that you want to delete from Fortinet FortiGate
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Create Service Group

Input parameters

Parameter Description
Name Name of service group that you want to create in Fortinet FortiGate.
Members List of members to add to the service group you want to create in Fortinet FortiGate.
Comments (Optional) Comment to be added to the service group that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get Service Groups

Input parameters

Parameter Description
Name The name of the service group whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"proxy": "",
"member": [
{
"name": "",
"q_origin_key": ""
}
],
"comment": "",
"color": "",
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Service Group

Input parameters

Parameter Description
Name Name of the service group that you want to update in Fortinet FortiGate.
New Name (Optional) Specify a new name for the service group if you want to update its name in Fortinet FortiGate.
Add Members List of members to add to the service group you want to update in Fortinet FortiGate.
Remove Members List of members to remove from the service group you want to update in Fortinet FortiGate.
Comments (Optional) Comment to be added to the service group that you want to update in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Service Group

Input parameters

Parameter Description
Name Name of the service group that you want to delete from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Create Policy

Input parameters

Parameter Description
Policy Name Name of policy that you want to create in Fortinet FortiGate
Incoming Interface Names of incoming interface associated with the policy that you want to create in Fortinet FortiGate. For example port1.
Outgoing Interface Names of outgoing interface associated with the policy that you want to create in Fortinet FortiGate. For example port2.
Source Source IPv4 address and address group names associated with the policy that you want to create in Fortinet FortiGate.
Destination Destination IPv4 address and address group names associated with the policy that you want to create in Fortinet FortiGate.
Service Service and service group names associated with the policy that you want to create in Fortinet FortiGate.
Schedule Name of the Schedule associated with the policy that you want to create in Fortinet FortiGate.
Status Select the Enable option to enable this policy on Fortinet FortiGate, else select Disable.
Action Policy action (Accept/deny).Accept:Allows session that match the firewall policy. Deny:Blocks sessions that match the firewall policy.
If you choose 'Accept'
  • Inspection Mode: The inspection mode of the policy. You can choose between the Flow Based (default) or Proxy Based
  • NAT: Select the checkbox, i.e., set it to true, to enable NAT
  • If you choose 'true'
    • IP Pool Configuration: Select IP pool configuration
    • If you choose 'Use Dynamic IP Pool'
      • Pool Name: Enter pool names in csv or list format
    • Preserve Source Port: Enable to prevent source NAT from changing a session's source port
  • Protocol Options: Name of an existing Protocol options profile.
  • Security Profiles: Select security profiles to enable it
  • If you choose 'AntiVirus'
    • Antivirus Profile: Name of an existing Antivirus profile.
    If you choose 'Web Filter'
    • Web Filter Profile: Name of an existing Web filter profile.
    If you choose 'DNS Filter'
    • DNS Filter Profile: Name of an existing DNS filter profile.
    If you choose 'Application Control'
    • Application Control: Name of an existing Application list.
    If you choose 'IPS'
    • IPS Sensor: Name of an existing IPS sensor.
    If you choose 'File Filter'
    • File Filter Profile: Name of an existing file-filter profile.
    If you choose 'SSL Inspection'
    • SSL Inspection Profile: Name of an existing SSL SSH profile.
  • Log Traffic: Enable or disable logging. Log all sessions or security profile sessions.All:Log all sessions accepted or denied by this policy. UTM:Log traffic that has a security profile applied to it. Disable:Disable all logging for this policy.
Comments (Optional) Comment to be added to the policy that you want to update in Fortinet FortiGate
Additional Policy Arguments (Optional) Specify policy arguments in that JSON format to be added to the policy that you want to update in Fortinet FortiGate. You can enter the arguments in the following format: {"field1":value1, "field2":value2}
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get List of Policies

Input parameters

Parameter Description
Policy ID Policy ID to get its details
VDOM (Optional) VDOM on which you want to perform automated operations,.ie, the VDOM whose associated list of policies you want to retrieve from FortiGate. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"result": [
{
"status": "",
"path": "",
"revision": "",
"name": "",
"http_method": "",
"vdom": "",
"http_status": "",
"version": "",
"build": "",
"serial": "",
"results": [
{
"logtraffic": "",
"srcaddr": [
{
"q_origin_key": "",
"name": ""
}
],
"dstintf": [
{
"q_origin_key": "",
"name": ""
}
],
"label": "",
"scan-botnet-connections": "",
"action": "",
"capture-packet": "",
"ips-sensor": "",
"tcp-session-without-syn": "",
"av-profile": "",
"policyid": "",
"diffserv-reverse": "",
"dnsfilter-profile": "",
"send-deny-packet": "",
"profile-protocol-options": "",
"app-category": [],
"vlan-cos-fwd": "",
"diffserv-forward": "",
"wanopt-passive-opt": "",
"tags": [],
"custom-log-fields": [],
"voip-profile": "",
"users": [],
"srcintf": [
{
"q_origin_key": "",
"name": ""
}
],
"learning-mode": "",
"timeout-send-rst": "",
"wsso": "",
"fsso": "",
"spamfilter-profile": "",
"traffic-shaper-reverse": "",
"url-category": [],
"block-notification": "",
"rsso": "",
"internet-service": "",
"internet-service-custom": [],
"webfilter-profile": "",
"dsri": "",
"auth-cert": "",
"ssl-mirror": "",
"groups": [],
"diffservcode-forward": "",
"internet-service-id": [],
"firewall-session-dirty": "",
"tcp-mss-sender": "",
"dstaddr-negate": "",
"outbound": "",
"rtp-nat": "",
"dscp-value": "",
"profile-type": "",
"wccp": "",
"inbound": "",
"ssl-mirror-intf": [],
"service": [
{
"q_origin_key": "",
"name": ""
}
],
"webcache": "",
"service-negate": "",
"wanopt": "",
"dscp-negate": "",
"profile-group": "",
"status": "",
"q_origin_key": "",
"tcp-mss-receiver": "",
"rtp-addr": [],
"nat": "",
"utm-status": "",
"poolname": [],
"fsso-agent-for-ntlm": "",
"delay-tcp-npu-session": "",
"ntlm": "",
"permit-stun-host": "",
"vpntunnel": "",
"devices": [],
"schedule": "",
"permit-any-host": "",
"global-label": "",
"icap-profile": "",
"dlp-sensor": "",
"identity-based-route": "",
"logtraffic-start": "",
"redirect-url": "",
"session-ttl": "",
"diffservcode-rev": "",
"auth-path": "",
"disclaimer": "",
"application": [],
"name": "",
"wanopt-profile": "",
"schedule-timeout": "",
"internet-service-negate": "",
"traffic-shaper": "",
"ippool": "",
"wanopt-detection": "",
"natoutbound": "",
"webcache-https": "",
"fixedport": "",
"application-list": "",
"waf-profile": "",
"dstaddr": [
{
"q_origin_key": "",
"name": ""
}
],
"comments": "",
"srcaddr-negate": "",
"replacemsg-override-group": "",
"uuid": "",
"vlan-cos-rev": "",
"radius-mac-auth-bypass": "",
"wanopt-peer": "",
"natip": "",
"per-ip-shaper": "",
"dscp-match": "",
"ntlm-enabled-browsers": [],
"ntlm-guest": "",
"natinbound": "",
"captive-portal-exempt": "",
"match-vip": "",
"ssl-ssh-profile": "",
"auth-redirect-addr": ""
}
]
}
],
"vdom_not_exist": []
}

operation: Update Policy

Input parameters

Parameter Description
Policy ID Policy ID which you wants to update
Policy Name Policy name to update
Status Enable or disable this policy.
Incoming Interface Incoming Interface names
Outgoing Interface Outgoing Interface names
Add Source Source IPv4 addresses and address group names to add
Remove Source Source IPv4 addresses and address group names to remove
Add Destination Destination IPv4 addresses and address group names to add
Remove Destination Destination IPv4 address and address group names to remove
Add Services Service and service group names to add
Remove Services Service and service group names to remove
Schedule Schedule name.
Action Policy action (Accept/deny).Accept:Allows session that match the firewall policy. Deny:Blocks sessions that match the firewall policy.
If you choose 'Accept'
  • Inspection Mode: Policy inspection mode (Flow Based/Proxy Based). Default is Flow Based mode. Proxy Based:Proxy based inspection.flow:Flow based inspection.
  • NAT: Enable/disable source NAT.
  • If you choose 'true'
    • IP Pool Configuration: Select IP pool configuration
    • If you choose 'Use Dynamic IP Pool'
      • Pool Name: Enter pool names in csv or list format
    • Preserve Source Port: Enable to prevent source NAT from changing a session's source port
  • Protocol Options: Name of an existing Protocol options profile.
  • Security Profiles: Select security profiles to enable it
  • If you choose 'AntiVirus'
    • Antivirus Profile: Name of an existing Antivirus profile.
    If you choose 'Web Filter'
    • Web Filter Profile: Name of an existing Web filter profile.
    If you choose 'DNS Filter'
    • DNS Filter Profile: Name of an existing DNS filter profile.
    If you choose 'Application Control'
    • Application Control: Name of an existing Application list.
    If you choose 'IPS'
    • IPS Sensor: Name of an existing IPS sensor.
    If you choose 'File Filter'
    • File Filter Profile: Name of an existing file-filter profile.
    If you choose 'SSL Inspection'
    • SSL Inspection Profile: Name of an existing SSL SSH profile.
  • Disable Security Profiles: Select security profiles to disable it
  • Log Traffic: Enable or disable logging. Log all sessions or security profile sessions.All:Log all sessions accepted or denied by this policy. UTM:Log traffic that has a security profile applied to it. Disable:Disable all logging for this policy.
Comments Add comment for policy.
Additional Policy Arguments Specify policy arguments in JSON format which you wants to update. You can enter the arguments in the following format: {"field1":value1, "field2":value2}.
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Policy

Input parameters

Parameter Description
Policy ID ID of policy that you want to delete from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Execute Command

Input parameters

Parameter Description
Commands Specify the command that you want to execute on the FortiOS console. You can provide commands in the .csv or the list format.
Username The username to access the FortiOS endpoint server to which you will connect and execute the specified command.
Password The password to access the FortiOS endpoint server to which you will connect and execute the specified command
Private Key The private Key used to perform SSH authentication on the FortiOS server.
Port The port number used for connecting to the FortiOS server via SSH. By default, this is set to 22.
Timeout Time, in seconds, after which the execution of the remote command gets timed out

Output

The output contains the following populated JSON schema:
{
"command": "",
"output": []
}

operation: Create User

Input parameters

Parameter Description
User Type Select user type based on which you wants to create new user
If you choose 'Local User'
  • Username: Specify the username for the user that you want to create in the Fortinet FortiGate server
  • Password: Specify the password for the user that you want to create in the Fortinet FortiGate server
If you choose 'Remote Radius User'
  • Username: Specify the username for the user that you want to create in the Fortinet FortiGate server
  • Radius Server: Specify the name of the RADIUS server using which the user gets authenticated
If you choose 'Remote TACACS+ User'
  • Username: Specify the username for the user that you want to create in the Fortinet FortiGate server
  • TACACS+ Server: Specify the name of the TACACS+ server using which the user gets authenticated.
Two Factor Authentication Select whether you want to Enable or Disable two-factor authentication for the user you are creating in Fortinet FortiGate
If you choose 'Enable'
  • Authentication Type: Select the type of two-factor authentication for the user you are creating in Fortinet FortiGate. You can choose between FortiToken or FortiToken Cloud.
  • If you choose 'FortiToken'
    • Token: Enter the token name used to authenticate the user
    • Send Activation Code: Select whether you want to Enable or Disable sending of an activation code for two-factor authentication
    • If you choose 'Enable'
      • Activation Method: Select the method of sending the activation code. You can choose between Email or SMS.
  • Email Address: Enter email address of new user
  • SMS: Select whether you want to Enable or Disable SMS-based two-factor authentication for the user
  • If you choose 'Enable'
    • Country Dial Code: Select whether you want to Enable or Disable SMS-based two-factor authentication for the user
    • Phone Number: Enter the mobile phone number of the user for two-factor authentication.
User Account Status Select the account status of the user you are creating on Fortinet FortiGate. You can choose between Enable or Disable.
User Group Select the group that you want to assign to the user you are creating on Fortinet FortiGate. You can choose between Enable or Disable. If you choose 'Enable', then in the User Group Names field specify the group names, in CSV or in list format, that you want to assign to the user you are creating on Fortinet FortiGate.
If you choose 'Enable'
  • User Group Names: Enter the user group name in csv or in list format
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Get Users

Input parameters

Parameter Description
Name Specify the name of the user for whom you want to retrieve data from the Fortinet FortiGate server
Start Specify the starting entry index from where you want to retrieve users from the Fortinet FortiGate server.
Count Specify the maximum number of users to return.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"results": [
{
"id": "",
"name": "",
"type": "",
"q_ref": "",
"passwd": "",
"q_name": "",
"q_path": "",
"q_type": "",
"status": "",
"q_class": "",
"email-to": "",
"q_static": "",
"css-class": "",
"q_no_edit": "",
"sms-phone": "",
"fortitoken": {
"datasource": "",
"q_origin_key": "",
"serial-number": ""
},
"ppk-secret": "",
"sms-server": "",
"two-factor": "",
"authtimeout": "",
"ldap-server": "",
"passwd-time": "",
"q_mkey_type": "",
"q_no_rename": "",
"workstation": "",
"ppk-identity": "",
"q_origin_key": "",
"passwd-policy": "",
"radius-server": "",
"q_global_entry": "",
"tacacs+-server": {
"name": "",
"datasource": "",
"q_origin_key": ""
},
"sms-custom-server": "",
"auth-concurrent-value": "",
"two-factor-notification": "",
"auth-concurrent-override": "",
"two-factor-authentication": "",
"username-case-sensitivity": ""
}
],
"version": "",
"revision": "",
"http_method": "",
"http_status": ""
}

operation: Update User

Input parameters

Parameter Description
User Type Select user type based on which you wants to update an user
If you choose 'Local User'
  • Username: Specify the existing username that you want to edit in the Fortinet FortiGate server.
  • New Username: Specify the new username for the user that you want to update in the Fortinet FortiGate server.
  • Password: Specify a new password if you want to edit the password in the Fortinet FortiGate server
If you choose 'Remote Radius User'
  • Username: Specify the existing username that you want to edit in the Fortinet FortiGate server.
  • New Username: Specify the new username for the user that you want to update in the Fortinet FortiGate server.
  • Radius Server: Specify the name of the RADIUS server using which the user gets authenticated.
If you choose 'Remote TACACS+ User'
  • Username: Specify the existing username that you want to edit in the Fortinet FortiGate server.
  • New Username: Specify the new username for the user that you want to update in the Fortinet FortiGate server.
  • TACACS+ Server: Specify the name of the TACACS+ server using which the user gets authenticated
Two Factor Authentication Select whether you want to Enable or Disable two-factor authentication for the user you want to update in Fortinet FortiGate.
Authentication Type Select the type of two-factor authentication for the user you want to update in Fortinet FortiGate. You can choose between FortiToken or FortiToken Cloud. You must specify the authentication type parameter when you are enabling two-factor authentication
Token Enter the Fortitoken used to authenticate the user for two-factor authentication. This is required if you select the authentication type as 'FortiToken'.
Send Activation Code Select whether you want to Enable or Disable sending of an activation code for two-factor authentication. If you choose 'Enable', then from the Activation Method drop-down list, select the method of sending the activation code. You can choose between Email or SMS.
If you choose 'Enable'
  • Activation Method: Select the method of sending the activation code. You can choose between Email or SMS.
Email Address Enter the email address of the user you want to update in Fortinet FortiGate. You must specify either the email address or sms details to activate two factor authentication.
SMS uired to activate two factor authentication.
If you choose 'Enable'
  • Country Dial Code: Enter the country code of the user for two-factor authentication.
  • Phone Number: Enter the mobile phone number of the user for two-factor authentication.
User Account Status Select the account status of the user you are updating on Fortinet FortiGate. You can choose between Enable or Disable.
User Group Names To Add Enter the user group names to add user into the input user group names, in csv or list format
User Group Names To Remove Enter the user group names, in the CSV or list format, from which you want to remove the user you are updating on Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"revision_changed": ""
}

operation: Delete User

Input parameters

Parameter Description
Name Specify the name of the user that you want to delete from Fortinet FortiGate
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Get System Events

Input parameters

Parameter Description
Filter Query Specify the query using which you want to filter system events that you want to retrieve from the Fortinet FortiGate server. For example, user=*"admin", level=*"emergency"
Start Specify the starting entry index from where you want to retrieve data from the Fortinet FortiGate server
Rows Specify the maximum number of items to return

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"results": [
{
"date": "",
"time": "",
"eventtime": "",
"tz": "",
"logid": "",
"type": "",
"subtype": "",
"level": "",
"vd": "",
"logdesc": "",
"user": "",
"action": "",
"msg": "",
"_metadata": {
"#": "",
"logid": "",
"timestamp": "",
"roll": ""
}
}
],
"vdom": "",
"device": "",
"category": "",
"subcategory": "",
"start": "",
"rows": "",
"session_id": "",
"completed": "",
"total_lines": "",
"now": "",
"status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get User Last Login Details

Input parameters

Parameter Description
Username Specify the username whose last login details you want to retrieve from the Fortinet FortiGate server.

Output

The output contains the following populated JSON schema:
{
"date": "",
"time": "",
"eventtime": "",
"tz": "",
"logid": "",
"type": "",
"subtype": "",
"level": "",
"vd": "",
"logdesc": "",
"sn": "",
"user": "",
"ui": "",
"method": "",
"srcip": "",
"dstip": "",
"action": "",
"status": "",
"reason": "",
"profile": "",
"msg": "",
"_metadata": {
"#": "",
"logid": "",
"timestamp": "",
"roll": ""
}
}

Included playbooks

The Sample - Fortinet FortiGate - 5.2.2 playbook collection comes bundled with the Fortinet FortiGate connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOARTM after importing the Fortinet FortiGate connector.

  • Address Group: Create Address Group
  • Address Group: Delete Address Group
  • Address Group: Get Address Groups
  • Address Group: Update Address Group
  • Address: Block IP Address
  • Address: Create Address
  • Address: Delete Address
  • Address: Get Addresses
  • Address: Get Blocked IP Addresses
  • Address: Unblock IP Address
  • Address: Update Address
  • Application: Block Application
  • Application: Get Applications Detail
  • Application: Get Blocked Applications
  • Application: Unblock Application
  • Execute Command
  • Get System Events
  • Host: Get Quarantine Hosts
  • Host: Quarantine Host
  • Host: Unquarantine Host
  • Policy: Create Policy
  • Policy: Delete Policy
  • Policy: Get List of Policies
  • Policy: Update Policy
  • Service Group: Create Service Group
  • Service Group: Delete Service Group
  • Service Group: Get Service Groups
  • Service Group: Update Service Group
  • Service: Create Service
  • Service: Delete Service
  • Service: Get Services
  • Service: Update Service
  • URL: Block URL
  • URL: Get Blocked URLs
  • URL: Unblock URL
  • User: Create User
  • User: Delete User
  • User: Get User Last Login Details
  • User: Update User
  • Users: Get Users

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection, since the sample playbook collection gets deleted during connector upgrade and delete.

Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate

  1. Log on to the Fortinet FortiGate server with the necessary credentials.
  2. To block or unblock an IP address, you must create a policy for IP addresses on the Fortinet FortiGate server. The following steps define the process of adding a policy:
    1. In Policy & Objects, click Addresses to create an address group with the following conditions:
      • Category = IPv4 Group
      • Group Name = Blocked_IPs
      • Type = Group
      • Member = none
    2. NOTE: You can create different address groups for source and destination.
      For more information on creating address groups and address group exclusions, see the FortiOS 7.2.3 Address Group Exclusion.
      NOTE: For IPv6 addresses, you can specify the Category as IPv6 Group.
    3. In Policy & Objects, click Firewall Policy to create a policy for IPv4 with the following conditions:
      • Name = FortiSOAR_Blocked_Policy
      • Source = Blocked_IPs
      • Destination = Blocked_IPs
      • Schedule = always
      • Service = ALL
      • Action = DENY
      • Enable this policy = Enable
    4. In Policy & Objects, click Firewall Policy and enter the firewall policy name as the Action parameter. For our example, we have named this as FortiSOAR_Blocked_Policy. When you are configuring your Fortinet FortiGate connector in FortiSOAR™, you must use the policy name that you have specified in this step as your Policy Name action parameter.
      For more information on the firewall policy, see Firewall Policy in the FortiOS documentation.
  3. To block or unblock a URL, you must create a profile for blocking or unblocking static URLs on the Fortinet FortiGate server. For information on creating web filters, see Web Filter in the FortiOS 7.2.3 Administration Guide.
  4. The following steps define the process of adding a policy:
    1. In Security Profiles, click Web Filter to create a new profile for blocking or unblocking static URLs or use the default profile.
      NOTE: Ensure that the URL Filter is enabled.
    2. Enter the Web Filter Profile name on the configuration page. For our example, we have named this URL Block Policy. When you are configuring your Fortinet FortiGate connector in FortiSOAR™, you must use the Web Filter Profile name that you have specified in this step as your Web Filter Profile Name configuration parameter.
  5. To block or unblock an application, you must create a profile for blocking or unblocking applications on the Fortinet FortiGate server. The following steps define the process of adding a policy:
    1. In Security Profiles, click Application Control to create a new profile for blocking or unblocking applications or use the default profile.
    2. Enter the policy name on the configuration page. For our example, we have named this App Block Policy. When you are configuring your Fortinet FortiGate connector in FortiSOAR™, you must use the Application Control Profile name that you have specified in this step as your Application Control Profile Name configuration parameter.
      For information on adding application controls, see Application Control FortiOS 7.2.3 Administration Guide.
Previous
Next

About the connector

Fortinet FortiGate enterprise firewall provide high performance, consolidated advanced security and granular visibility for broad protection across the entire digital attack surface.

This document provides information about the Fortinet FortiGate Connector, which facilitates automated interactions, with a Fortinet FortiGate server using FortiSOAR™ playbooks. Add the Fortinet FortiGate Connector as a step in FortiSOAR™ playbooks and perform automated operations with Fortinet FortiGate.

Version information

Connector Version: 5.2.2

FortiSOAR™ Version Tested on: 7.4.0-3024

Fortinet FortiGate Version Tested on: FortiGate VM64 v7.2.3 build1262

Authored By: Fortinet

Certified: Yes

Release Notes for version 5.2.2

Following enhancements have been made to the Fortinet FortiGate Connector in version 5.2.2:

Installing the connector

Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.

You can also use the yum command as a root user to install the connector:

yum install cyops-connector-fortigate-firewall

Prerequisites to configuring the connector

Minimum Permissions Required

Configuring the connector

For the procedure to configure a connector, click here

Configuration parameters

In FortiSOAR™, on the Connectors page, click the Fortinet FortiGate connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:

Parameter Description
Hostname IP address or Hostname of the Fortinet FortiGate endpoint server to which you will connect and perform the automated operations.
API Key API Key of the Fortinet FortiGate endpoint server to which you will connect and perform the automated operations. You can get the API key from the administration settings in FortiGate. Important:To create a REST API key from Fortinet FortiGate, see the "Create a REST API administrator" section in the Fortinet FortiGate Documentation.
Port Port number used for connecting to the Fortinet FortiGate server. Defaults to 443.
Web Filter Profile Name Name of the Web Filter Profile that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in the Fortinet FortiGate section.
Application Control Profile Name Name of the Application Control Profile that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in the Fortinet FortiGate section.
VDOM VDOMs, in the CSV or List format, if the VDOM mode is enabled.
Verify SSL Specifies whether the SSL certificate for the server is to be verified or not.
By default, this option is set as True.

Actions supported by the connector

The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 and onwards:

Function Description Annotation and Category
Get Applications Detail Retrieves a list of all application names and associated details from the Fortinet FortiGate server. get_app_details
Investigation
Get Blocked IP Addresses Retrieves a list of IP Addresses that are blocked on Fortinet FortiGate. get_blocked_ip
Investigation
Get Blocked Applications Retrieves a list of application names that are blocked on Fortinet FortiGate. get_blocked_app
Investigation
Get Blocked URLs Retrieves a list of URLs that are blocked on Fortinet FortiGate. get_blocked_url
Investigation
Block IP Address Blocks IP addresses on Fortinet FortiGate using the IPv4 Block Policy that you have specified as the "action" parameter of Fortinet FortiGate or by Quarantine based- adds IP into the banned IP list. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. block_ip
Containment
Block Application Blocks applications on Fortinet FortiGate using the Application Control Profile Name that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. block_app
Containment
Block URL Blocks URLs on Fortinet FortiGate using the Web Filter Profile Name Policy that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. block_url
Containment
Unblock IP Address Unblocks IP addresses on Fortinet FortiGate using the IPv4 Block Policy that you have specified as the "action" parameter of Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. unblock_ip
Remediation
Unblock Application Unblocks applications on Fortinet FortiGate using the Application Control Profile Name that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. unblock_app
Remediation
Unblock URL Unblocks URLs on Fortinet FortiGate using the Web Filter Profile Name that you have specified while configuring Fortinet FortiGate. For more information see the "Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate" section. unblock_url
Remediation
Quarantine Host Quarantines hosts on the Fortinet Fortigate server based on MAC addresses and other input parameters you have specified quarantine_host
Containment
Unquarantine Host Unquaratines host entries from the Fortinet Fortigate server based on MAC addresses and other input parameters you have specified. unquarantine_host
Containment
Get Quarantine Hosts Retrieves a list of all quarantine hosts from Fortinet FortiGate. get_quarantine_hosts
Investigation
Create Address Create a new address in Fortinet FortiGate based on the name of the address, type, and other input parameters you have specified. create_address
Investigation
Get Addresses Retrieves a list of all addresses or specific addresses that are configured on Fortinet FortiGate based on the input parameters you have specified. get_addresses
Investigation
Update Address Update an existing address in Fortinet FortiGate based on the address name, type, and other input parameters you have specified. update_address
Investigation
Delete Address Deletes an address that is configured on Fortinet FortiGate based on the name of the address and other input parameters you have specified delete_address
Investigation
Create Address Group Creates a new address group in Fortinet FortiGate based on the name of the address group, members of the group, and other input parameters you have specified. create_address_group
Investigation
Get Address Groups Retrieves a list of all address groups or specific address groups that are configured on Fortinet FortiGate based on the input parameters you have specified. get_address_groups
Investigation
Update Address Group Updates an existing address group in Fortinet FortiGate based on the name of the address group, members of the group, and other input parameters you have specified. update_address_group
Investigation
Delete Address Group Deletes an address group that is configured on Fortinet FortiGate based on the name of the address group and other input parameters you have specified. delete_address_group
Investigation
Create Service Create a new service in Fortinet FortiGate based on the name of the service and other input parameters you have specified. create_firewall_service
Investigation
Get Services Retrieves a list of all firewalls services or specific services that are configured on Fortinet FortiGate based on the input parameters you have specified get_firewall_services
Investigation
Update Service Creates an existing service in Fortinet FortiGate based on the name of the service and other input parameters you have specified update_firewall_service
Investigation
Delete Service Deletes a firewall service that is configured on Fortinet FortiGate based on the name of the address group and other input parameters you have specified. delete_firewall_service
Investigation
Create Service Group Creates a new service group in Fortinet FortiGate based on the name of the service group, members of the group, and other input parameters you have specified. create_service_group
Investigation
Get Service Groups Retrieves a list of all service groups or specific service groups that are configured on Fortinet FortiGate based on the input parameters you have specified. get_service_groups
Investigation
Update Service Group Updates an existing service group in Fortinet FortiGate based on the name of the service group, members of the group, and other input parameters you have specified. update_service_group
Investigation
Delete Service Group Deletes a service group that is configured on Fortinet FortiGate based on the name of the service group and other input parameters you have specified delete_service_group
Investigation
Create Policy Creates a new firewall policy in Fortinet FortiGate based on the name of the policy, names of the incoming and outgoing interfaces, and other input parameters you have specified. create_policy
Investigation
Get List of Policies Retrieves a list and details for all IPv4 policies or specific IPv4 policies that are configured on Fortinet FortiGate based on the input parameters you have specified get_policies
Investigation
Update Policy Updates an existing firewall policy in Fortinet FortiGate based on the ID of the policy, names of the incoming and outgoing interfaces, and other input parameters you have specified. update_policy
Investigation
Delete Policy Deletes a policy that is configured on Fortinet FortiGate based on the ID of the policy and other input parameters you have specified. delete_policy
Investigation
Execute Command Executes a CLI command on the FortiOS console based on the commands and other input parameters you have specified. execute_command
Investigation
Create User Creates a new user in the Fortinet FortiGate server based on the username, authentication type, and other input parameters you have specified. create_user
Investigation
Get Users Retrieves a list of all users that are configured on Fortinet FortiGate based on the input parameters you have specified. get_users
Investigation
Update User Updates an existing user in the Fortinet FortiGate server based on the username, authentication type, and other input parameters you have specified. update_user
Investigation
Delete User Deletes a user who is configured on Fortinet FortiGate based on the name of the user you have specified. delete_user
Investigation
Get System Events Retrieves system log data from the Fortinet FortiGate server, based on the input parameters you have specified get_system_events
Investigation
Get User Last Login Details Retrieves the last login details for a specified user from the Fortinet FortiGate server, based on the username you have specified. get_user_list_login_details
Investigation

operation: Get Applications Detail

Input parameters

None.

Output

The output contains the following populated JSON schema:
{
"status": "",
"http_status": "",
"http_method": "",
"results": [
{
"q_origin_key": "",
"q_name": "",
"protocol": "",
"q_type": "",
"q_path": "",
"id": "",
"category": "",
"q_ref": "",
"q_no_rename": "",
"sub-category": "",
"risk": "",
"metadata": [
{
"id": "",
"q_origin_key": "",
"metaid": "",
"valueid": ""
}
],
"q_static": "",
"technology": "",
"vendor": "",
"weight": "",
"popularity": "",
"q_mkey_type": "",
"q_class": "",
"behavior": "",
"name": "",
"parameter": ""
}
],
"vdom": "",
"build": "",
"serial": "",
"version": "",
"name": "",
"revision": "",
"path": ""
}

operation: Get Blocked IP Addresses

Input parameters

Parameter Description
Block Method Method to be used for retrieving a list of IP Addresses that are blocked on Fortinet FortiGate. You can choose from Quarantine Based or Policy Based. If you choose Quarantine Based, then you can specify the following parameter: VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format. If you choose Policy Based, then you can specify the following parameters: IPv4 Policy Name: Name of the IPv4 Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses and whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. Address Group Name: Name of the IP address group name that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Quarantine Based'
  • VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Policy Based'
  • Policy Name: Name of the Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses and whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
  • Address Group Name: Name of the IP address group name, in the "CSV" or "list" format, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section
  • VDOM: (Optional) VDOMs whose associated list of blocked IP addresses you want to retrieve from Fortinet FortiGate. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters.

Output

The output contains the following populated JSON schema:

Output schema when you choose "Block Method" as "Quarantine Based":
{
"vdom_not_exist": [],
"result": [
{
"name": "",
"version": "",
"vdom": "",
"serial": "",
"results": [
{
"ipv6": "",
"source": "",
"created": "",
"ip_address": "",
"expires": ""
}
],
"build": "",
"http_method": "",
"status": "",
"path": ""
}
]
}

Output schema when you choose "Block Method" as "Policy Based":
{
"policy_name": "",
"srcaddr": [],
"dstaddr": [],
"addrgrp": [
{
"name": "",
"member": []
}
],
"addrgrp_not_exist": []
}

operation: Get Blocked Applications

Input parameters

Parameter Description
VDOM (Optional) VDOM on which you want to perform automated operations, i.e., the VDOM whose associated list of blocked applications you want to retrieve from Fortinet FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field.Ensure that the specified VDOM contains the required\"Application Control Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the Configuration Parameters while configuring this connector.

Output

The output contains the following populated JSON schema:
{
"id": "",
"name": "",
"risk": "",
"q_ref": "",
"q_name": "",
"q_path": "",
"q_type": "",
"vendor": "",
"weight": "",
"q_class": "",
"behavior": "",
"category": "",
"metadata": [
{
"id": "",
"metaid": "",
"valueid": "",
"q_origin_key": ""
}
],
"protocol": "",
"q_static": true,
"parameter": "",
"popularity": "",
"technology": "",
"q_mkey_type": "",
"q_no_rename": false,
"q_origin_key": "",
"sub-category": "",
"q_global_entry": ""
}

operation: Get Blocked URLs

Input parameters

Parameter Description
VDOM (Optional) VDOM on which you want to perform automated operations, i.e., the VDOM whose associated list of blocked URLs you want to retrieve from Fortinet FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. Ensure that the specified VDOM contains the required\"Web Filter Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the Configuration Parameters while configuring this connector.

Output

The output contains the following populated JSON schema:
{
"type": "",
"id": "",
"action": "",
"status": "",
"url": "",
"q_origin_key": "",
"exempt": "",
"referrer-host": "",
"web-proxy-profile": "",
"dns-address-family": ""
}

operation: Block IP Address

Input parameters

Parameter Description
Block Method Method to be used for blocking IP addresses using Fortinet FortiGate. You can choose from Quarantine Based or Policy Based. If you choose Quarantine Based, then you must specify the following parameters: IP Addresses: IP addresses that you want to block using Fortinet FortiGate, in the "CSV" or "list" format. For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2". Time to Live: Time till when the IP addresses will remain in the Block status. You can choose between the following options: 1 Hour, 6 Hour, 12 Hour, 1 Day, 6 Months, 1 Year, or Custom Time. Note: If you select Custom Time then the Time to Live (Seconds) field is displayed in which you must specify the Time to Live in seconds. VDOM: (Optional) VDOM that is used to block IP addresses. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format. If you choose Policy Base, then you must specify the following parameters: IPv4 Policy Name: Name of the IPv4 Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. Address Group Name: Name of the IP address group name that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section. IP Addresses: IP addresses that you want to block using Fortinet FortiGate in the "CSV" or "list" format. For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2". VDOM: (Optional) VDOM that are used to block IP address. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Quarantine Based'
  • IP Addresses: IP addresses that you want to block on the Fortinet FortiGate, in the CSV or list format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
  • Time to Live: Time till when the IP addresses are in the Block status.You can choose between the following options: 1 Hour, 6 Hour, 12 Hour, 1 Day, 6 Months, 1 Year, or Custom Time. Note: If you select Custom Time then the Time to Live (Seconds) field is displayed in which you must specify the Time to Live in seconds.
  • If you choose 'Custom Time'
    • Time to Live: User must specify the Time to Live in seconds.
  • VDOM: VDOM that is used to perform automated operations in provided VDOMs. Notes:- You can specify the VDOM here, as a configuration parameter, or you can also specify the VDOM as a function parameter.- You can provide VDOM in the CSV or the list format.
If you choose 'Policy Based'
  • Policy Name: Name of the Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
  • IP Type: IP Type that you want to block on the FortiOS server.You can choose between IPv4 and IPv6.
  • If you choose 'IPv4'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IP Address: IP addresses that you want to block using Fortinet FortiGate in the "CSV" or "list" format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
    If you choose 'IPv6'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IPv6 Address: IP addresses that you want to block on the FortiGate server, in the .csv or list format.For example, ff06::
  • VDOM: VDOM that is used to perform automated operations in provided VDOMs. Notes:- You can specify the VDOM here, as a configuration parameter, or you can also specify the VDOM as a function parameter. Provide only single VDOM.

Output

The output contains the following populated JSON schema:

Output schema when you choose "Block Method" as "Quarantine Based":
{
"newly_blocked": [],
"vdom_not_exist": [],
"already_blocked": [],
"error_with_block": []
}

Output schema when you choose "Block Method" as "Policy Based":
{
"already_blocked": [],
"newly_blocked": [],
"error_with_block": []
}

operation: Block Application

Input parameters

Parameter Description
Application Names List of application names that you want to block on Fortinet FortiGate. Application names must be in the list format if you want to block more than one application. For example, for a list of applications enter ["Application_Name1", "Application_Name2"] in this field. For a single application enter Application_Name. Note: You can retrieve application names using the Get Application Details action.
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated applications you want to block in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Application Control Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"name": "",
"status": "",
"message": ""
}

operation: Block URL

Input parameters

Parameter Description
URL List of URLs that you want to block on Fortinet FortiGate. URLs must be in the list format if you want to block more than one URL. For example, for a list of URLs, enter:[\"URL1\", \"URL2\"] in this field. For a single URL enter: /'example.com/'
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated URLs you want to block in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Web Filter Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"already_blocked": [],
"newly_blocked": [],
"not_block": []
}

operation: Unblock IP Address

Input parameters

Parameter Description
Unblock Method Method to be used for unblocking IP addresses using Fortinet FortiGate. You can choose from Quarantine Based or Policy Based.If you choose Quarantine Based, then you must specify the following parameters:IP Addresses: IP addresses that you want to unblock using Fortinet FortiGate, in the "CSV" or "list" format. For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".VDOM: (Optional) VDOM that is used to unblock IP addresses. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format If you choose Policy Based, then you must specify the following parameters:IPv4 Policy Name: Name of the IP Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter default in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.IP Addresses: IP addresses that you want to unblock using Fortinet FortiGate in the "CSV" or "list" format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".VDOM: (Optional) VDOM that is used to unblock IP addresses. The VDOMs that you specify here will overwrite the VDOM(s) that you have specified as Configuration parameters. You can specify VDOM in the "CSV" or "list" format.
If you choose 'Quarantine Based'
  • IP Addresses: IP addresses that you want to unblock from the Fortinet FortiGate in the CSV or list format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
If you choose 'Policy Based'
  • Policy Name: Name of the IPv4 Policy that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. Based on our example, enter FortiSOAR_Blocked_Policy in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
  • IP Type: IP Type that you want to unblock on the FortiOS server. You can choose between IPv4 and IPv6.
  • If you choose 'IPv4'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IP Address: IP addresses that you want to unblock using Fortinet FortiGate in the "CSV" or "list" format.For example, ["1.1.1.1", "2.2.2.2"] or "1.1.1.1", "2.2.2.2".
    If you choose 'IPv6'
    • Address Group Name: Name of the IP address group name, that you have specified in Fortinet FortiGate for blocking or unblocking IP addresses. User can specify source or destination address group name. Based on our example, enter Blocked_IPs in this field. See the Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate section.
    • IPv6 Address: IP addresses that you want to unblock from the FortiGate server, in the .csv or list format.For example, ff06::/120
VDOM VDOM that is used to perform automated operations in provided VDOMs. Notes:- You can specify the VDOM here, as a configuration parameter, or you can also specify the VDOM as a function parameter.

Output

The output contains the following populated JSON schema:

Output schema when you choose "Unblock Method" as "Quarantine Based":
{
"newly_unblocked": [],
"ip_not_exist": [],
"vdom_not_exist": [],
"error_with_unblock": []
}

Output schema when you choose "Unblock Method" as "Policy Based":
{
"not_exist": [],
"newly_unblocked": [],
"error_with_unblock": []
}

operation: Unblock Application

Input parameters

Parameter Description
Application Names List of application names that you want to block on Fortinet FortiGate. Application names must be in the list format if you want to unblock more than one application. For example, for a list of applications enter ["Application_Name1", "Application_Name2"] in this field. For a single application enter Application_Name.
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated applications you want to unblock in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Application Control Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"name": "",
"status": "",
"message": ""
}

operation: Unblock URL

Input parameters

Parameter Description
URL List of URLs that you want to unblock on Fortinet FortiGate. URLs must be in the list format if you want to unblock more than one URL. For example, for a list of URLs, enter:[\"URL1\", \"URL2\"] in this field. For a single URL enter: /'example.com/'
VDOM (Optional) VDOM on which you want to perform automated operations i.e, the VDOM whose associated URLs you want to unblock in FortiGate. The VDOM mode should be enabled and you can specify only a single VDOM value in this field. You can specify the VDOM here as a configuration parameter or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. Ensure that the specified VDOM contains the required\"Web Filter Profile Name\"to execute the action. Note: The VDOM value that you specify in this field overwrites the VDOM(s) values that you have specified in the 'Configuration Parameters'.

Output

The output contains the following populated JSON schema:
{
"not_exist": [],
"newly_unblocked": [],
"not_unblock": []
}

operation: Quarantine Host

Input parameters

Parameter Description
MAC Address List of MAC addresses of the hosts you want to quarantine on Fortinet FortiGate. For example, 00:15:00:e8:27:25 or ['00:15:00:e8:27:25', '00:15:00:e8:27:26']
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"already_quarantine": [],
"newly_quarantine": [],
"not_quarantine": []
}

operation: Unquarantine Host

Input parameters

Parameter Description
MAC Address List of MAC addresses of the hosts whose entries you want to remove from the quarantine on Fortinet FortiGate. For example, 00:15:00:e8:27:25 or ['00:15:00:e8:27:25', '00:15:00:e8:27:26']
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"not_exist": [],
"newly_unquarantine": [],
"not_unquarantine": []
}

operation: Get Quarantine Hosts

Input parameters

Parameter Description
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"results": {
"targets": [
{
"macs": [
{
"mac": "",
"drop": "",
"parent": "",
"entry-id": "",
"description": "",
"q_origin_key": ""
}
],
"entry": "",
"description": "",
"q_origin_key": ""
}
],
"quarantine": "",
"traffic-policy": "",
"firewall-groups": ""
},
"version": "",
"revision": "",
"http_method": "",
"http_status": ""
}

operation: Create Address

Input parameters

Parameter Description
Address Category Select address category you wants to create
If you choose 'IPv4 Address'
  • Address Name: The name of the address that you want to create in Fortinet FortiGate
  • Type: Type of address
  • If you choose 'Subnet'
    • IP/Netmask: IP address or Netmask name of the address that you want to create in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable.
    If you choose 'IP Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable
    If you choose 'FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to create in Fortinet FortiGate
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable.
    If you choose 'Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to create in Fortinet FortiGate.
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • Comments: (Optional) Comment to be added to the address that you want to create in Fortinet FortiGate.
If you choose 'IPv6 Address'
  • Address Name: The name of the address that you want to create in Fortinet FortiGate
  • Type: Type of address
  • If you choose 'IPv6 Subnet'
    • IPv6 Address: IP address or Netmask name of the address that you want to create in Fortinet FortiGate.
    If you choose 'IPv6 Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to create in Fortinet FortiGate.
    If you choose 'IPv6 FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to create in Fortinet FortiGate
    If you choose 'IPv6 Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to create in Fortinet FortiGate.
    If you choose 'IPv6 Fabric Connector Address'
    • SDN Connector: Enter SDN Connector name
    If you choose 'IPv6 Template'
    • IPv6 Address Template: Enter IPv6 Address Template
    • Host Type: Select host type
    • If you choose 'Specific'
      • Host: Enter IPv6 Host address
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • Comments: (Optional) Comment to be added to the address that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Get Addresses

Input parameters

Parameter Description
Address Category Select address type whose details you want to retrieve from Fortinet FortiGate.
Address Name The name of the address whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"uuid": "",
"subnet": "",
"type": "",
"sub-type": "",
"clearpass-spt": "",
"start-mac": "",
"end-mac": "",
"country": "",
"cache-ttl": "",
"sdn": "",
"fsso-group": [],
"interface": "",
"obj-type": "",
"comment": "",
"associated-interface": "",
"color": "",
"filter": "",
"sdn-addr-type": "",
"obj-id": "",
"list": [],
"tagging": [],
"allow-routing": "",
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"mkey": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Address

Input parameters

Parameter Description
Address Category Select address category you wants to update
If you choose 'IPv4 Address'
  • Address Name: The name of the address that you want to update in Fortinet FortiGate.
  • Type: Select Type of address which you wants to update
  • If you choose 'Subnet'
    • IP/Netmask: IP address or Netmask name of the address that you want to update in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable
    If you choose 'IP Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable
    If you choose 'FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to update in Fortinet FortiGate.
    • Static Route Configuration: Select the Enable option to enable usage of this address in the static route configuration, else select Disable.
    If you choose 'Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to update in Fortinet FortiGate.
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to update in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to update in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to update in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • New Address Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address that you want to update in Fortinet FortiGate.
If you choose 'IPv6 Address'
  • Address Name: The name of the address that you want to update in Fortinet FortiGate.
  • Type: Type of address
  • If you choose 'IPv6 Subnet'
    • IPv6 Address: IP address or Netmask name of the address that you want to update in Fortinet FortiGate.
    If you choose 'IPv6 Range'
    • Start IP: Starting (First) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    • End IP: Ending (Final) IP address (inclusive) in the range for the address to be added to the address that you want to update in Fortinet FortiGate.
    If you choose 'IPv6 FQDN'
    • FQDN: Fully Qualified Domain Name address of the address that you want to update in Fortinet FortiGate
    If you choose 'IPv6 Geography'
    • Country/Region: Select the country whose IP addresses you want to associate with the address that you want to update in Fortinet FortiGate.
    If you choose 'IPv6 Fabric Connector Address'
    • SDN Connector: Enter SDN Connector name
    If you choose 'IPv6 Template'
    • IPv6 Address Template: Enter IPv6 Address Template
    • Host Type: Select host type
    • If you choose 'Specific'
      • Host: Enter Host
    If you choose 'Device (MAC Address)'
    • MAC Address Scope: Select option forMAC Address Scope
    • If you choose 'Single Address'
      • MAC Address: MAC Address that you want to add to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      If you choose 'Address Range'
      • Starting MAC: Starting (First) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:25
      • Ending MAC: Ending (Final) MAC address in the range for the address to be added to the address that you want to create in Fortinet FortiGate. For example, 00:15:00:e8:27:27
  • New Address Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Delete Address

Input parameters

Parameter Description
Address Category Select address type that you want to delete from Fortinet FortiGate.
Address Name Address name to delete
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Create Address Group

Input parameters

Parameter Description
Address Group Category Select address group category to create group
If you choose 'IPv4 Group'
  • Group Name: Name of address group that you want to create in Fortinet FortiGate
  • Members: List of IP address names to add to the address group you want to create in Fortinet FortiGate.
  • Type: Type of address group that you want to create in Fortinet FortiGate. You can choose between Group or Folder.Group: This is the default address group type (address might belong to multiple groups).Folder: The address folder group (members cannot belong to any other group).
  • Exclude: Select this checkbox, i.e., set it to True, to enable address exclusion. If you select this checkbox, then in the Exclude Members field, specify the list of IP addresses or URLs that you want to add to the exclusion list in Fortinet FortiGate.
  • If you choose 'true'
    • Exclude Members: List of IP address names/URL names to add into exclusion list
  • Comments: (Optional) Comment to be added to the address group that you want to create in Fortinet FortiGate.
  • Static Route Configuration: Select the Enable option to enable usage of this address group in the static route configuration, else select Disable
If you choose 'IPv6 Group'
  • Group Name: Name of address group that you want to create in Fortinet FortiGate
  • Members: List of IP address names to add to the address group you want to create in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address group that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get Address Groups

Input parameters

Parameter Description
Address Group Category Select address group type whose details you want to retrieve from Fortinet FortiGate.
Address Group Name The name of the address group whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"type": "",
"uuid": "",
"member": [
{
"name": "",
"q_origin_key": ""
},
{
"name": "",
"q_origin_key": ""
},
{
"name": "",
"q_origin_key": ""
}
],
"comment": "",
"exclude": "",
"exclude-member": [],
"color": "",
"tagging": [],
"allow-routing": "",
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"mkey": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Address Group

Input parameters

Parameter Description
Address Group Category Select address group category to update group
If you choose 'IPv4 Group'
  • Group Name: Name of address group that you want to update in Fortinet FortiGate.
  • New Group Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate
  • Add Members: List of IP address names to add to the address group you want to update in Fortinet FortiGate.
  • Remove Members: List of IP address names to remove from the address group you want to update in Fortinet FortiGate.
  • Exclude: Enable/disable address exclusion.
  • If you choose 'true'
    • Add Exclude Members: Specify the list of IP address names that you want to add to the exclusion list in Fortinet FortiGate
    • Remove Exclude Members: Specify the list of IP address names that you want to remove from the exclusion list in Fortinet FortiGate
  • Comments: (Optional) Comment to be added to the address group that you want to update in Fortinet FortiGate.
  • Static Route Configuration: Select the Enable option to enable usage of this address group in the static route configuration, else select Disable.
If you choose 'IPv6 Group'
  • Group Name: Name of address group that you want to update in Fortinet FortiGate.
  • New Group Name: (Optional) Specify a new name for the address if you want to update its name in Fortinet FortiGate
  • Add Members: List of IP address names to add to the address group you want to update in Fortinet FortiGate.
  • Remove Members: List of IP address names to remove from the address group you want to update in Fortinet FortiGate.
  • Comments: (Optional) Comment to be added to the address group that you want to update in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Address Group

Input parameters

Parameter Description
Address Group Category Select address group type that you want to delete from Fortinet FortiGate.
Address Group Name Name of address group that you want to delete from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Create Service

Input parameters

Parameter Description
Name Name of the service that you want to create in Fortinet FortiGate.
Category Category of the service that you want to create in Fortinet FortiGate. For example, Email, Authentication, General, Remote Access, etc.
Protocol Protocol type based on IANA numbers.
If you choose 'TCP/UDP/SCTP'
  • Address: Type of address to associate with the service that you want to create in Fortinet FortiGate. You can choose from IP Range or FQDN
  • If you choose 'IP Range'
    • IP Range: specify the starting and ending IP addresses that constitute the IP range associated with the service. For example, 0.0.0.0-0.0.0.10
    If you choose 'FQDN'
    • FQDN: Specify the Fully qualified domain name associated with the service
  • TCP Port Range: Specify multiple TCP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'TCP Port Low-TCP Port High:Source Port Low-Source Port High'
  • UDP Port Range: Multiple UDP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'UDP Port Low-UDP Port High:Source Port Low-Source Port High'
  • SCTP Port Range: Multiple SCTP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'SCTP Port Low-SCTP Port High:Source Port Low-Source Port High'
If you choose 'ICMP'
  • Type: Type of ICMP to associate with the service that you want to create in Fortinet FortiGate.
  • Code: ICMP Code to associate with the service that you want to create in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'ICMP6'
  • Type: Type of ICMP6 to associate with the service that you want to create in Fortinet FortiGate.
  • Code: ICMP6 Code to associate with the service that you want to create in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'IP'
  • Protocol Number: Protocol Number of the IP you want to associate with the service to be created in Fortinet FortiGate. Maximum: 254 Minimum: 0
Comments (Optional) Comment to be added to the service that you want to create in Fortinet FortiGate.
Show in Service List Select the Enable option to enable the visibility of the service on the GUI, else select Disable.
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get Services

Input parameters

Parameter Description
Name The name of the service whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"proxy": "",
"category": "",
"protocol": "",
"helper": "",
"iprange": "",
"fqdn": "",
"tcp-portrange": "",
"udp-portrange": "",
"sctp-portrange": "",
"tcp-halfclose-timer": "",
"tcp-halfopen-timer": "",
"tcp-timewait-timer": "",
"udp-idle-timer": "",
"session-ttl": "",
"check-reset-range": "",
"comment": "",
"color": "",
"visibility": "",
"app-service-type": "",
"app-category": [],
"application": [],
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"mkey": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Service

Input parameters

Parameter Description
Name Name of the service that you want to update in Fortinet FortiGate.
New Name (Optional) Specify a new name for the service if you want to update its name in Fortinet FortiGate.
Category Category of the service that you want to create in Fortinet FortiGate. For example, Email, Authentication, General, Remote Access, etc.
Protocol Protocol type based on IANA numbers.
If you choose 'TCP/UDP/SCTP'
  • Address: Type of address to associate with the service that you want to update in Fortinet FortiGate. You can choose from IP Range or FQDN
  • If you choose 'IP Range'
    • IP Range: Start and end of the IP range associated with service. E.g. 0.0.0.0-0.0.0.10
    If you choose 'FQDN'
    • FQDN: Specify the Fully qualified domain name associated with the service.
  • TCP Port Range: Multiple TCP port ranges. e.g 0-22:55-75 55-77:88-100 in the format of 'TCP Port Low-TCP Port High:Source Port Low-Source Port High'
  • UDP Port Range: UDP Port Range: Multiple UDP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'UDP Port Low-UDP Port High:Source Port Low-Source Port High'
  • SCTP Port Range: Multiple SCTP port ranges associated with the service. For example, 0-22:55-75 55-77:88-100 in the format of 'SCTP Port Low-SCTP Port High:Source Port Low-Source Port High'
If you choose 'ICMP'
  • Type: Type of ICMP to associate with the service that you want to update in Fortinet FortiGate.
  • Code: ICMP Code to associate with the service that you want to update in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'ICMP6'
  • Type: Type of ICMP6 to associate with the service that you want to update in Fortinet FortiGate.
  • Code: ICMP6 Code to associate with the service that you want to update in Fortinet FortiGate. Maximum: 255 Minimum: 0
If you choose 'IP'
  • Protocol Number: Protocol Number of the IP you want to associate with the service to be updated in Fortinet FortiGate. Maximum: 254 Minimum: 0
Comments (Optional) Comment to be added to the service that you want to update in Fortinet FortiGate.
Show in Service List Enable/disable the visibility of the service on the GUI.
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Service

Input parameters

Parameter Description
Name Name of the service that you want to delete from Fortinet FortiGate
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Create Service Group

Input parameters

Parameter Description
Name Name of service group that you want to create in Fortinet FortiGate.
Members List of members to add to the service group you want to create in Fortinet FortiGate.
Comments (Optional) Comment to be added to the service group that you want to create in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get Service Groups

Input parameters

Parameter Description
Name The name of the service group whose details you want to retrieve from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"results": [
{
"name": "",
"q_origin_key": "",
"proxy": "",
"member": [
{
"name": "",
"q_origin_key": ""
}
],
"comment": "",
"color": "",
"fabric-object": ""
}
],
"vdom": "",
"path": "",
"name": "",
"status": "",
"http_status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Update Service Group

Input parameters

Parameter Description
Name Name of the service group that you want to update in Fortinet FortiGate.
New Name (Optional) Specify a new name for the service group if you want to update its name in Fortinet FortiGate.
Add Members List of members to add to the service group you want to update in Fortinet FortiGate.
Remove Members List of members to remove from the service group you want to update in Fortinet FortiGate.
Comments (Optional) Comment to be added to the service group that you want to update in Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Service Group

Input parameters

Parameter Description
Name Name of the service group that you want to delete from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Create Policy

Input parameters

Parameter Description
Policy Name Name of policy that you want to create in Fortinet FortiGate
Incoming Interface Names of incoming interface associated with the policy that you want to create in Fortinet FortiGate. For example port1.
Outgoing Interface Names of outgoing interface associated with the policy that you want to create in Fortinet FortiGate. For example port2.
Source Source IPv4 address and address group names associated with the policy that you want to create in Fortinet FortiGate.
Destination Destination IPv4 address and address group names associated with the policy that you want to create in Fortinet FortiGate.
Service Service and service group names associated with the policy that you want to create in Fortinet FortiGate.
Schedule Name of the Schedule associated with the policy that you want to create in Fortinet FortiGate.
Status Select the Enable option to enable this policy on Fortinet FortiGate, else select Disable.
Action Policy action (Accept/deny).Accept:Allows session that match the firewall policy. Deny:Blocks sessions that match the firewall policy.
If you choose 'Accept'
  • Inspection Mode: The inspection mode of the policy. You can choose between the Flow Based (default) or Proxy Based
  • NAT: Select the checkbox, i.e., set it to true, to enable NAT
  • If you choose 'true'
    • IP Pool Configuration: Select IP pool configuration
    • If you choose 'Use Dynamic IP Pool'
      • Pool Name: Enter pool names in csv or list format
    • Preserve Source Port: Enable to prevent source NAT from changing a session's source port
  • Protocol Options: Name of an existing Protocol options profile.
  • Security Profiles: Select security profiles to enable it
  • If you choose 'AntiVirus'
    • Antivirus Profile: Name of an existing Antivirus profile.
    If you choose 'Web Filter'
    • Web Filter Profile: Name of an existing Web filter profile.
    If you choose 'DNS Filter'
    • DNS Filter Profile: Name of an existing DNS filter profile.
    If you choose 'Application Control'
    • Application Control: Name of an existing Application list.
    If you choose 'IPS'
    • IPS Sensor: Name of an existing IPS sensor.
    If you choose 'File Filter'
    • File Filter Profile: Name of an existing file-filter profile.
    If you choose 'SSL Inspection'
    • SSL Inspection Profile: Name of an existing SSL SSH profile.
  • Log Traffic: Enable or disable logging. Log all sessions or security profile sessions.All:Log all sessions accepted or denied by this policy. UTM:Log traffic that has a security profile applied to it. Disable:Disable all logging for this policy.
Comments (Optional) Comment to be added to the policy that you want to update in Fortinet FortiGate
Additional Policy Arguments (Optional) Specify policy arguments in that JSON format to be added to the policy that you want to update in Fortinet FortiGate. You can enter the arguments in the following format: {"field1":value1, "field2":value2}
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get List of Policies

Input parameters

Parameter Description
Policy ID Policy ID to get its details
VDOM (Optional) VDOM on which you want to perform automated operations,.ie, the VDOM whose associated list of policies you want to retrieve from FortiGate. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"result": [
{
"status": "",
"path": "",
"revision": "",
"name": "",
"http_method": "",
"vdom": "",
"http_status": "",
"version": "",
"build": "",
"serial": "",
"results": [
{
"logtraffic": "",
"srcaddr": [
{
"q_origin_key": "",
"name": ""
}
],
"dstintf": [
{
"q_origin_key": "",
"name": ""
}
],
"label": "",
"scan-botnet-connections": "",
"action": "",
"capture-packet": "",
"ips-sensor": "",
"tcp-session-without-syn": "",
"av-profile": "",
"policyid": "",
"diffserv-reverse": "",
"dnsfilter-profile": "",
"send-deny-packet": "",
"profile-protocol-options": "",
"app-category": [],
"vlan-cos-fwd": "",
"diffserv-forward": "",
"wanopt-passive-opt": "",
"tags": [],
"custom-log-fields": [],
"voip-profile": "",
"users": [],
"srcintf": [
{
"q_origin_key": "",
"name": ""
}
],
"learning-mode": "",
"timeout-send-rst": "",
"wsso": "",
"fsso": "",
"spamfilter-profile": "",
"traffic-shaper-reverse": "",
"url-category": [],
"block-notification": "",
"rsso": "",
"internet-service": "",
"internet-service-custom": [],
"webfilter-profile": "",
"dsri": "",
"auth-cert": "",
"ssl-mirror": "",
"groups": [],
"diffservcode-forward": "",
"internet-service-id": [],
"firewall-session-dirty": "",
"tcp-mss-sender": "",
"dstaddr-negate": "",
"outbound": "",
"rtp-nat": "",
"dscp-value": "",
"profile-type": "",
"wccp": "",
"inbound": "",
"ssl-mirror-intf": [],
"service": [
{
"q_origin_key": "",
"name": ""
}
],
"webcache": "",
"service-negate": "",
"wanopt": "",
"dscp-negate": "",
"profile-group": "",
"status": "",
"q_origin_key": "",
"tcp-mss-receiver": "",
"rtp-addr": [],
"nat": "",
"utm-status": "",
"poolname": [],
"fsso-agent-for-ntlm": "",
"delay-tcp-npu-session": "",
"ntlm": "",
"permit-stun-host": "",
"vpntunnel": "",
"devices": [],
"schedule": "",
"permit-any-host": "",
"global-label": "",
"icap-profile": "",
"dlp-sensor": "",
"identity-based-route": "",
"logtraffic-start": "",
"redirect-url": "",
"session-ttl": "",
"diffservcode-rev": "",
"auth-path": "",
"disclaimer": "",
"application": [],
"name": "",
"wanopt-profile": "",
"schedule-timeout": "",
"internet-service-negate": "",
"traffic-shaper": "",
"ippool": "",
"wanopt-detection": "",
"natoutbound": "",
"webcache-https": "",
"fixedport": "",
"application-list": "",
"waf-profile": "",
"dstaddr": [
{
"q_origin_key": "",
"name": ""
}
],
"comments": "",
"srcaddr-negate": "",
"replacemsg-override-group": "",
"uuid": "",
"vlan-cos-rev": "",
"radius-mac-auth-bypass": "",
"wanopt-peer": "",
"natip": "",
"per-ip-shaper": "",
"dscp-match": "",
"ntlm-enabled-browsers": [],
"ntlm-guest": "",
"natinbound": "",
"captive-portal-exempt": "",
"match-vip": "",
"ssl-ssh-profile": "",
"auth-redirect-addr": ""
}
]
}
],
"vdom_not_exist": []
}

operation: Update Policy

Input parameters

Parameter Description
Policy ID Policy ID which you wants to update
Policy Name Policy name to update
Status Enable or disable this policy.
Incoming Interface Incoming Interface names
Outgoing Interface Outgoing Interface names
Add Source Source IPv4 addresses and address group names to add
Remove Source Source IPv4 addresses and address group names to remove
Add Destination Destination IPv4 addresses and address group names to add
Remove Destination Destination IPv4 address and address group names to remove
Add Services Service and service group names to add
Remove Services Service and service group names to remove
Schedule Schedule name.
Action Policy action (Accept/deny).Accept:Allows session that match the firewall policy. Deny:Blocks sessions that match the firewall policy.
If you choose 'Accept'
  • Inspection Mode: Policy inspection mode (Flow Based/Proxy Based). Default is Flow Based mode. Proxy Based:Proxy based inspection.flow:Flow based inspection.
  • NAT: Enable/disable source NAT.
  • If you choose 'true'
    • IP Pool Configuration: Select IP pool configuration
    • If you choose 'Use Dynamic IP Pool'
      • Pool Name: Enter pool names in csv or list format
    • Preserve Source Port: Enable to prevent source NAT from changing a session's source port
  • Protocol Options: Name of an existing Protocol options profile.
  • Security Profiles: Select security profiles to enable it
  • If you choose 'AntiVirus'
    • Antivirus Profile: Name of an existing Antivirus profile.
    If you choose 'Web Filter'
    • Web Filter Profile: Name of an existing Web filter profile.
    If you choose 'DNS Filter'
    • DNS Filter Profile: Name of an existing DNS filter profile.
    If you choose 'Application Control'
    • Application Control: Name of an existing Application list.
    If you choose 'IPS'
    • IPS Sensor: Name of an existing IPS sensor.
    If you choose 'File Filter'
    • File Filter Profile: Name of an existing file-filter profile.
    If you choose 'SSL Inspection'
    • SSL Inspection Profile: Name of an existing SSL SSH profile.
  • Disable Security Profiles: Select security profiles to disable it
  • Log Traffic: Enable or disable logging. Log all sessions or security profile sessions.All:Log all sessions accepted or denied by this policy. UTM:Log traffic that has a security profile applied to it. Disable:Disable all logging for this policy.
Comments Add comment for policy.
Additional Policy Arguments Specify policy arguments in JSON format which you wants to update. You can enter the arguments in the following format: {"field1":value1, "field2":value2}.
VDOM (Optional) VDOM on which you want to perform automated operations. Notes: You can specify VDOMs,as a configuration parameter, or you can also specify VDOM here, as an input parameter. You can specify VDOMs in the "CSV" or "list" format if the VDOM mode is enabled. By default, VDOM is set to root.

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"revision": "",
"revision_changed": "",
"old_revision": "",
"mkey": "",
"status": "",
"http_status": "",
"vdom": "",
"path": "",
"name": "",
"serial": "",
"version": "",
"build": ""
}

operation: Delete Policy

Input parameters

Parameter Description
Policy ID ID of policy that you want to delete from Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Execute Command

Input parameters

Parameter Description
Commands Specify the command that you want to execute on the FortiOS console. You can provide commands in the .csv or the list format.
Username The username to access the FortiOS endpoint server to which you will connect and execute the specified command.
Password The password to access the FortiOS endpoint server to which you will connect and execute the specified command
Private Key The private Key used to perform SSH authentication on the FortiOS server.
Port The port number used for connecting to the FortiOS server via SSH. By default, this is set to 22.
Timeout Time, in seconds, after which the execution of the remote command gets timed out

Output

The output contains the following populated JSON schema:
{
"command": "",
"output": []
}

operation: Create User

Input parameters

Parameter Description
User Type Select user type based on which you wants to create new user
If you choose 'Local User'
  • Username: Specify the username for the user that you want to create in the Fortinet FortiGate server
  • Password: Specify the password for the user that you want to create in the Fortinet FortiGate server
If you choose 'Remote Radius User'
  • Username: Specify the username for the user that you want to create in the Fortinet FortiGate server
  • Radius Server: Specify the name of the RADIUS server using which the user gets authenticated
If you choose 'Remote TACACS+ User'
  • Username: Specify the username for the user that you want to create in the Fortinet FortiGate server
  • TACACS+ Server: Specify the name of the TACACS+ server using which the user gets authenticated.
Two Factor Authentication Select whether you want to Enable or Disable two-factor authentication for the user you are creating in Fortinet FortiGate
If you choose 'Enable'
  • Authentication Type: Select the type of two-factor authentication for the user you are creating in Fortinet FortiGate. You can choose between FortiToken or FortiToken Cloud.
  • If you choose 'FortiToken'
    • Token: Enter the token name used to authenticate the user
    • Send Activation Code: Select whether you want to Enable or Disable sending of an activation code for two-factor authentication
    • If you choose 'Enable'
      • Activation Method: Select the method of sending the activation code. You can choose between Email or SMS.
  • Email Address: Enter email address of new user
  • SMS: Select whether you want to Enable or Disable SMS-based two-factor authentication for the user
  • If you choose 'Enable'
    • Country Dial Code: Select whether you want to Enable or Disable SMS-based two-factor authentication for the user
    • Phone Number: Enter the mobile phone number of the user for two-factor authentication.
User Account Status Select the account status of the user you are creating on Fortinet FortiGate. You can choose between Enable or Disable.
User Group Select the group that you want to assign to the user you are creating on Fortinet FortiGate. You can choose between Enable or Disable. If you choose 'Enable', then in the User Group Names field specify the group names, in CSV or in list format, that you want to assign to the user you are creating on Fortinet FortiGate.
If you choose 'Enable'
  • User Group Names: Enter the user group name in csv or in list format
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Get Users

Input parameters

Parameter Description
Name Specify the name of the user for whom you want to retrieve data from the Fortinet FortiGate server
Start Specify the starting entry index from where you want to retrieve users from the Fortinet FortiGate server.
Count Specify the maximum number of users to return.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"results": [
{
"id": "",
"name": "",
"type": "",
"q_ref": "",
"passwd": "",
"q_name": "",
"q_path": "",
"q_type": "",
"status": "",
"q_class": "",
"email-to": "",
"q_static": "",
"css-class": "",
"q_no_edit": "",
"sms-phone": "",
"fortitoken": {
"datasource": "",
"q_origin_key": "",
"serial-number": ""
},
"ppk-secret": "",
"sms-server": "",
"two-factor": "",
"authtimeout": "",
"ldap-server": "",
"passwd-time": "",
"q_mkey_type": "",
"q_no_rename": "",
"workstation": "",
"ppk-identity": "",
"q_origin_key": "",
"passwd-policy": "",
"radius-server": "",
"q_global_entry": "",
"tacacs+-server": {
"name": "",
"datasource": "",
"q_origin_key": ""
},
"sms-custom-server": "",
"auth-concurrent-value": "",
"two-factor-notification": "",
"auth-concurrent-override": "",
"two-factor-authentication": "",
"username-case-sensitivity": ""
}
],
"version": "",
"revision": "",
"http_method": "",
"http_status": ""
}

operation: Update User

Input parameters

Parameter Description
User Type Select user type based on which you wants to update an user
If you choose 'Local User'
  • Username: Specify the existing username that you want to edit in the Fortinet FortiGate server.
  • New Username: Specify the new username for the user that you want to update in the Fortinet FortiGate server.
  • Password: Specify a new password if you want to edit the password in the Fortinet FortiGate server
If you choose 'Remote Radius User'
  • Username: Specify the existing username that you want to edit in the Fortinet FortiGate server.
  • New Username: Specify the new username for the user that you want to update in the Fortinet FortiGate server.
  • Radius Server: Specify the name of the RADIUS server using which the user gets authenticated.
If you choose 'Remote TACACS+ User'
  • Username: Specify the existing username that you want to edit in the Fortinet FortiGate server.
  • New Username: Specify the new username for the user that you want to update in the Fortinet FortiGate server.
  • TACACS+ Server: Specify the name of the TACACS+ server using which the user gets authenticated
Two Factor Authentication Select whether you want to Enable or Disable two-factor authentication for the user you want to update in Fortinet FortiGate.
Authentication Type Select the type of two-factor authentication for the user you want to update in Fortinet FortiGate. You can choose between FortiToken or FortiToken Cloud. You must specify the authentication type parameter when you are enabling two-factor authentication
Token Enter the Fortitoken used to authenticate the user for two-factor authentication. This is required if you select the authentication type as 'FortiToken'.
Send Activation Code Select whether you want to Enable or Disable sending of an activation code for two-factor authentication. If you choose 'Enable', then from the Activation Method drop-down list, select the method of sending the activation code. You can choose between Email or SMS.
If you choose 'Enable'
  • Activation Method: Select the method of sending the activation code. You can choose between Email or SMS.
Email Address Enter the email address of the user you want to update in Fortinet FortiGate. You must specify either the email address or sms details to activate two factor authentication.
SMS uired to activate two factor authentication.
If you choose 'Enable'
  • Country Dial Code: Enter the country code of the user for two-factor authentication.
  • Phone Number: Enter the mobile phone number of the user for two-factor authentication.
User Account Status Select the account status of the user you are updating on Fortinet FortiGate. You can choose between Enable or Disable.
User Group Names To Add Enter the user group names to add user into the input user group names, in csv or list format
User Group Names To Remove Enter the user group names, in the CSV or list format, from which you want to remove the user you are updating on Fortinet FortiGate.
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"revision_changed": ""
}

operation: Delete User

Input parameters

Parameter Description
Name Specify the name of the user that you want to delete from Fortinet FortiGate
VDOM (Optional) Specify the Virtual Domain(s) from which results are returned or to which you want to apply these changes. Note: You can specify the VDOM here as a configuration parameter, in the CSV or List format, or you can specify VDOMs as a function parameter, i.e., in the 'Configuration Parameters' while configuring this connector. If both are specified, then the one that is specified in this operation will overwrite the one specified in the configuration parameters. If this parameter is not provided, the management VDOM will be used. If the admin does not have access to the VDOM, a permission error will be returned. You must specify the parameter from one of the following: vdom=root (Single VDOM), vdom=vdom1,vdom2 (Multiple VDOMs), vdom=* (All VDOMs).

Output

The output contains the following populated JSON schema:
{
"mkey": "",
"name": "",
"path": "",
"vdom": "",
"build": "",
"serial": "",
"status": "",
"version": "",
"revision": "",
"http_method": "",
"http_status": "",
"old_revision": "",
"revision_changed": ""
}

operation: Get System Events

Input parameters

Parameter Description
Filter Query Specify the query using which you want to filter system events that you want to retrieve from the Fortinet FortiGate server. For example, user=*"admin", level=*"emergency"
Start Specify the starting entry index from where you want to retrieve data from the Fortinet FortiGate server
Rows Specify the maximum number of items to return

Output

The output contains the following populated JSON schema:
{
"http_method": "",
"results": [
{
"date": "",
"time": "",
"eventtime": "",
"tz": "",
"logid": "",
"type": "",
"subtype": "",
"level": "",
"vd": "",
"logdesc": "",
"user": "",
"action": "",
"msg": "",
"_metadata": {
"#": "",
"logid": "",
"timestamp": "",
"roll": ""
}
}
],
"vdom": "",
"device": "",
"category": "",
"subcategory": "",
"start": "",
"rows": "",
"session_id": "",
"completed": "",
"total_lines": "",
"now": "",
"status": "",
"serial": "",
"version": "",
"build": ""
}

operation: Get User Last Login Details

Input parameters

Parameter Description
Username Specify the username whose last login details you want to retrieve from the Fortinet FortiGate server.

Output

The output contains the following populated JSON schema:
{
"date": "",
"time": "",
"eventtime": "",
"tz": "",
"logid": "",
"type": "",
"subtype": "",
"level": "",
"vd": "",
"logdesc": "",
"sn": "",
"user": "",
"ui": "",
"method": "",
"srcip": "",
"dstip": "",
"action": "",
"status": "",
"reason": "",
"profile": "",
"msg": "",
"_metadata": {
"#": "",
"logid": "",
"timestamp": "",
"roll": ""
}
}

Included playbooks

The Sample - Fortinet FortiGate - 5.2.2 playbook collection comes bundled with the Fortinet FortiGate connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOARTM after importing the Fortinet FortiGate connector.

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection, since the sample playbook collection gets deleted during connector upgrade and delete.

Blocking or Unblocking IP addresses, URLs, or applications in Fortinet FortiGate

  1. Log on to the Fortinet FortiGate server with the necessary credentials.
  2. To block or unblock an IP address, you must create a policy for IP addresses on the Fortinet FortiGate server. The following steps define the process of adding a policy:
    1. In Policy & Objects, click Addresses to create an address group with the following conditions:
      • Category = IPv4 Group
      • Group Name = Blocked_IPs
      • Type = Group
      • Member = none
    2. NOTE: You can create different address groups for source and destination.
      For more information on creating address groups and address group exclusions, see the FortiOS 7.2.3 Address Group Exclusion.
      NOTE: For IPv6 addresses, you can specify the Category as IPv6 Group.
    3. In Policy & Objects, click Firewall Policy to create a policy for IPv4 with the following conditions:
      • Name = FortiSOAR_Blocked_Policy
      • Source = Blocked_IPs
      • Destination = Blocked_IPs
      • Schedule = always
      • Service = ALL
      • Action = DENY
      • Enable this policy = Enable
    4. In Policy & Objects, click Firewall Policy and enter the firewall policy name as the Action parameter. For our example, we have named this as FortiSOAR_Blocked_Policy. When you are configuring your Fortinet FortiGate connector in FortiSOAR™, you must use the policy name that you have specified in this step as your Policy Name action parameter.
      For more information on the firewall policy, see Firewall Policy in the FortiOS documentation.
  3. To block or unblock a URL, you must create a profile for blocking or unblocking static URLs on the Fortinet FortiGate server. For information on creating web filters, see Web Filter in the FortiOS 7.2.3 Administration Guide.
  4. The following steps define the process of adding a policy:
    1. In Security Profiles, click Web Filter to create a new profile for blocking or unblocking static URLs or use the default profile.
      NOTE: Ensure that the URL Filter is enabled.
    2. Enter the Web Filter Profile name on the configuration page. For our example, we have named this URL Block Policy. When you are configuring your Fortinet FortiGate connector in FortiSOAR™, you must use the Web Filter Profile name that you have specified in this step as your Web Filter Profile Name configuration parameter.
  5. To block or unblock an application, you must create a profile for blocking or unblocking applications on the Fortinet FortiGate server. The following steps define the process of adding a policy:
    1. In Security Profiles, click Application Control to create a new profile for blocking or unblocking applications or use the default profile.
    2. Enter the policy name on the configuration page. For our example, we have named this App Block Policy. When you are configuring your Fortinet FortiGate connector in FortiSOAR™, you must use the Application Control Profile name that you have specified in this step as your Application Control Profile Name configuration parameter.
      For information on adding application controls, see Application Control FortiOS 7.2.3 Administration Guide.
Previous
Next