Yuri Slobodyanyuk Blog on Information Security 2024年09月12日
Using external threat feeds in FortiGate has become much easier with 6.0 and 6.2 versions
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

本文介绍如何为Fortigate配置外部威胁Feed作为阻止列表,FortiOS 6.0.1后操作变得更简单,文中以Cymru Team的免费'Bogons List'为例进行说明。

🎯FortiOS 6.0.1前需自定义脚本下载、解析和编译命令来添加阻止列表,操作复杂。6.0.1后有了IP地址/域的Fabric Connector,可用于DNS过滤及安全规则的源/目标字段。

📋以Cymru Team的免费'Bogons List'为例,需提供可下载IP阻止列表的HTTP/HTTPS链接,列表中每行一个IP地址/网络或域,且为纯文本。

🛠创建新的Fabric Connector,指定下载阻止列表的URL及可选的基本HTTP身份验证。保存后Fortigate会获取URL,同步完成后可编辑验证下载的IPs/域名。

🚧将Feed对象用于安全规则,创建新规则并设置拒绝访问的操作。

Recently I had the opportunity to configure an external threat feed as a block list for the Fortigate and was pleasantly surprised by how much simpler it has become. Task at hand: Block incoming connections sourced from IP addresses supplied as a list by a 3rd party commercial Threat Intelligence feed.

Until FortiOS 6.0.1 we had to resort to custom scripting which downloaded those block lists, then parsed and compiled Fortigate CLI commands to add them as address objects, circumventing limitations by grouping addresses into Address Groups. In short, it was doable but painful. But no more - starting with FortiOS 6.0.1 we have a Fabric Connector for the IP address/domains block lists which we can use in DNS Filtering (6.0.1 and newer) and also as regular Address objects in Source/Destination fields of Security Rules (starting with 6.2 and newer).

So let's see how to do it. For this post I will be using free "Bogons List" by Cymru Team as in the original case I was using commercial and confidential one which cannot be disclosed here. The idea is identical - the feed provider gives (usually) HTTP/HTTPS link to download IP block list. The list has to have IP address/network or domain per line and it must be readable as a plain text. Example:

# last updated 1595753401 (Sun Jul 26 08:50:01 2020 GMT)0.0.0.0/85.44.248.0/215.57.208.0/215.172.176.0/21

The FortiOS used here is 6.2.3. We start by creating new Fabric Connector: Security Fabric -> Fabric Connectors -> Create New -> Threat Feeds: IP Address. In which we specify URL to download the block list, with optional Basic HTTP Authentication. It should look like this:

Upon saving, give it few minutes for the Fortigate to fetch the URL. When it is ready, the arrow will change from red to green:

Once the Fabric Connector is synchronized with the feed, we can edit it to verify IPs/domains it downloaded:

What is left is to use this feed object in Security rule. Here I will create a new rule above the rule allowing HTTP/HTTPS access to the website with the action of Deny:

Key takeaway today - keep abreast of new major and minor FortiOS releases, as any update may introduce new feature that will make your life as Network/Security admin much easier.

Resources

Team Cymru Bogon Reference

Follow me on https://www.linkedin.com/in/yurislobodyanyuk/ not to miss what I publish on Linkedin, Github, blog, and more.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Fortigate 外部威胁Feed Fabric Connector 安全规则
相关文章