Description | This article describes how to ban IP using an event handler from FortiAnalyzer and send a notification to FortiGate to Ban IP. |
Scope | Fortianalyzer (event handler) and FortiGate (automation stitch). |
Solution |
This article will focus on the user's failure to log in via SSL VPN, configure the event handler from FortiAnalyzer, and configure automation stitch from FortiGate.
Under Action -> New -> choose IP Ban.
The automation stitch will show as below:
In CLI, it will appear as below:
reve-kvm05 # config system automation-stitch preve-kvm05 (automation-stitch) # edit "TataSSLVPN" preve-kvm05 (TataSSLVPN) # show
To ensure stitch running, the SSL VPN user needs to use an invalid password // username.
From FortiAnalyzer, ensure the event handler is triggered under FortiSoC -> Event Monitor -> All Events.
The automation will display it as a trigger.
Run: 'diagnose user banned-ip ?' to check if the listed IP has been IP.
Below is the debug list related to automation stitches if having automation issues:
preve-kvm05 # diag test app autod 0
Technical Tip: Use FortiGate automation stitches for alert emails |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.