Description | This article describes how to ban IP using an event handler from FortiAnalyzer and send a notification to FortiGate to Ban IP. |
Scope | Fortianalyzer (event handler) and FortiGate (automation stitch). |
Solution |
This article will focus on the user's failure to log in via SSL VPN, configure the event handler from FortiAnalyzer, and configure automation stitch from FortiGate.
Under Action -> New -> choose IP Ban.
The automation stitch will show as below:
In CLI, it will appear as below:
reve-kvm05 # config system automation-stitch preve-kvm05 (automation-stitch) # edit "TataSSLVPN" preve-kvm05 (TataSSLVPN) # show
To ensure stitch running, the SSL VPN user needs to use an invalid password // username.
From FortiAnalyzer, ensure the event handler is triggered under FortiSoC -> Event Monitor -> All Events.
The automation will display it as a trigger.
Run: 'diagnose user banned-ip ?' to check if the listed IP has been IP.
Below is the debug list related to automation stitches if having automation issues:
preve-kvm05 # diag test app autod 0
Technical Tip: Use FortiGate automation stitches for alert emails |