FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Mrinmoy
Staff
Staff
Article Id 286044
Description This article describes how to configure an automation stitch to provide email alerts when SSL VPN login failures appear in the logs.
Scope FortiOS 6.4 or above.
Solution

Create an Automation stitch under Security Fabric -> Automation -> Stitch -> Create New.

 

1.png

 

Give it the name and trigger shown in the screenshot below:

 

2.png

 

Configure the action in the screenshot below:

 

3.png

 

Next, test the stitch by entering the wrong user ID or password. Check the status from the firewall and check for an email.

 

4.png

 

The CLI part after configuration is as follows:

 

Stitch:

 

config system automation-stitch

edit "SSL VPN Login-Failure"

set trigger "SSL-VPN-Login"

config actions

edit 1

set action "SSL-VPN-Failed"
set required enable

next

end

next

end

 

Trigger:

 

config system automation-trigger

edit "SSL-VPN-Login"

set event-type event-log
set logid 39426

next

end

 

Action:

 

config system automation-action

edit "SSL-VPN-Login-Failed"

set action-type email
set email-to "abc@xyz.com"
set email-subject "SSL-VPN-Login-Failed"

next

end

 

Log: The email will contain the following log:

date=2023-11-24 time=09:39:36 devid="FGT61FTK22059174" devname="FGT" eventtime=1700847576403329440 tz="-0800" logid="0101039426" type="event" subtype="vpn" level="alert" vd="root" logdesc="SSL VPN login fail" action="SSL-VPN-Failed" tunneltype="ssl-web" tunnelid=0 remip=209.87.240.230 srccountry="Canada" user="user01" group="N/A" dst_host="N/A" reason="sslvpn_login_permission_denied" msg="SSL user failed to logged in"

Contributors