Created on
09-26-2024
03:25 AM
Edited on
01-24-2025
01:46 AM
By
Jean-Philippe_P
Description | This article describes how to configure an external IPv6 threat feed server. |
Scope | FortiGate and internal threat feed server. |
Solution |
A Threat feed server provides a continuous stream of data about potential and current cyber threats such as malware, phishing attacks, Vulnerabilities, and compromised IP addresses from various sources.
An Internal threat feed server empowers organizations' cybersecurity by providing real-time insights into potential cyber threats.
Topology:
Configuration:
MAIN_FW # exec ping6-options source6 fd01:af0:8003:2::af MAIN_FW # exec ping6 fd01:af0:8003:2::2
Once configured, wait some time to fetch the entries from the Threat feed server.
MAIN_FW (1) # show
If the threat feed is not connecting, check the route toward the server and collect the logs below.
Putty session 1:
get router info6 routing details <server IP address> exec ping6 <server IP address>
Putty session 2:
diag debug reset diag debug console timestamp enable diag debug application forticron 0xf00 diag debug enable |