FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
yangw
Staff
Staff
Article Id 192808
Description This article describes the integration between FortiOS and WhatsUp Gold using SNMPv3 with Authentication/Encryption based on SHA256/AES256
Scope

Environment:

  • FortiGate v7.2.7 build 1577 M.
  • WhatsUp Gold with the firmware version 24.0 Build 2096.
  • in this MOP both devices are in the same subnet (no limitation using different networks interconnected via L3):

 

avenditti_1-1726070669007.png
Solution

On FortiGate:

  • Go to Global (this step is only needed if the firewall is divided into VDOMs).
  • Go to Network -> Interfaces, 'double-click' on the interface that will be used to communicate with the SNMP Manager (WhatsUp Gold) and enable the SNMP service:

 

avenditti_2-1726070712609.png

  • Select 'OK'.
  • Go to System -> SNMP, enable 'SNMP Agent' and in the SNMPv3 section, select 'Create New'.
  • Configure the settings as in the following picture (password used to simulate the scenario: fortinet).

 

avenditti_3-1726070712612.png

 

Be careful to select AES256 Cisco as Encryption Algorithm (instead of AES256). WhatsUp Gold uses a different way from what FortiGate supported to extend the size of the localized key of SNMPv3 encryption protocol AES256. WhatsUp Gold can work with CISCO's SNMPv3 AES256. 

 
  • Leave the pre-defined SNMP Events enabled, Select 'OK' and select 'Apply'.
  • Continue on the same screen, select 'Download FortiGate MIB File' and 'Download Fortinet Core MIB File'.
  • Two .mib files (FORTINET-CORE-MIB.mib and FORTINET-FORTIGATE-MIB.mib) will be downloaded on the local PC.

 

To configure from the CLI:


config system interface
     edit "port1"
          set vdom "root"
          set allowaccess snmp ...
          set type physical
     next
end
config system snmp user
     edit "WhatsUpGold"
         set notify-hosts 10.5.60.188
         set events cpu-high mem-low log-full ....
         set security-level auth-priv
         set auth-proto sha256
         set auth-pwd ENC TXN2QW1fkY5N1ibo1...
         set priv-proto aes256cisco
         set priv-pwd ENC TXN2QW1fkY5N1ibo1...
     next
end

 

 

On WhatsUp Gold (WEB GUI)

  • Go to Settings -> System Setting -> SNMP MIB Manager -> '+'.

 

avenditti_9-1726072716984.png

 

  • Select Choose File, select the FORTINET-CORE-MIB.mib previously downloaded -> Open, and select 'OK' Continue on the SNMP MIB Manager screen then select '+' once again.
  • Choose File, select the FORTINET-FORTIGATE-MIB.mib previously downloaded -> Open, and select 'OK'.
  • The new MIBs will result now available (successfully validate) under the SNMP MIB Manager.

 

avenditti_1-1726070788632.png

 

  • Go to Settings -> Library -> Credentials -> '+' -> SNMPv3 and configure the settings as in the following picture (password used to simulate the scenario: fortinet):

 

avenditti_2-1726070815702.png

 

  • Go to Discover -> New Scan.

(Start section):

  • Keep selected 'Single device, multiple dev…'.
  • Enter the IP address of the target FortiGate in the text box.
  • Uncheck the other fields:

 

avenditti_3-1726070815703.png

 

(Expand section):

  • Uncheck all fields and select 'Next':

 

avenditti_4-1726070844499.png

 

(Limit section):

  • Leave all fields unchecked and select 'Next':

 

avenditti_5-1726070844501.png

 

(Credential Section):

  • Be sure that 'Use all current and feature credentials is unchecked'.
  • Select “SNMPv3 Credentials” (previous created).
  • Select 'Next'.
avenditti_6-1726070844502.png

 

(Options Section):

  • Do not apply any changes and select 'Next':

 

avenditti_0-1726070900269.png

 

 

(Schedule Section):

  • Do not apply any changes and select 'Next':

 

avenditti_1-1726070900272.png

 

(Review & Run Section):

  • Add a Name and select 'Save & run now':

 

avenditti_2-1726070900274.png

 

The scan process may take few minutes.

 

After the scan has been completed something like the below picture will be visible. Switch to the 'Device List' view.

 

avenditti_3-1726070933046.png

 

Once the scan is completed the device appears on the list, select the related row and see the right box that appears. Expand the 'Credentials' and 'More Device Information' sections. Be sure that the device has been discovered using SNMPv3.

 

avenditti_4-1726071050440.png

 

 

Select 'Start Monitoring':

 

avenditti_5-1726071050442.png

 

After few seconds the device icon should change (a green circle appears). Now the FortiGate is monitored. To confirm this, go to My Network, select the device, and select the Status icon (on the right box).

 

avenditti_6-1726071076061.png

 

The status of the device is showed on the ANALYZE screen.

 

avenditti_7-1726071076065.png

 

To allow WhatsUp Gold to intercepts traps received from FortiGate, go to Settings -> System Settings -> Passive Monitor Listeners

Flag 'Listen for messages' (Port 162) and 'Accept unsolicited SNM traps'.

 

avenditti_0-1726071143452.png

 

Select 'Save'.

 

Assign the monitor to the device under My Network, select the FortiGate, select the 'Properties' button on the right box.

 

avenditti_1-1726071143458.png

 

Select the 'Passive monitors' tab and select' +'.

 

avenditti_2-1726071143464.png

 

Select 'SNMP Trap' as type and 'Any Trap' as monitor:

 

avenditti_3-1726071143466.png

 

Select 'Next'and  select '+” on the screen 'Actions for this passive monitor'.

 

avenditti_4-1726071143468.png

 

Select 'Default Web Alarm':

 

avenditti_5-1726071143470.png

 

Select 'OK' and 'Finish'. The screen should be similar to the following:

 

avenditti_6-1726071179453.png

 

 

WhatsUp Gold is now configured to monitor the FortiGate state.  

To test the integration, for example, temporarily disable a FortiGate interface, then re-enable it after a few seconds. After some time, WhatsUp Gold will display an alert similar to the one shown in the image below.

 

avenditti_7-1726071179460.png

 

Go to Analyze -> Logs -> SNMP Traps to see the details of the trap:

 

avenditti_8-1726071179465.png

 

 

FortiGate Troubleshooting:

On FortiGate, it is possible to analyze the SNMP daemon activity with the following commands:

 

diag debug reset

diag debug application snmpd -1

diag debug enable

 

Or listen the SNMP requests, with the command:

 

diagnose sniffer packet any 'port 161' 4 0 l

 

Related documents:

FortiOS 7.2.7 Administration Guide (SNMP): https://docs.fortinet.com/document/fortigate/7.2.7/administration-guide/62595/snmp

RFC2574: https://www.ietf.org/rfc/rfc2574.txt

WhatsUp Gold: https://docs.progress.com/bundle/whatsupgold-user-help-24-0/page/SNMPv3.html