Description |
This article explains how to enable Network Flow on the FortiGate to forward session information to the FortiNAC for use in a Device Profiling Rule.
FortiGate supports both Network Flow and Session Polling. In some instances, it may be more beneficial to enable Network Flow instead of Session Polling to reduce the scope of the session information forwarded by the FortiGate to the FortiNAC. This is achieved by enabling NetFlow only on those FortiGate interfaces and directions of interest.
This article uses an Xbox Series X that communicates with Microsoft servers by using UDP port 3544 as an example. However, the methodology below may still be used for other types of endpoint devices that may communicate over unique ports to specific servers. For example, mobile phones managed by an MDM not supported by FortiNAC, or OT controlled by ICS not detected by FortiGuard.
It is not necessary to enable FortiGate Session Polling. |
Scope | FortiGate, FortiNAC-F. |
Solution |
FortiGate:
To configure NetfFlow on the the FortiGate:
In the CLI of the FortiGate, for firmware versions 7.2.8 or 7.4.2 and later, enter the following commands:
config system netflow config collectors edit <number> set collector-ip <fortinac-port1-ip-address> set source-ip <fortigate-modelled-ip-address> end end
config system interface edit <name> set netflow-sampler both next end
For other firmware versions, enter the following commands:
config system netflow set collector-ip <fortinac-port1-ip-address> set source-ip <fortigate-modelled-ip-address> end
config system interface edit <name> set netflow-sampler <both | rx | tx> next end
FortiNAC:
On the CLI of the FortiNAC, to allow NetFlow traffic in the FortiNAC interface, enter the following commands:
config system interface edit port1 set allowaccess <protocol x> netflow <protocol y> next end
To verify that NetFlow traffic is received on the FortiNAC interface, enter the following command:
execute tcpdump -vi port1 port 2055
On the FortiNAC GUI, navigate to Users & Hosts -> Network Sessions and identify the session of interest:
Right-click the session of interest and select Create Device Profiling Rule. Enter the necessary information under the General tab and verify the information under the Methods tab:
Navigate to Users & Hosts -> Endpoint Fingerprints and identify the endpoint fingerprint(s) of interest:
Right-click the fingerprint of interest, select Test Device Profiling Rule, select the name of the Device Profiling Rule, and select OK:
Navigate to Users & Hosts -> Device Profiling Rules and select Run:
Navigate to Users & Hosts -> Endpoint Fingerprints and verify that the endpoint device is profiled:
Continue to configure a User/Host Profile, Network Access Policy, and Model Configurations as appropriate for the profiled endpoint device. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.