FortiSandbox
FortiSandbox provides a solution to protect against advanced threats and ransomware for companies who don’t want to implement and maintain a sandbox environment on their own.
cysaw
Staff & Editor
Staff & Editor
Article Id 409345
Description

This article describes how to do packet capture in FortiGate and FortiSandbox to find out whether the URL is being sent out from the Guest VM in the FortiSandbox.

Scope FortiSandbox
Solution

Temporarily adding a new web filter profile for monitoring the traffic of FortiSandbox port3:

Configure a new web filter profile, enable the 'FortiGuard Category Based Filter', and ensure that all the actions of the FortiGuard Categories are changed to “Monitor” for the FortiGate to generate logging for the traffic of FortiSandbox Port3.


cysaw_0-1756880215969.png

 

Configuring the packet capture in FortiGate:

Configuring the packet capture in FortiGate for the interfaces below by following the steps 1 to 5 below:

  • WAN interface for FortiSandbox Port3.
  • LAN interface for FortiSandbox Port3.

 

  1. In the FortiGate, navigate to Network -> Diagnostics -> Packet Capture.
  2. Select 'New packet capture'.
  3. Select the WAN interface.
  4. Configure the 'Maximum captured packets' to 20000.
  5. Select 'Save settings for later'.

 

cysaw_1-1756880215973.png

 

Configuring the packet capture in FortiSandbox for Port3 FortiSandbox

 

  1. Open two browser tabs and access the FortiSandbox.
  2. Use one of the browser tabs and configure the packet capture for FortiSandbox Port3:
  • Navigate to System -> Interfaces.


cysaw_2-1756880215979.png

 

  • Configure the packet capture for FortiSandbox Port3 and configure the duration as 60 seconds, but do not select the 'Capture & Download' button yet because it can only capture for 60 seconds.
  1. Perform the On-demand scan with VM interaction enabled.
  • Navigate to Scan Job -> File On-demand.
  • Select the 'Submit File' button.
  • Upload the file sample for the issue and configure by following the screenshots below, but do not select the 'Submit' button yet.


cysaw_4-1756880215982.png

 

cysaw_5-1756880215983.png

 

  1. Select the 'Submit' button in the On-demand scan in FortiSandbox to start the scan.
  2. In the FortiSandbox, navigate to Scan Job -> VM Jobs and select the monitor icon.


cysaw_6-1756880215985.png

 

  1. A browser tab will be prompted out and go into the VM.
  2. Look for the 'Scan Flow Control' like screenshot below, but do not select the 'Yes' button yet.

 

 

cysaw_7-1756880216022.png

 

 

  1. Start all the packet captures in FortiGate first and then only start the packet captures in FortiSandbox due to the packet capture can only support 60 seconds.
  2. Once the packet capture in the FortiSandbox has been stopped, stop the packet capture in the FortiGate and also stop the on-demand scan in the FortiSandbox.
  3. In the FortiSandbox VM, select 'Yes' to exit the on-demand scan in the FortiSandbox.


cysaw_8-1756880216047.png

 

  1. Remove the web filtering profile from the FortiGate that was configured for temporary monitoring of the traffic of FortiSandbox Port3.
  2. Attach the following file to the ticket for TAC’s investigation:
  • PCAP file for 'WAN interface for FortiSandbox Port3' that was captured in FortiGate.
  • PCAP file for 'LAN interface for FortiSandbox Port3' that was captured in FortiGate.
  • PCAP file for 'FortiSandbox Port3' that was captured in FortiSandbox.
  • FortiSandbox Job Report.
  • Web Filter Log from the FortiGate that covers the time/date for the activity above.
  • File a sample for the issue.
Contributors