Hi all,
Our infrastructure is not directly connected to internet and most of the web traffic is coming from the reverse proxy IP of our ISP.
We want to use Fortigate automation to create an address object of the attacker and put it into a group that will be denied in a policy rule. This based on IPS-Logs.
With the ip address of the attacker, we also want to automate the creation of a custom ips signature based on the X-Forwarded-for field we are seeing in the IPS logs.
Working with %%srcip%% in the CLI script is working but of course, this gives us the IP of the reverse proxy, not the real IP of the attacker on the Internet. So not possible to block all traffic from the RP of our ISP.
Is it a way to use the x-forwarded-for IP in a CLI_script in Fortigate automation ?
Thanks in advance
Regards
Frédéric
Solved! Go to Solution.
Hi AEK,
In between, we have found the solution.
In the automation CLI script triggered by IPS-Logs, we have used %%forwardedfor%% instead of %%srcip%%
Thanks for your help
Hi Frédéric
This tech tip doesn't provide the direct solution but it will probably help:
In the last screenshot since we can see the XFF column in logs then I guess in can be used in the automation script.
Hi AEK,
In between, we have found the solution.
In the automation CLI script triggered by IPS-Logs, we have used %%forwardedfor%% instead of %%srcip%%
Thanks for your help
User | Count |
---|---|
2570 | |
1362 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.