I recently setup HoneyPi and have connected it to the DMZ interface of my Fortiwifi 60E-dsl. I have created virtual ip's for RDP and policies to point the RDP traffic to the Honeypi. The Honeypi is sending the email alerts but the source interface is showing as my DMZ interface of my pi and not the public source ip of the scan.
The honeypi ip is 10.10.10.2
The DMZ interface is 10.10.10.1
Here is an extract from the email sent by the Honeypi:
Danger level: [2] (out of 5)
Scanned TCP ports: [3389: 1 packets]
TCP flags: [CWR ECE SYN: 1 packets]
iptables chain: INPUT, 1 packets
Source: 10.10.10.1
DNS: [No reverse dns info available]
Destination: 10.10.10.2
DNS: [No reverse dns info available]
Overall scan start: Sun Nov 10 11:05:28 2019
Total email alerts: 51
Complete TCP range: [3389]
Syslog hostname: jumpbox
Global stats:
chain: interface: protocol: packets:
INPUT eth0 tcp 141
I want the emails to show the source ip of the attacker and not the DMZ interface. Is there a setting that i need to change on my Fortiwifi to show the correct address?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1662 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.