Hi,
We have a really simple rule e.g.
Source: private IPs
Destination: Some AWS URL objects which resolve the correct IP addresses (confirmed using dns dump from the FW)
Service: TCP/443
No SSL. No URL filtering.
We see the traffic in the logs on the firewall and by all accounts they should be permitted but we see they are being blocked:
Threat Action: Block
Threat name: Policy violation
Threat severity: Medium
Threat type: Reconnaissance
When I check the individual threat logs -> Antivirus, Intrusion prevention, Application control, web filter, filer filter, there is nothing in the logs. In addition we removed all UTM profiles to test and still had the same issue with the same threat block.
Fortigate 3301E running 7.0.15.
Example trace (which doesn't show any block):
-Source interface is correct
-Destination interface is correct
-Source NAT is correct
-Routing is correct
-Destination port is correct
Any ideas why we would be getting this block? Where it could possibly be configured?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi Ian_W,
It seems that you are using a custom service called "TCP/443"? If yes, I hope you defined the TCP port range correctly with 443.
Please show us the configuration of the custom service if you have it.
We are actually using the default service object "HTTPS" as you rightly suggested and it has been working fine for 18 months+ and we only (noticed) started having this issue about 10 days ago. No other changes were made to the firewall. Could it be something to do with any signature files that could have been downloaded and changed some default options do you think?
Any update?
No. After a few days the traffic was allowed so I think it was just a mismatch in DNS resolution between the client and the firewall. I'm going to update the DNS used by the firewall to match the DNS used by the client DNS resolvers. However we were unable to replicate the issue in this particular instance by the time we got a case open with Fortinet support (long story about inefficiency here in our company).
The "reconnaissance" block I think is just a red herring. It's like the FortiAnalyzer trying to give a reason for the block using its built in SIEM intelligence. In version 7.2+ you can actually disable this in the FortiSOC, but in version 7.0 (which we are currently running) this is not visible.
Hi,
From the debug flow I can see msg="Allowed by Policy-4: SNAT" so is the policy ID 4 the correct one?
Also where do you see the below logs
Threat Action: Block
Threat name: Policy violation
Threat severity: Medium
Threat type: Reconnaissance
Can you check forward traffic logs what it shows there.
Also try doing a policy lookup
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Firewall-policy-lookups/ta-p/192912
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1696 | |
1091 | |
752 | |
446 | |
228 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.