Fortigate
  • 1 Minute to read
  • Contributors
  • Dark
    Light
  • PDF

Fortigate

  • Dark
    Light
  • PDF

This article lists examples demonstrating practical use cases for taking action on Fortigate servers

Add Host to Group (Fortigate)

The below configuration allows you to connect to the FortiGate host and run any command

image.png

In the above configuration, execute the following commands

conf firewall address
edit [Address name]
set subnet _$SrcIP_ 255.255.255.255
end
conf firewall addrgrp
edit [Address group name]
append member [Address name]
end

The above set of commands will add an IP Address to a certain group. Ensure the commands are valid for your Fortigate version using the documentation.

image.png

In the above figure, a search query is executed that displays all the suspicious IP Addresses that have failed at their login attempts more than 50 times. Using _trigger query, an API call is made to the above ssh integration configuration, which will add the IP Addresses in the $SrcIP column to the group mentioned in the configuration.

You need to apply the firewall rules to block the IP Addresses present in the group.

Remove Host from Group (Fortigate)

The below configuration allows you to connect to the FortiGate host and run any command

image.png

In the above configuration, execute the following commands

conf firewall addrgrp
edit [Address group name]
unselect member _$SrcIP_
end

The above set of commands will remove an IP Address from a certain group. Ensure the commands are valid for your FortiGate version using the documentation.

image.png

In the above figure, a search query is executed that displays all the IP Addresses that do not have any failed login attempts. Using _trigger query, an API call is made to the above ssh integration configuration, which will remove the IP Addresses in the $SrcIP column from the group mentioned in the configuration.


Was this article helpful?

What's Next