This topic describes how Fortinet FortiManager and FortiGate devices are connected to AFA.
Note: FortiManager versions earlier than 5.2.3 are not supported. For versions 5.2.3 and above, connection via SSH/SOAP is no longer supported. You must move to REST.
In this topic:
Fortinet network connections
The following image shows an ASMS Central Manager or Remote Agent connected to Fortinet FortiManager and FortiGate devices.
The following image shows an ASMS Central Manager or Remote Agent connected to FortiGate devices.
Note: If syslog messages are sent via FortiAnalyzer device, a separate connection is required.
AFA requires a user account with Restricted_User permissions to connect to the FortiManager device.
Read-only permissions are sufficient, as shown in the example below (click to expand):
Note: FortiManager v5.2.3 and above with REST access must have permissions for rpc-permit (set rpc-permit read) using the FortiManager CLI or using the web UI system settings for administrator, set JSON API ACESS to Read.
When ActiveChange is enabled, AFA requires a user account with Super_User permissions with read-write permissions.
For example:
Note: FortiManager v5.2.3 and above with REST access must have permissions for rpc-permit (set rpc-permit read-write) using the FortiManager CLI or using the web UI system settings for administrator, set JSON API ACESS to Read-Write.
AFA requires read-only permissions to connect to Fortigate devices.
In the FortiGate web interface, in the Admin Profile configuration > Access Control, select an option that is at least read-only.
If device configuration consists of VDOMs, the user must be configured with set scope global. Users configured with set scope vdom are not supported for AFA.
If the FortiGate device is defined directly in AFA as opposed to via a FortiManager device, AFA does not support a user defined only on the managing FortiManager.
Enter the user name to use for accessing the device.
This user name must be a super-user.
If Administrative Domains (ADOMs) are used:
To analyze only devices under a specific ADOM, specify a specific ADOM's administrator credentials.
To analyze all devices under all ADOMs, provide the credentials of a global administrator.
When analyzing devices as a global administrator, no other action is required. Otherwise, some manual configuration may be required. Contact AlgoSec support for more information.
Password
Enter the password to use for accessing the device.
Connect via
For FortiManager version 5.2.3 and above, select REST. (SSH/SOAP is no longer supported).
FortiManager versions earlier than 5.2.3 are not supported.
For AFA to process logs from the devices managed by the FortiManager device you are adding, you may need to specify additional device identifiers.
This is relevant when the sub-device is represented by multiple or non-standard device identifiers. For example, this may be relevant for firewall clusters or non-standard logging settings.
Specify whether AFA should collect logs for the device, by selecting one of the following:
None: Do not collect logs.
Standard: Enable log collection.
Extensive: Enable log collection and the Intelligent Policy Tuner.
The default value is Extensive.
Syslog-ng server
If you selected Standard or Extensive in the Log collection method field, you must specify the syslog-ng server. For details, see Specify a Syslog server.
To specify that AFA should use the logs created by a managed device / virtual system, do the following:
In the Add Device column, select the check box next to the device's name.
In the Log Analysis column, select one of the following:
None to disable logging.
Standard to enable logging
Extensive to enable logging and the Intelligent Policy Tuner.
Note: Using the device's logs enables AFA to detect certain policy optimization information, such as unused rules. This information is displayed in the Policy Optimization section of the AFA report.
ASMS can collect log data by receiving syslog messages from the FortiManager device or a FortiAnalyzer, or by collecting syslog messages from a remote syslog-ng server.
This procedure describes how to configure the FortiManager device to send syslog messages to ASMS. For more details, see Log Collection and Monitoring.
Do the following:
Log in to your FortiManager web interface, and navigate to the Log & Report > Log Settings area.
Enable the Send Logs to Syslog option, and enter the IP Address/FQDN of your AFA server.
Specify how AFA should acquire the device's routing information:
Automatic. AFA will automatically generate the device's routing information upon analysis or monitoring.
Static Routing Table (URT). AFA will take the device's routing information from a static file you provide. For more details, see Specify routing data manually.
To specify a custom port, select this option and type the port.
This option is only relevant when SSH is selected.
Number of allowed encryption keys
Enter the permitted number of different RSA keys received from this device's IP address.
Different RSA keys may be sent from the same IP address in cases of cluster fail-over, device operating system upgrades, etc. For example, if a cluster fail-over occurs, the secondary node will send a new RSA key from the same IP address to AFA. If this number is set to 1, the connection to the node will fail, resulting in a failed analysis.
Specify whether AFA should collect logs for the device, by selecting one of the following:
None: Do not collect logs.
Standard: Enable log collection.
Extensive: Enable log collection and the Intelligent Policy Tuner.
The default value is Extensive.
Syslog-ng server
If you selected Standard or Extensive in the Log collection method field, you must specify the syslog-ng server. For details, see Specify a Syslog server.
Additional firewall identifiers
Enter any additional IP addresses or host names that identify the device.
When adding multiple entries, separate values with a colon (:). For example: 1.1.1.1:2.2.2.2:ServerName.
This is relevant when the device is represented by multiple or non-standard device identifiers in the logs, for example, in cases of firewall clusters or non-standard logging settings. If AFA receives logs with an identifier it does not recognize, the logs will not be processed.
AFA automatically identifies Fortinet devices in one-armed mode when the device has a single interface, or a single one non-management interface. If your device has multiple non-management interfaces and one-armed mode is not identified automatically, configure this for your device manually.
Do the following:
On the AFA machine, access your device configuration meta file as follows:
/home/afa/.fa/firewalls/<device_name>/fwa.meta
where <device_name> is the name of the device listed. If you device is listed multiple times, enter the longer name.
On a new line, enter:
is_steering_device=yes
Run an analysis on the device to update the device data in AFA.