CyberCNS can evaluate the security policy of your FortiGate Firewall and flag any potential shortcomings. You can initiate a Firewall Scan from the Integrations menu.
Integrating FortiGate Firewall can be done via ssh or API.
Navigate to Integrations
In the CyberCNS portal, navigate to Global Settings(⚙) > Integrations and choose FortiGate from the integrations listed.
Next, you will add credentials for your FortiGate firewall.
Enter Credentials
If scanning with ssh credentials should have access to the firewall from the probe machine.
Please create a new User for CyberCNS before adding the credentials to FortiGate Firewall.
In FortiGate navigate to the Administrators, in Administrators click on the Create New dropdown, and select REST API Admin.
You have to set a username for the API administrator account and select its profile. You can use an existing profile and create a new one and limit permissions to what the plugin will be used for.
If case you decide to create a new profile, select add from the Administrator Profile dropdown.
If you decide to create a new profile, assign it a name and give it appropriate permissions. Optionally, you can provide a description of what this profile is allowed to do and where it's used. The plugin actions require a minimum of Firewall Read/Write permissions.
Click OK to create the new profile.
Need to add the IP range of the agent machine in trusted hosts.
Next, click OK to create the new user. The New API key will be generated.
Note that multiple credentials can be added by using the '+' sign. Each set of credentials can be attached to a company and then to an agent under that company.
3. Enter Name: Choose a name of your choice for the credentials to be added.
4. Enter Hostname/IP Address: Enter a Hostname/IP address for the credentials to be added.
5. Enter Port Number: Enter the Port Number for the credentials to be added(ssh port for ssh scan and https port for API scan[integrating with API Key]).
6. Enter Username: Enter the username used to log in to the Fortigate Firewall. It is recommended that you define a special username to be used exclusively for these scans so that they can be identified in the firewall’s logs.
API scanning is more reliable than ssh.
7. Enter Password: Enter the password only if scanning via ssh(ssh port should be integrated above).
Do not enter the password if you are integrating with the API key.
8. Enter API Key: If you want to scan the firewall via API (more reliable) enter the API Key (Password not required).
If integrating with API key https port should be integrated.
9. Select an associated company: Select an existing company in order to add the firewall as an asset of that company.
10. Select Probe/Agent: Select the Probe/Agent from the selected company to be used for the scan. If no agent is installed for the company, an external scan agent can be used to initiate firewall scans from the CyberCNS Server (e.g abc.mycybercns.com).
Once all the data have been entered, click Save.
After the credentials have been successfully added to the company, the Firewalls tab will be added to the Main Menu.
9. In the Firewalls section, click Firewall Scan to initiate a scan of all the configured firewalls.
10. When the scan is complete, details of Users, Zones, Groups, Interfaces, Access Rules, and Services are populated for the Fortigate Firewall.
Completed firewall scans are listed with timestamps as shown below. To view the results of a scan, click the scan in the list.
The scan results can be downloaded as a report in the Microsoft Word .docx format by clicking Download Report.
This completes the documentation of the Fortigate Firewall Scan.