Enhancing Network Security with FortiGate-MISP Integration
Released: Jan. 18, 2025 | Categories:
MISP
Foritnet
IntegrationService
Author: samuelgiger
Automated responses are becoming increasingly important in the fast-evolving IT landscape. To enhance security, there is the option to automatically block suspicious IPs.
In today's rapidly evolving threat landscape, proactive security measures are more critical than ever. By integrating FortiGate with the Malware Information Sharing Platform (MISP),
organizations can significantly bolster their defenses. Automated blocking of detected threats can enhance the security of endpoints and prevent a possible
attack. Many known suspicious IPs are shared, for example, via the MISP Project. After a connection is made, the log is forwarded and analyzed by a script that checks the IP in MISP. This approach ensures that traffic is neither delayed nor intercepted. However, if a suspicious connection is detected, it will not be able to reconnect. Through this integration, a streamlined auto-response is possible.
The project is available on GitHub: gigersam/IntegrationService_MISP_Fortigate.
App-Components
The project consists of two components:
Integration Service
Housekeeping Service
Integration Service
The Integration Service receives the log events from the Fortinet on port UDP/514 and parses the received messages. If the Rule ID with the Action
(defined in Config.py
TO_CHECK_OBJECTS) is received, the
src-ip is checked to see if it is mentioned in any event on MISP. If it is in any record,
the Service creates an address object on the FortiGate and adds the address object to the block rule. Due to a source negate on the rule, the IP address will
no longer be able to access the Service.
Housekeeping Service
The Housekeeping Service checks if an address object is older than 3 months. If the object is older than 3 months, it is removed from the block address group
and then deleted.
Due to some difficulties with automatically updating the MISP feeds, there is also a trigger to update the MISP feeds via the API.
Deployment
Disclaimer:
Please be advised that if an address object in FortiGate contains a comment with a timestamp in the format "YYYY-MM-DD HH:MM:SS.ssssss"
(e.g., "2024-07-05 16:26:47.324178"), it may be subject to automatic deletion by the system. This behavior is due to the housekeeping logic that evaluates
objects based on timestamps to identify outdated entries for cleanup.
To deploy the Integration Service, there are multiple options. In this post, we describe how to deploy it with Docker.
The complete configuration is done in the
./Config.py. The following configurations are required.
MISP:
MISP_SERVER = "IP"
The MISP_SERVER can be an IP address or an FQDN for the MISP server.
MISP_API_KEY = "API_KEY"
The MISP_API_KEY can be configured under Administration -> List Auth Keys -> Add authentication key.
MISP_FEED_UPDATE_CYCLE = 43200
The MISP_FEED_UPDATE_CYCLE defines how often the MISP feed update API gets triggered. Time needs to be in seconds (43200 seconds = 12 hours).
FortiGate:
BLOCK_GROUP_NAME = "BLOCK_GROUP_NAME"
The BLOCK_GROUP_NAME is the address object group used to disallow access.
TO_CHECK_OBJECTS = [["RULEID","ACTIONTYPE"]]
The TO_CHECK_OBJECTS specifies the Rule ID in which the address object group is assigned. Additionally, the ActionType is required to identify the right traffic to be checked.
FORTIGATE_SERVER = "IP"
The FORTIGATE_SERVER can be an IP address or an FQDN for the FortiGate.
FORTIGATE_API_KEY = "API_KEY"
The FORTIGATE_API_KEY can be configured under System -> Administrators -> Create New -> REST API Admin. The API user only needs access to Firewall -> Address.
To reduce API user access, the IP of the service host can be added under Trusted Hosts to enhance security.
FORTIGATE_ADDRESS_OBJECTS_REMOVE_CYCLE = 43200
The FORTIGATE_ADDRESS_OBJECTS_REMOVE_CYCLE defines how often the MISP feed update API gets triggered. Time needs to be in seconds (43200 seconds = 12 hours).
After adding all the required Config-Objects, a copy of Config.py is needed in each app (e.g., app/Config.py and housekeeping/Config.py).
To deploy the service, use
docker-compose. Run the following command directly in the directory where the
docker-compose.yml file is located.
bash:
docker-compose up --build
After building the Docker container, the logs of the FortiGate need to be forwarded to the Service.
To forward the logs, a syslog server needs to be configured. Due to the custom port, configuration via the CLI is easier. Log in to the FortiGate via
SSH or use the Web CLI and run the following command.
Be aware that there are only 4 possible syslogd configurations available, and do not override an existing
configuration! You may need to change the syslogd[1-3]!
config log syslogd setting
set status enable
set server "IP-OF-INTEGRATION-SERVICE-HOST"
set port 8514
end
After the correct configuration, some IP addresses should be added to the FortiGate if suspicious access occurs.
Don't hesitate to
contact me if you have any questions or requests.