Fortinet Firewall NetFlow Integration with ThreatSync+ NDR

The Fortinet firewall uses the NetFlow protocol to export data about IP traffic that enters its interfaces and exports this data as NetFlow fields to a NetFlow collector. The NetFlow collector is a server used to collect and upload network traffic to ThreatSync+ NDR to analyze for security, administration, accounting, and troubleshooting.

WatchGuard provides integration instructions to help customers configure WatchGuard products to work with products created by other organizations. If you want more information or technical support about how to configure a third-party product, go to the documentation and support resources for that product.

This document describes how to integrate the Fortinet Fortigate 60E with ThreatSync+ NDR using the NetFlow protocol.

Contents

Integration Summary

The hardware and software used to complete the steps outlined in this document include:

  • Fortinet Fortigate 60E with FortiOS v7.4.7 or higher
  • WatchGuard Cloud account with a ThreatSync+ NDR or Total NDR license
  • ThreatSync+ NDR Collection Agent (for more information, go to About ThreatSync+ NDR Collection Agents)

Topology

This diagram shows the integration topology of the Fortinet firewall and ThreatSync+ NDR.

Screenshot of the ThreatSync+ NDR and Fortinet topology diagram

Configure the ThreatSync+ NDR Collection Agent

Make sure the ThreatSync+ NDR Collection Agent is installed on your Windows or Linux computer, and the status of the collection agent is Success. For detailed instructions about the ThreatSync+ NDR Collection Agent installation, go to Configure Collection Agents for ThreatSync+ NDR (Windows Computers) or Configure Collection Agents for ThreatSync+ NDR (Linux Computers).

Configure the Fortinet Firewall

Before you can configure Fortinet NetFlow, configure these basic settings.

  1. Log in to the Fortinet web UI at https://<IP address of the Fortinet device>.
  2. Configure the interfaces. In this example, we configured two interfaces: wan1 is the interface outside the firewall and internal2 is the interface inside the firewall.
  3. Screenshot of Fortinet, Basic Settings 1

  4. Configure the static route to the Internet.
  5. Screenshot of Fortinet, Basic Settings 2

  6. Configure the firewall policy to allow the internal traffic out through the wan interface.
  7. Screenshot of Fortinet, Basic Settings 3

For more information, go to the Fortinet documentation.

Configure NetFlow on Fortinet Firewall

The NetFlow feature on the Fortigate 60E can only be configured in CLI mode. To configure your Fortinet firewall as a NetFlow exporter:

  1. Log in to the CLI mode of Fortigate 60E. For information about how to log in to the CLI mode, go to the Fortinet documentation.
  2. Enter the following commands to configure the NetFlow collector. Replace the source-ip and collector-ip in the commands to match your configuration.
  3. To begin the configuration of the NetFlow global parameters, enter:

    config system netflow

    Configure the collector to collect NetFlow traffic in its subnet:

    config collectors

    Add or edit the collector. In this example, we enter edit 1.

    edit 1

    Set the collector-ip in the internal subnet. For example, 192.168.9.50:

    set collector-ip 192.168.9.50

    Set the collector-port to receive the NetFlow traffic in its subnet. The NetFlow default port is 2055.

    set collector-port 2055

    Set the source-ip for communication with the NetFlow agent. The source IP address is the address of the internal subnet interface where the collector is located. For example, 192.168.5.19.

    set collector-ip 192.168.9.1

    Select the collector interface-select-method to specify how the collector selects an outgoing interface to reach the server.

    set the interface-select-method auto

    To save the configuration, enter end.

    Screenshot of Fortinet, NetFlow Profile 1

  4. Use these commands to configure the timeout and counter attributes for NetFlow data transmission to the collector. We recommend these settings:
  5. set active-flow-timeout 60
    set inactive-flow-timeout 60
    set template-tx-timeout 60
    set template-tx-counter 20

    To save the configuration, enter end.

    Screenshot of Fortinet, NetFlow Profile 1

  6. Configure the NetFlow sampler on an interface. For example, configure the sampler on internal2.

    Enter the global port configuration mode:

    config system interface

    Select the interface that you want to configure.

    edit internal2

    Enable the NetFlow sampler:

    set netflow-sampler both

    To save the configuration, enter end.

    Screenshot of Fortinet, NetFlow Profile 1

  7. (Optional) Enter the following commands to verify that the collector is configured successfully. Replace the source-interface and collector-ip in the command to match your configuration.
  8. Capture the packets to the collector on the interface you configured.

    !diagnose sniffer packet <source-interface> 'host <collector-ip> and <collector-port>'
    diagnose sniffer packet internal2 'host 192.168.9.50 and 2055'

    Verify that the traffic is sent to the collector through port 2055.

    Screenshot of Fortinet, NetFlow Profile 1

For more information about NetFlow, go to the Fortinet documentation.

Test the Integration

To test the Fortinet Firewall integration with ThreatSync+ NDR:

  1. Log in to your WatchGuard Cloud account.
  2. From the navigation menu, select Configure > ThreatSync+ Integrations > Collection Agents. If you have a Service Provider account, you must select an account from Account Manager.
  3. Select the ThreatSync+ NDR Collection Agents tab to view the Last Activity column of your collection agent. This column shows the last time the collection agent uploaded the NetFlow records to ThreatSync+ NDR. It might take a few hours for the first upload.
  4. Screenshot of WatchGuard Cloud, the ThreatSync+ Collectors page, Test Integration 1

  5. From the navigation menu, select Monitor > ThreatSync+ to view the Network Summary page.
  6. Screenshot of WatchGuard Cloud, the ThreatSync+ Network Summary page, Test Integration 2

For more information about ThreatSync+, go to ThreatSync+.