By Manny Fernandez

March 18, 2019

FortiView Capabilities

A few years ago, I worked for a reseller of networking and security.  I created their managed security services practice.  While I was there, I was approached by Fortinet in their attempt to have me sell their solution in our SOC.  I was apprehensive at first.  I had deployed a few Fortigates years ago but I had not done much after that.  I explained to Fortinet that I did not have time to test new solutions.  I told them I was a Cisco, Palo and Checkpoint guy.  They asked me to just check out the product and give them my honest opinion.  I explained that I was brutal when it came to that.  You can ask anyone at Cisco that dealt with me while at the partner, I was relentless with them.

I used the line from Andrew Kalat (@Lerg) from ‘Defensive Security Podcast’ “Don’t explain the problem as the problem that YOU can fix”.  At any rate, I promised to review it and really enjoyed the solution.  This was when they first went to 5.4, the product has gotten so much better in the two years I have been working with it.  Long story short, I loved it so much, I came to work at Fortinet.

Part of the incredible changes to the product is the introduction to Fortiview.  Fortiview allows you to view traffic passing through the Fortigate and allows you to drill down for further analysis.

When you are logged into the Fortigate, you can select ‘Fortiview’ then Source or Destination.  In ‘Destination’ specific, you can see traffic that is from a ‘LAN’ category of the interface to a ‘WAN’ categorized interface.  You can add filters and to see even more detail, you can double-click on any of those lines.

2019-03-17_23-36-56

2019-03-17_23-37-15

You can filter by any of the entries shown above.

2019-03-17_23-37-38

Above, you can see that I filtered the entries by ‘country’ and we can see that the application was ‘WhatsApp’ to ‘157.240.12.53’.

2019-03-17_23-38-26

You can double click on the entry and it will show you the sessions with additional details.

  1. The source, in this case, is my MacBook Pro
  2. The Applications, that are in use
  3. The policies that are being hit for the traffic shown.
  4. The source interface; where the traffic is ingressing from.
  5. The destination interface; the egress interface.
  6. The sessions that are active or still in the state table.

2019-03-17_23-41-03

The application section under Fortiview will show you the application, the category of the application as well as the risk rating for the application.  Additionally, you can see byte sent/recv as well as sessions.

2019-03-17_23-42-36

The Cloud Application section of Fortiview gives you information about the cloud applications that are being used on the Fortigate for the period section selected.  When you double click on something like ‘YouTube’, it will show you the number of videos they have watched or the number of files that have been downloaded.

2019-03-17_23-43-09

You can select the ‘Web Site’ section of the Fortiview and see the domain name, the category based on Fortiguard, the threat score associated with the domain as well as browsing time, bytes send/received and Sessions blocked/allowed.

2019-03-17_23-48-24

Under ‘Threat’ you will see the threats that were allowed or blocked based on your configuration.  If we double-click the ‘Blocked by Firewall Policy’ as an example, under ‘Category’ we can see additional information.

2019-03-17_23-49-03

Here we can see that I double-click the ‘Blocked by Firewall Policy’ you can see the different sessions and the various source IP addresses.  Once we double-click on any of those sources displayed, we see even more information.

2019-03-17_23-49-30

Here we can see how we had some blocked connection from that particular source destined to ‘1.1.16.44’.  To see even more additional information, you can double-click any of the entries…

2019-03-17_23-49-54

This section is split into two screenshots, however, you can see that the destination IP address is associated with China (although it is not really, but rather a lab IP for this purpose).  We can also see the under the ‘Action’ section, we can see ‘Deny’ and that it is based on policy 39.

2019-03-17_23-50-39

You can see that the logs yield an incredible amount of information.

2019-03-17_23-51-26

There is also a section ‘Compromised Hosts’ that will show you the compromised hosts on your network. Furthermore, you can filter by ‘Not Acknowledged’ and ‘Acknowledged’.

2019-03-17_23-52-28

Additionally under the WiFi section, you can see each device that is connected, the SSID, Bytes recv/sent as well as the Sessions blocked/allowed, additionally, you can see the AP you are attached to.

2019-03-17_23-56-55

The FortiClient has a built-in Vulnerability Scanner that will collect vulnerabilities and report them to the Fortigate and/or EMS.  Above you can see that the test box shown has a number of vulnerabilities.

2019-03-17_23-57-42

Another useful section is the ‘Policies’.  In this section, you can see the policies that are being hit.  By double clicking on any of these policies, you will be able to see Source, Destination, and application and services.

Fortinet has made amazing changes to their product.  They are not stopping at the Fortiview, stay tuned to even greater visibility and even greater efficacy from the FortiGuard lab team.  If you have not seen Fortinet in a while, I recommend you take a second look.

Recent posts

  • There are many options when troubleshooting in FortiGate firewalls. ... Full Story

  • Have you ever had an IPS signature that continues... Full Story

  • Use case:  Customer has a Split Tunnel Enabled but... Full Story