VMware NSX security tag action
If an endpoint instance in a VMware NSX environment is compromised, this action will assign the configured security tag to the compromised endpoint.
This action is only available when the automation trigger is set to compromised host.
To set up the NSX quarantine action, you need to:
- Configure a VMware NSX SDN connector
- Configure an NSX security tag automation stitch
- Configure FortiAnalyzer logging on the FortiGate
Configure a VMware NSX SDN connector
The FortiGate retrieves security tags from the VMware NSX server through the connector.
To configure a VMware NSX SDN connector in the GUI:
- Go to Security Fabric > External Connectors.
- Click Create New.
- Select VMware NSX.
- Configure the settings as needed.
- Click OK.
To configure a VMware NSX SDN connector in the CLI:
config system sdn-connector edit "nsx" set type nsx set server "172.18.64.32" set username "admin" set password xxxxxxxxxxxx next end
Configure an NSX security tag automation stitch
Security tags are retrieved from the VMware NSX server through the NSX SDN connector.
To configure an automation stitch with an NSX security tag in the GUI:
- Go to Security Fabric > Automation and click Create New.
- Enter the stitch name (pcui-test).
- Configure the trigger:
- Click Add Trigger.
- Click Create and select Compromised Host.
- Enter the following:
Name
pcui-test
Threat level threshold
High
- Click OK.
- Select the trigger in the list and click Apply.
- Configure the VMware NSX Security Tag action:
- Click Add Action.
- Click Create and select VMware NSX Security Tag.
- Enter the following:
Name
pcui-test_quarantine-nsx
Specify NSX server(s)
Enable and select the SDN connector
Security tag
Select an existing tag, or create a new one
- Click OK.
- Select the action in the list and click Apply.
- Click OK.
To configure an automation stitch with an NSX security tag in the CLI:
- Create an automation trigger:
config system automation-trigger edit "pcui-test" set ioc-level high next end
- Create an automation action:
config system automation-action edit "pcui-test_quarantine-nsx" set action-type quarantine-nsx set security-tag "pcui-tag2" set sdn-connector "nsx" next end
- Create the automation stitch:
config system automation-stitch edit "pcui-test" set trigger "pcui-test" config actions edit 1 set action "pcui-test_quarantine-nsx" set required enable next end next end
Configure FortiAnalyzer logging on the FortiGate
The FortiAnalyzer is used to send endpoint compromise notification to the FortiGate.
See Configuring FortiAnalyzer for more information.
To configure FortiAnalyzer logging in the GUI:
- Go to Security Fabric > Fabric Connectors and double-click the FortiAnalyzer Logging card.
- Ensure the Status is Enabled, and configure the settings as needed.
- Click Apply.
To configure FortiAnalyzer logging in the CLI:
config log fortianalyzer setting set status enable set server "172.18.64.234" set serial "FL-8HFT000000000" set upload-option realtime set reliable enable end
When an endpoint instance is compromised
When an endpoint instance, such as pcui-ubuntu2, in the VMware NSX environment is compromised, the automation stitch is triggered. The FortiGate then assigns the configured security tag, pcui-tag2 in this example, to the compromised NSX endpoint instance.