Fortinet black logo
4.4.0

OCI environment setup

OCI environment setup

Before deploying a FortiSandbox instance, some basic steps are required to setup in OCI platform

Create a virtual cloud network (VCN)

To create a VCN:
  1. In OCI, go to Networking > Virtual Cloud Networks, and click Create VCN.
  2. In the Name field, enter the VCN name, In the IPv4 CIDR Blocks, enter the IPv4 subnet.

  3. Click Create VCN at the bottom of the screen.

Create a security list

The security list works as the Firewall for the virtual cloud network (VCN).

To create a security list:
  1. Go to the VCN you just created and click Security Lists, then click Default Security List for xxx (VCN name) . By default, port 22 is allowed.

  2. Click Add Ingress Rules > Add Rule. Manually add some rules to allow TCP/UDP port. FortiSandbox requires the following Ingress rules:

    IP Protocol

    Destination Port Range

    TCP

    22 (SSH access)

    TCP

    443 (HTTPS)

    TCP

    80 (HTTP)

    TCP

    2015, 2018( Cluster)

    TCP

    514

    (OFTPD Fortinet Fabric devices such as FortiGate and FortiMail need to submit jobs)

    Tooltip

    For a complete list of ports that you must allow for the FortiSandbox-VM instance, see Port and access control information.

    Tooltip

    More rules can be added. For example, you can add a rule to allow access to FortiSandbox MTA adapter. For more port information, see Port and access control information section of the FortiSandbox Administration Guide.

Create a Gateway and Route table

Some of the FortiSandbox features need access to the Internet, so you will need to set up a Gateway and Route table that allows subnets in the Virtual Cloud Network (VCN) to access the Internet. There are two type of gateways to set up:

Interface

Type

Port1

Internet Gateways

Port3

NAT Gateways (A NAT gateway lets instances that do not have public IP addresses access the internet.)

To create a Gateway and Route table:
  1. Go to the VCN you created previously, and click Internet Gateways, then click Create Internet Gateway.

  2. Go to the VCN you created previously, and click NAT Gateways, then click Create NAT Gateway.

  3. Go to the VCN you created previously, and click Route Tables, then click Create Route Table. Configure the following fields and click Create.

    Port1 Route settings:

    NameEnter a name for the Port 1 route policy, then click Another Route Rule.
    Target Type Select Internet Gateway.
    Destination CIDR Block Enter the 0.0.0.0/0.

    Target Internet Gateway

    Select the gateway you created previously.

  4. Go to the VCN you created previously and click Route Tables, then click Create Route Table. Configure the following settings and click Create.

    Port3 Route settings:

    Name Enter a name for the Port 3 route policy, then click Another Route Rule
    Target Type Select NAT Gateway.
    Destination CIDR Block Enter 0.0.0.0/0.
    Target NAT Gateway Select the gateway you created previously.

Create Subnets

OCI FortiSandbox needs at least one subnet to use Windows Cloud VM. If you need to configure a Cluster and Customized VM, you will need at least three subnets.

Note

OCI FortiSandbox needs at least three subnets for the Customized VM feature:

  • Port1 is used to access and manage FortiSandbox.

  • Port2 is used for HA-Cluster communication.

  • Port3 is used for local CUSTOM VM communication.

Interface

Services

port1 (administration port)

Port1 is hard-coded as the administration interface. You can enable or disable HTTP, SSH, or Telnet access rights on port1.

HTTPS is enabled by default.

You can use port1 for Device mode, although a different, dedicated port is recommended.

Port2

You can use port2 for Sniffer mode, Device mode, or inter-node communication within a cluster.

port3 (VM outgoing interface)

Port3 is reserved for outgoing communication triggered by the execution of the files under analysis.

FortiSandbox uses port3 to allow scanned files to access the Internet. The Internet visiting behavior is an important factor to determine if a file is malicious. As malicious files are infectious, ensure that the connection for port3 is isolated but can also access the Internet. Do not allow this connection to belong to or be able to access any internal subnet that needs to be protected. Fortinet recommends placing this interface on an isolated network behind a firewall.

FortiSandbox VM accesses external networks through port3. Configure the next hop gateway and DNS settings in Scan Policy and Object > General Settings > Allow Virtual Machines to access external network through outgoing port3. This allows files running inside VMs to access the external network. One special type of outgoing communication from a guest VM is to connect to the Microsoft activation server to activate the Windows Sandbox VM product keys. Office licenses are verified through VM machines so internet access via port3 is required to contact Microsoft for license activation.

If the VM cannot access the outside network, a simulated network (SIMNET) starts by default. SIMNET provides responses to popular network services like HTTP where some malware is expected. If the VM internet access is down, the SIMNET status is displayed beside the down icon. Click that icon to go to the VM network configuration page.

To create the subnets:
  1. Go to the VCN you created previously, click Subnets then click Create Subnet.

  2. Create the subnet for port1 with the following configurations and click Create Subnet. You can use the default settings for the DHCP Options and Security List.
    NameEnter a name for the subnet.
    IPv4 CIDR BlockEnter the subnet for port1.
    Route table compartment in xxxxSelect the policy you created for port1.
    Subnet access
    • Port1 subnet: Select Public subnet.

    • Port 2 and Port 3 subnet: Select Private subnet

  3. Repeat Steps 1-2 to create the other subnets and select the corresponding route table.

OCI environment setup

Before deploying a FortiSandbox instance, some basic steps are required to setup in OCI platform

Create a virtual cloud network (VCN)

To create a VCN:
  1. In OCI, go to Networking > Virtual Cloud Networks, and click Create VCN.
  2. In the Name field, enter the VCN name, In the IPv4 CIDR Blocks, enter the IPv4 subnet.

  3. Click Create VCN at the bottom of the screen.

Create a security list

The security list works as the Firewall for the virtual cloud network (VCN).

To create a security list:
  1. Go to the VCN you just created and click Security Lists, then click Default Security List for xxx (VCN name) . By default, port 22 is allowed.

  2. Click Add Ingress Rules > Add Rule. Manually add some rules to allow TCP/UDP port. FortiSandbox requires the following Ingress rules:

    IP Protocol

    Destination Port Range

    TCP

    22 (SSH access)

    TCP

    443 (HTTPS)

    TCP

    80 (HTTP)

    TCP

    2015, 2018( Cluster)

    TCP

    514

    (OFTPD Fortinet Fabric devices such as FortiGate and FortiMail need to submit jobs)

    Tooltip

    For a complete list of ports that you must allow for the FortiSandbox-VM instance, see Port and access control information.

    Tooltip

    More rules can be added. For example, you can add a rule to allow access to FortiSandbox MTA adapter. For more port information, see Port and access control information section of the FortiSandbox Administration Guide.

Create a Gateway and Route table

Some of the FortiSandbox features need access to the Internet, so you will need to set up a Gateway and Route table that allows subnets in the Virtual Cloud Network (VCN) to access the Internet. There are two type of gateways to set up:

Interface

Type

Port1

Internet Gateways

Port3

NAT Gateways (A NAT gateway lets instances that do not have public IP addresses access the internet.)

To create a Gateway and Route table:
  1. Go to the VCN you created previously, and click Internet Gateways, then click Create Internet Gateway.

  2. Go to the VCN you created previously, and click NAT Gateways, then click Create NAT Gateway.

  3. Go to the VCN you created previously, and click Route Tables, then click Create Route Table. Configure the following fields and click Create.

    Port1 Route settings:

    NameEnter a name for the Port 1 route policy, then click Another Route Rule.
    Target Type Select Internet Gateway.
    Destination CIDR Block Enter the 0.0.0.0/0.

    Target Internet Gateway

    Select the gateway you created previously.

  4. Go to the VCN you created previously and click Route Tables, then click Create Route Table. Configure the following settings and click Create.

    Port3 Route settings:

    Name Enter a name for the Port 3 route policy, then click Another Route Rule
    Target Type Select NAT Gateway.
    Destination CIDR Block Enter 0.0.0.0/0.
    Target NAT Gateway Select the gateway you created previously.

Create Subnets

OCI FortiSandbox needs at least one subnet to use Windows Cloud VM. If you need to configure a Cluster and Customized VM, you will need at least three subnets.

Note

OCI FortiSandbox needs at least three subnets for the Customized VM feature:

  • Port1 is used to access and manage FortiSandbox.

  • Port2 is used for HA-Cluster communication.

  • Port3 is used for local CUSTOM VM communication.

Interface

Services

port1 (administration port)

Port1 is hard-coded as the administration interface. You can enable or disable HTTP, SSH, or Telnet access rights on port1.

HTTPS is enabled by default.

You can use port1 for Device mode, although a different, dedicated port is recommended.

Port2

You can use port2 for Sniffer mode, Device mode, or inter-node communication within a cluster.

port3 (VM outgoing interface)

Port3 is reserved for outgoing communication triggered by the execution of the files under analysis.

FortiSandbox uses port3 to allow scanned files to access the Internet. The Internet visiting behavior is an important factor to determine if a file is malicious. As malicious files are infectious, ensure that the connection for port3 is isolated but can also access the Internet. Do not allow this connection to belong to or be able to access any internal subnet that needs to be protected. Fortinet recommends placing this interface on an isolated network behind a firewall.

FortiSandbox VM accesses external networks through port3. Configure the next hop gateway and DNS settings in Scan Policy and Object > General Settings > Allow Virtual Machines to access external network through outgoing port3. This allows files running inside VMs to access the external network. One special type of outgoing communication from a guest VM is to connect to the Microsoft activation server to activate the Windows Sandbox VM product keys. Office licenses are verified through VM machines so internet access via port3 is required to contact Microsoft for license activation.

If the VM cannot access the outside network, a simulated network (SIMNET) starts by default. SIMNET provides responses to popular network services like HTTP where some malware is expected. If the VM internet access is down, the SIMNET status is displayed beside the down icon. Click that icon to go to the VM network configuration page.

To create the subnets:
  1. Go to the VCN you created previously, click Subnets then click Create Subnet.

  2. Create the subnet for port1 with the following configurations and click Create Subnet. You can use the default settings for the DHCP Options and Security List.
    NameEnter a name for the subnet.
    IPv4 CIDR BlockEnter the subnet for port1.
    Route table compartment in xxxxSelect the policy you created for port1.
    Subnet access
    • Port1 subnet: Select Public subnet.

    • Port 2 and Port 3 subnet: Select Private subnet

  3. Repeat Steps 1-2 to create the other subnets and select the corresponding route table.