Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fortigate: reorder the fields for destination.domain #1391

Merged
merged 1 commit into from
Dec 11, 2024

Conversation

squioc
Copy link
Collaborator

@squioc squioc commented Dec 11, 2024

Reorder the fields used to fill destination.domain (according to their priority)

@squioc squioc added the enhancement New feature or request label Dec 11, 2024
@squioc squioc requested a review from a team December 11, 2024 13:39
Copy link

Smart descriptions generated from the latest tests at 2024-12-11 13:39:45:

Test File Smart Description
Fortinet/fortigate/tests/Configuration_changed.CEF.json Configuration is changed in the admin session
Fortinet/fortigate/tests/DLP.CEF.json Connection from 10.1.100.11 to 172.18.62.158:172.18.62.158 action block
Fortinet/fortigate/tests/DNS.CEF.json Connection from 10.1.100.11 to 172.16.200.55 action pass
Fortinet/fortigate/tests/DNS.STANDARD.json my-device observed DNS session initiated by 1.2.3.4:35305 to 8.8.8.8:53
Fortinet/fortigate/tests/DNS2.STANDARD.json dev-name observed DNS session initiated by 1.2.3.4:45362 to 8.8.8.8:53
Fortinet/fortigate/tests/IPS.CEF.json 172.16.200.55 connected to 10.1.100.11:44362
Fortinet/fortigate/tests/IP_SEC.STANDARD.json 1.1.1.1:500 connected to 93.187.43.9:500
Fortinet/fortigate/tests/LOGOUT.STANDARD.json Connection from 1.1.1.1 to 2.2.2.2 action logout
Fortinet/fortigate/tests/ROLL-LOG.STANDARD.json Disk log has rolled.
Fortinet/fortigate/tests/SSH.CEF-2.json Connection from 10.1.100.11 to 172.16.200.55 action passthrough
Fortinet/fortigate/tests/VoIP.CEF.json Connection from 10.1.100.11 to 172.16.200.55 action permit
Fortinet/fortigate/tests/WAD.STANDARD.json Connection from 2.2.2.2 to 1.1.1.1 action send
Fortinet/fortigate/tests/WAF.CEF.json Connection from 10.1.100.11 to 172.16.200.55 action passthrough
Fortinet/fortigate/tests/anomaly.CEF-2.json Connection from 10.1.100.11 to 172.16.200.55 action clear_session
Fortinet/fortigate/tests/anomaly.CEF.json Connection from 1.1.1.1 to 2.2.2.2 action clear_session
Fortinet/fortigate/tests/anomaly.CSV.json Anomaly detected between 1.1.1.1 and 2.2.2.2:20882 reason: anomaly: icmp_flood, 34 > threshold 25, repeats 306 times action clear_session
Fortinet/fortigate/tests/anomaly.STANDARD.json Anomaly detected between 1.1.1.1 and 2.2.2.2:20882 reason: anomaly: icmp_flood, 34 > threshold 25, repeats 306 times action clear_session
Fortinet/fortigate/tests/antivirus.CEF-2.json 10.1.100.11 connected to malicious URL http://172.16.200.55/virus/eicar.com action blocked)
Fortinet/fortigate/tests/antivirus.CEF.json 1.1.1.1 connected to malicious URL http://2.2.2.2/eicar.com action blocked)
Fortinet/fortigate/tests/application.CEF.json Connection from 10.1.100.11 to 104.80.89.24:detectportal.firefox.com action pass
Fortinet/fortigate/tests/dns.CSV.json Connection from 1.1.1.1 to 2.2.2.2 action pass
Fortinet/fortigate/tests/editpolicy.json Edit firewall.policy 756
Fortinet/fortigate/tests/email-spamfilter.CEF.json Connection from 10.1.100.11 to 172.18.62.158 action log-only
Fortinet/fortigate/tests/event_log_system_subtype.CEF.json Connection from 172.16.200.254 to 172.16.200.1 action login
Fortinet/fortigate/tests/event_log_user_subtype.CEF.json Connection from 10.1.100.11 to 172.16.200.55 action authentication
Fortinet/fortigate/tests/event_logdev.json Did not receive any log from device LOGDEV-NAME[ABCDEFGHIJKLMNOP] in past 48d18m52s (69138 minutes).
Fortinet/fortigate/tests/forwadedfor.json Connection from 11.0.0.0 to 10.0.0.1:sekoia.io action passthrough
Fortinet/fortigate/tests/hostname.STANDARD.json 1.1.1.1 connected to 2.2.2.2:443 (recognised as Web.Client)
Fortinet/fortigate/tests/icmp.json Connection from 1.1.1.1 to 2.2.2.2 action ip-conn
Fortinet/fortigate/tests/icmp6.json abc accepted icmp6/143/0 traffic initiated by :: to 12::16
Fortinet/fortigate/tests/icmp_CEF.json Connection from 1.1.1.1 to 2.2.2.2 action accept
Fortinet/fortigate/tests/ping.json abc accepted ping traffic initiated by 1.1.1.1 to 2.2.2.2
Fortinet/fortigate/tests/ssh_access.CEF.json Login disabled from IP 1.1.1.1 for 60 seconds because of 3 bad attempts
Fortinet/fortigate/tests/ssl_new_con.CEF.json SSL new connection
Fortinet/fortigate/tests/test_ips.STANDARD.json Connection from 1.2.3.4 to 4.5.6.7:10.20.30.40 action detected
Fortinet/fortigate/tests/test_unauthuser.json computer-039482 accepted microsoft-office365.published traffic initiated by 1.2.3.4 to 5.6.7.8
Fortinet/fortigate/tests/traffic_forward-RDP.CEF.json Connection from 1.1.1.1 to 2.2.2.2 action accept
Fortinet/fortigate/tests/traffic_forward.CEF-2.json Connection from 1.1.1.1 to 3.3.3.3 action timeout
Fortinet/fortigate/tests/traffic_forward.CEF-3.json Connection from 10.1.100.11 to 52.53.140.235 action close
Fortinet/fortigate/tests/traffic_forward.CEF-4.json Connection from 1.2.3.4 to 5.6.7.8 action client-rst
Fortinet/fortigate/tests/traffic_forward.CEF.json Connection from 2.2.2.2 to 3.3.3.3:3.3.3.3 action close
Fortinet/fortigate/tests/traffic_forward.CSV.json Connection from 1.1.1.1 to 2.2.2.2 action accept
Fortinet/fortigate/tests/traffic_forward.STANDARD.json Connection from 1.1.1.1 to 2.2.2.2 action accept
Fortinet/fortigate/tests/traffic_forward.STANDARD_2.json abc accepted https traffic initiated by 1.1.1.1 to 2.2.2.2
Fortinet/fortigate/tests/traffic_forward_FTNTFGTtz.CEF.json Connection from 172.16.222.150 to 172.18.67.10 action dns
Fortinet/fortigate/tests/traffic_nat.STANDARD.json abc observed server reset tcp/3727 session initiated by 1.1.1.1:52125 to 3.3.3.3:3727
Fortinet/fortigate/tests/traffic_nat_1.STANDARD.json FW-001 accepted dns traffic initiated by 1.2.3.4 to 5.6.7.8
Fortinet/fortigate/tests/tunnel.json ssl-tunnel statistics: sended bytes=71524041 received bytes=6151809
Fortinet/fortigate/tests/tunnel_statistics.CSV.json ipsec connection from 1.1.1.1:500 to 93.187.43.9:500: IPsec tunnel statistics
Fortinet/fortigate/tests/vpn.STANDARD.json A certificate is updated
Fortinet/fortigate/tests/vpn_login_failed.STANDARD.json 1.1.1.1: SSL user failed to logged in
Fortinet/fortigate/tests/vpn_na_ip.STANDARD.json SSL user failed to logged in
Fortinet/fortigate/tests/webfilter.CEF.json 10.1.100.11 was denied a connection to /bizsquads (category Malicious Websites)

@squioc squioc merged commit f6b8b85 into main Dec 11, 2024
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants