-
Notifications
You must be signed in to change notification settings - Fork 37
Fortinet Generator for Aerleon #393
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks great. Left some comments but none urgent. Most pressing perhaps is whether filter
is supported instead of action
for Fortinent and if that case needs a test. In any case, looks shippable.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd like some changes to be done, mainly:
- delete the filter name option from the target
- add support for local-in-policy
- being able to disable logging for some rules
And also add the plugin in the plugin supervisor. The rest is small fixes and suggestions.
Co-authored-by: Jason Benterou <jason.benterou+github@gmail.com>
Co-authored-by: Jason Benterou <jason.benterou+github@gmail.com>
Co-authored-by: Jason Benterou <jason.benterou+github@gmail.com>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #393 +/- ##
==========================================
+ Coverage 91.04% 91.13% +0.08%
==========================================
Files 107 109 +2
Lines 22854 23413 +559
Branches 4323 4429 +106
==========================================
+ Hits 20808 21338 +530
- Misses 1324 1343 +19
- Partials 722 732 +10
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
This PR introduces a new generator for the Fortinet Fortigate platform.
Output from tests not asserting errors have been tested against a Fortinet VM.
The header for a fortinet policy must include the source and destination interface and may include the address family.
Two options have been introduced that modify logging:
log_traffic_mode_all
andlog_traffic_start_session
, which enable two different logging modes and must be used in conjunction withlogging: true
.An example policy
Docs have been updated with the Fortinet generator's keywords.
This PR will resolve #62