This project simulates a fully functional enterprise-grade Security Operations Center (SOC) environment using Fortinet, Cisco & Palo Alto hardware and integrated cybersecurity platforms (FortiSIEM, Suricata, Tenable Nessus). This project performs Cyberattacks and supports real-time Threat Detection & Monitoring, Incident Response, and continuous Vulnerability Management, showcasing the workflows of a professional Tier I/II SOC Analyst & SIEM Engineer
By Md Muhtashim Jahin Date: Mar 11, 2025
This project simulates a fully functional enterprise-grade Security Operations Center (SOC) environment using Fortinet, Cisco & Palo Alto hardware and integrated cybersecurity platforms (FortiSIEM, Suricata, Tenable Nessus). This project performs Cyberattacks and supports real-time Threat Detection & Monitoring, Incident Response, and continuous Vulnerability Management, showcasing the workflows of a professional Tier I/II SOC Analyst & SIEM Engineer
The lab infrastructure consists of:
Firewalls: FortiGate Rugged 60D (Hardware) and Palo Alto NGFW (VM)
Router: Cisco ISR 4300 Router (Connected through Patch Panel), Cisco CSR Router (VM)
Switch: Cisco Catalyst C9200-48P (Connected through Patch Panel)
SIEM: FortiSIEM (Security Monitoring, Log Management Solution, Log Collector, Ticketing)
IDS: Suricata (NIDS/Network Intrusion Detection System)
Vulnerability Scanner: Tenable Nessus (API integrated with FortiSIEM)
All network devices and security appliances forward Syslog and SNMP logs to FortiSIEM, enabling centralized event correlation and Alert Generation.
Custom correlation rules were created within FortiSIEM to generate alerts based on event severity, ranging from low to critical. To validate detection and response capabilities, a series of controlled attacks were executed from an attacker machine connected to the internet, including:
These simulated threats triggered FortiSIEM alerts, which were promptly analyzed and triaged. Incidents were tracked using FortiSIEM’s integrated ticketing system, with documented workflows for investigation, containment, and remediation.
Active incident response was performed by blocking malicious IP addresses through firewall policies on both FortiGate and Palo Alto devices. Tickets were closed after verification of mitigation effectiveness via log review and vulnerability reassessment using Nessus.
Component Configurations
Palo Alto NGFW:
FortiGate Rugged 60D:
Suricata IDS:
Edited detection rules to generate alerts on:
FortiSIEM:
Tenable Nessus:
Cisco CSR Router:
This lab reflects a real-world security operations environment that strengthens skills in threat detection, incident response, and vulnerability remediation using best-in-class hardware and software tools.
Connecting FortiGate, Palo Alto NGFW, Cisco CSR Router to send logs to FortiSIEM.
Configuring SNMP on FortiGate
Parameter | Value |
Community Name | Up to you |
IP Address | FortiSIEM IP Address |
Agent | Enable |
Go to FortiGate> Interfaces, in administrative access, allow SNMP on the port connected to the NAT.
Configuring Syslog on FortiGate
Go to FortiSIEM and navigate to Analytics> Attributes. Provide the following information:
Attribute | Value |
Reporting IP | Your FortiGate IP Address |
n CMDB>Firewalls, to know your Firewall has been added successfully
Palo Alto NGFW SNMP & Syslog log forwarding to FortiSIEM
Configure SNMP
Configure Syslog
Assign the SNMP and Syslog Profile you have created in the previous step in the Device > log Settings> System
Cisco CSR Router Syslog logs forward to FortiSIEM.
(config)# logging trap debugging
(config)# logging host [YOUR FortiSIEM SERVER IP] transport udp port 514
Connect Nessus API to FortiSIEM
Step 1: Enter Credentials
Go to ADMIN>SETUP> CREDENTIALS>New in FortiSIEM to create credentials.
Step 2: Enter IP Range to Credential Associations
Assign Nessus IP to the credentials you created in step1 with following information:
IP/Host Name: 142.232.1xx.x (Nessus Essentials host IP).
Credentials: Name of profile you created in Step1
Go to ADMIN -> Setup -> Pull Events
The yellow icon beside the Nessus pull job should turn green
Vulnerability Management: Vulnerability management is a proactive process that involves identifying, assessing, prioritizing, and remediating security weaknesses of Systems & Software.
Nessus Essentials is a free vulnerability management tool, specifically a vulnerability scanner, developed by Tenable. It’s used to identify security weaknesses and vulnerabilities in systems, software, and networks before attackers can exploit them. Nessus scans target systems, analyzes them for known vulnerabilities, and provides detailed reports with remediation recommendations.
I have integrated the Nessus Scanner API to FortiSIEM.
Nessus Logs in FortiSIEM.
Threat Detection: Threat detection using SIEM (Security Information and Event Management) involves leveraging a centralized platform to monitor, analyze, and correlate security data from various sources to identify potential threats and security incidents. SIEM systems use log data, security alerts, and threat intelligence to detect unusual activities, policy violations, and suspicious patterns indicative of cyberattacks or insider threats.
All components in our Network are Sending Logs to FortiSIEM.
At first, the attacker launched a DDoS Attack on FortiGate Rugged 60D Firewall.
We can detect that on FortiSIEM.
The attacker launched a UDP Flood on the Palo Alto Firewall.
Later, the Attacker did a Credential Dump and a Brute-Force attack on the FortiGate Firewall. Through FortiSIEM, I can detect that FortiSIEM generated Incidents and Events, the severity is high, as I made the rule to generate a High Alert.
Difference between Credential Dump and Brute-Force Attack: A Credential Dump attack and a Brute-Force attack are both methods used by attackers to gain unauthorized access to accounts, but they differ in their approach.
A credential dump attack leverages lists of leaked or stolen username/password combinations, often obtained from previous data breaches.
A brute force attack, on the other hand, systematically tries different username and password combinations until the correct one is found, regardless of whether they are leaked or not.
FortiGate Credential Dump Attempt Detection
Brute-Force Incident Alert was generated by FortiSIEM after detecting the brute force attempt pattern mentioned in the rule.
Incident Response
Incident response in a Security Operations Center (SOC) is the process of detecting, analyzing, containing, and recovering from security incidents like cyberattacks or data breaches.
Incident Response Plan for Detected Threats
Incident Type: Denial-of-Service (DoS) / UDP Flood Attack