Log Forwarding – FortiAnalyzer – FortiOS 6.2.3

Configuring log forwarding

Forwarding mode only requires configuration on the client side. No configuration is needed on the server side. In aggregation mode, accepting the logs must be enabled on the FortiAnalyzer that is acting as the server.

Forwarding mode

Forwarding mode can be configured in the GUI. No configuration is required on the server side.

To configure the client:

  1. Go to System Settings > Log Forwarding.
  2. Click Create New in the toolbar. The Create New Log Forwarding pane opens.
  3. Fill in the information as per the below table, then click OK to create the new log forwarding. The FortiAnalyzer device will start forwarding logs to the server.
Name Enter a name for the remote server.
Status Set to On to enable log forwarding. Set to Off to disable log forwarding.
Remote Server Type Select the type of remote server to which you are forwarding logs:

FortiAnalyzer, Syslog, or Common Event Format (CEF). The Syslog option can be used when forwarding logs to FortiSIEM and FortiSOAR.

Server IP Enter the IP address of the remote server.
Server Port Enter the server port number. Default: 514.

This option is only available when the server type in not FortiAnalyzer.

Reliable Connection Turn on to use TCP connection. Turn off to use UDP connection.

If you want to forward logs to a Syslog or CEF server, ensure this option is supported.

RELP is not supported.

If the connection goes down, logs are buffered and automatically forwarded when the connection is restored. The buffer limit is 12GB.

Sending Frequency Select when logs will be sent to the server: Real-time, Every 1 Minute, or Every 5 Minutes (default).

This option is only available when the server type is FortiAnalyzer.

Log Forwarding Filters  
Device Filters Click Select Device, then select the devices whose logs will be forwarded.
Log Filters Turn on to configure filter on the logs that are forwarded.

Select All or Any of the Following Conditions in the Log messages that match field to control how the filters are applied to the logs.

Add filters to the table by selecting the Log Field, Match Criteria, and Value for each filter.

Enable Exclusions This option is only available when the remove server is a Syslog or CEF server.

Turn on to configure filter on the logs that are forwarded.

Add exclusions to the table by selecting the Device Type and Log Type. Then, add Log Fields to the Exclusion List by clicking Fields and specifying the excluded log fields in the Select Log Field pane.

Aggregation mode

Aggregation mode can only be configured using the CLI. Aggregation mode configurations are not listed in the GUI table, but still use a log forwarding ID number.

To configure the server:

  1. If required, create a new administrator with the Super_User See Creating administrators on page 224.
  2. Enable log aggregation and, if necessary, configure the disk quota, with the following CLI commands:

config system log-forward-service set accept-aggregation enable set aggregation-disk-quota <quota>

end

To configure the client:

  1. Open the log forwarding command shell:

config system log-forward

  1. Create a new, or edit an existing, log forwarding entry:

edit <log forwarding ID>

  1. Set the log forwarding mode to aggregation: set mode aggregation
  2. Set the server display name and IP address: set server-name <string> set server-ip <xxx.xxx.xxx.xxx>
  3. Enter the user name and password of the super user administrator on the server: set agg-user <string> set agg-password <string>
  4. If required, set the aggregation time from 0 to 23 hours (default: 0, or midnight): set agg-time <integer>
  5. Enter the following to apply the configuration and create the log aggregation: end

The following line will be displayed to confirm the creation of the log aggregation: check for cfg[<log forwarding ID>] svr_disp_name=<server-name>


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

This entry was posted in Administration Guides, FortiAnalyzer, FortiOS 6.2 on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.