SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
FORTIGATE FIREWALL HOW TO
LOGGING

www.ipmax.it
INTRODUCTION
One of the most useful tools on the FortiGate machine is the logging facility.
There are several methods to enable logging, they differ from the facility you will use to
save them. You could keep them on a circular buffer in the system memory, on the
system hard disk (if your system has one), send them to a FortiManager station, to a
FortiAnalyzer or to the FortiCloud service (if you have subscription).
In the following slides, we will show you how to enable logging and some tips to get it
working either you chose to use the system memory or hard disk.
CONFIGURING LOGGING
To configure logging you should go to: Log & Report > Log Config > Log Settings
In our example we have chosen to send
logs to the hard disk. This destination
could be configured checking the Disk
check box under the “Logging and
Archiving” section.
Be sure that under the “GUI Preferences”
section the “Display Logs From” is
configured on Disk. This setting is
required in order to get logs from the
correct source when you try to read
them from the

Log & Report > Traffic Log > Forward
Traffic or from Log & Report > Event Log
> System
CONFIGURING LOGGING – CONTINUED
Sometimes may happen that under the “Logging and Archiving” menu the Disk option is not available.
This problem could happen in case the system Disk is not installed or the logging to disk has been
disabled using the CLI.
In order to enable logging to disk, connect to the FortiGate CLI and give the following commands:

config log disk setting
set status enable
end

Sometimes may happen that under the “Display Logs From” menu the Disk option is not available.
This problem could happen in case the system Disk is not formatted. In order to verify this eventuality
use the following command from the system CLI:

get system status
In case you get “Log hard disk: Need format” a disk format is required. Use the following command to
execute it:

execute formatlogdisk
The system will reboot and then you will be able to configure the above option.
CONFIGURING LOGGING – CONTINUED
In case you want to enable logging to the system memory (in case the hard disk is
not available) you should activate it using the following CLI commands:

config log memory setting
set status enable
end
Then the memory should be selected in the “Display Logs From” menu.
Only a reduced set of logs will be available using this method because the circular
buffer is reduced in size.
DISPLAYING LOGS
Logs could be viewed under Log & Report > Log Config , then you should chose which log
you want to view.
For example, “Traffic Logs” shows you logs related to the traffic flowing through the firewall,
“Event Logs” shows system related events.

NOTE: In the example there is a
column with the “Application
Name”., this information is
available
only
enabling
Application Control (shown on
future postings).
MORE NEEDS?
See hints on www.ipmax.it
Or email us your questions to info_ipmax@ipmax.it
IPMAX
IPMAX is a Fortinet Partner in Italy.
IPMAX is the ideal partner for companies seeking quality in products and
services. IPMAX guarantees method and professionalism to support its
customers in selecting technologies with the best quality / price ratio, in the
design, installation, commissioning and operation.

IPMAX srl
Via Ponchielli, 4
20063 Cernusco sul Naviglio (MI) – Italy
+39 02 9290 9171

Contenu connexe

En vedette

October War_Effective Egyptian Preprarations Enable Strategic Surprise
October War_Effective Egyptian Preprarations Enable Strategic SurpriseOctober War_Effective Egyptian Preprarations Enable Strategic Surprise
October War_Effective Egyptian Preprarations Enable Strategic Surprise
W. Troy Ayres
 
On The Day the Last Nuclear Weapon is Destroyed
On The Day the Last Nuclear Weapon is DestroyedOn The Day the Last Nuclear Weapon is Destroyed
On The Day the Last Nuclear Weapon is Destroyed
kenleybutler
 
Javascript for php developer
Javascript for php developerJavascript for php developer
Javascript for php developer
Dang Tuan
 
Inventions: The computer
Inventions: The computerInventions: The computer
Inventions: The computer
andreasupertino
 
The vietnam-war
The vietnam-warThe vietnam-war
The vietnam-war
keza123
 
Similarities
SimilaritiesSimilarities
Similarities
ippnw
 

En vedette (18)

October War_Effective Egyptian Preprarations Enable Strategic Surprise
October War_Effective Egyptian Preprarations Enable Strategic SurpriseOctober War_Effective Egyptian Preprarations Enable Strategic Surprise
October War_Effective Egyptian Preprarations Enable Strategic Surprise
 
Nuclear power
Nuclear powerNuclear power
Nuclear power
 
WWI 5 Weapons
WWI 5 WeaponsWWI 5 Weapons
WWI 5 Weapons
 
On The Day the Last Nuclear Weapon is Destroyed
On The Day the Last Nuclear Weapon is DestroyedOn The Day the Last Nuclear Weapon is Destroyed
On The Day the Last Nuclear Weapon is Destroyed
 
Javascript for php developer
Javascript for php developerJavascript for php developer
Javascript for php developer
 
Presentation1-2
Presentation1-2Presentation1-2
Presentation1-2
 
A global picture of drought occurrence, magnitude, and preparedness
A global picture of drought occurrence, magnitude, and preparednessA global picture of drought occurrence, magnitude, and preparedness
A global picture of drought occurrence, magnitude, and preparedness
 
Nuclear power plant
Nuclear power plantNuclear power plant
Nuclear power plant
 
The Invention of Nuclear Weapons
The Invention of Nuclear WeaponsThe Invention of Nuclear Weapons
The Invention of Nuclear Weapons
 
Inventions: The computer
Inventions: The computerInventions: The computer
Inventions: The computer
 
Poverty and Hunger Reduction – a new mix of growth and social protection poli...
Poverty and Hunger Reduction – a new mix of growth and social protection poli...Poverty and Hunger Reduction – a new mix of growth and social protection poli...
Poverty and Hunger Reduction – a new mix of growth and social protection poli...
 
The vietnam-war
The vietnam-warThe vietnam-war
The vietnam-war
 
Red Star Over China (Speaker: Vincent Lee Kwun-leung) [Part 2]
Red Star Over China (Speaker: Vincent Lee Kwun-leung) [Part 2]Red Star Over China (Speaker: Vincent Lee Kwun-leung) [Part 2]
Red Star Over China (Speaker: Vincent Lee Kwun-leung) [Part 2]
 
Technical Properties of A Nuclear Power Plant
Technical Properties of A Nuclear Power PlantTechnical Properties of A Nuclear Power Plant
Technical Properties of A Nuclear Power Plant
 
Chapter3
Chapter3Chapter3
Chapter3
 
Heroines And Heroes Of Sindh Long March
Heroines And Heroes Of Sindh Long MarchHeroines And Heroes Of Sindh Long March
Heroines And Heroes Of Sindh Long March
 
001 Middle East Intro
001 Middle East  Intro001 Middle East  Intro
001 Middle East Intro
 
Similarities
SimilaritiesSimilarities
Similarities
 

Plus de IPMAX s.r.l.

Plus de IPMAX s.r.l. (11)

Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatchHuawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionHuawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
 
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
Huawei Switch S5700  How To - Configuring single-tag vlan mappingHuawei Switch S5700  How To - Configuring single-tag vlan mapping
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
 
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication ProtocolHuawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
 
Huawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupHuawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setup
 
Huawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP AddressHuawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP Address
 
Huawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverHuawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP server
 
Fortigate Firewall How to - DLP
Fortigate Firewall How to - DLPFortigate Firewall How to - DLP
Fortigate Firewall How to - DLP
 
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP modeHUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
 
FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

FortiGate Firewall HOW-TO - Logging

  • 1. FORTIGATE FIREWALL HOW TO LOGGING www.ipmax.it
  • 2. INTRODUCTION One of the most useful tools on the FortiGate machine is the logging facility. There are several methods to enable logging, they differ from the facility you will use to save them. You could keep them on a circular buffer in the system memory, on the system hard disk (if your system has one), send them to a FortiManager station, to a FortiAnalyzer or to the FortiCloud service (if you have subscription). In the following slides, we will show you how to enable logging and some tips to get it working either you chose to use the system memory or hard disk.
  • 3. CONFIGURING LOGGING To configure logging you should go to: Log & Report > Log Config > Log Settings In our example we have chosen to send logs to the hard disk. This destination could be configured checking the Disk check box under the “Logging and Archiving” section. Be sure that under the “GUI Preferences” section the “Display Logs From” is configured on Disk. This setting is required in order to get logs from the correct source when you try to read them from the Log & Report > Traffic Log > Forward Traffic or from Log & Report > Event Log > System
  • 4. CONFIGURING LOGGING – CONTINUED Sometimes may happen that under the “Logging and Archiving” menu the Disk option is not available. This problem could happen in case the system Disk is not installed or the logging to disk has been disabled using the CLI. In order to enable logging to disk, connect to the FortiGate CLI and give the following commands: config log disk setting set status enable end Sometimes may happen that under the “Display Logs From” menu the Disk option is not available. This problem could happen in case the system Disk is not formatted. In order to verify this eventuality use the following command from the system CLI: get system status In case you get “Log hard disk: Need format” a disk format is required. Use the following command to execute it: execute formatlogdisk The system will reboot and then you will be able to configure the above option.
  • 5. CONFIGURING LOGGING – CONTINUED In case you want to enable logging to the system memory (in case the hard disk is not available) you should activate it using the following CLI commands: config log memory setting set status enable end Then the memory should be selected in the “Display Logs From” menu. Only a reduced set of logs will be available using this method because the circular buffer is reduced in size.
  • 6. DISPLAYING LOGS Logs could be viewed under Log & Report > Log Config , then you should chose which log you want to view. For example, “Traffic Logs” shows you logs related to the traffic flowing through the firewall, “Event Logs” shows system related events. NOTE: In the example there is a column with the “Application Name”., this information is available only enabling Application Control (shown on future postings).
  • 7. MORE NEEDS? See hints on www.ipmax.it Or email us your questions to info_ipmax@ipmax.it
  • 8. IPMAX IPMAX is a Fortinet Partner in Italy. IPMAX is the ideal partner for companies seeking quality in products and services. IPMAX guarantees method and professionalism to support its customers in selecting technologies with the best quality / price ratio, in the design, installation, commissioning and operation. IPMAX srl Via Ponchielli, 4 20063 Cernusco sul Naviglio (MI) – Italy +39 02 9290 9171