Fortinet white logo
Fortinet white logo

Administration Guide

Log configuration

Log configuration

Logs can be remotely backed up to an FTP server, automatically deleted, and sent to a remote syslog server in lieu of storing them locally.

Log settings

To configure log backups, automatic deletion, and remote storage, go to Logging > Log Config > Log Settings.

To configure log backups:
  1. Under Log Backup, select Enable remote backup.
  2. Set the Frequency to either Daily, Weekly, or Monthly.
  3. Configure the time of day that the backup will occur in one of the following ways:
    • Enter a time in the Time field.
    • Select Now to enter the current time.
    • Select the clock icon and choose a time from the pop-up menu: Now, Midnight, 6 a.m., Noon, or 6 p.m.
  4. In FTP directory, enter the FTP directory for a folder on a remote computer.
  5. Select an FTP server from the FTP server dropdown menu. For information on configuring an FTP server, see FTP servers.
  6. Select Save to save your settings.
To configure automatic log deletion:
  1. Under Log Auto-Deletion, select Enable log auto-deletion.
  2. Use the Auto-delete logs older than field and dropdown menu to specify the number of either day(s), week(s), or month(s) after which a log will be deleted. By default, the logs are automatically deleted after 12 months.
  3. Select Save to save your settings.
To configure logging to a FortiManager/FortiAnalyzer unit:
  1. Under FortiManager/FortiAnalyzer, select Send logs to FortiManager/FortiAnalyzer.
  2. Enter the Internet-facing IP address of the FortiManager or FortiAnalyzer unit.
  3. Select Save to save your settings.
To configure logging to a remote syslog server:

To use a client certificate for TLS authentication, enable Use Client Certificate for TLS Authentication and select a client certificate from the Client certificate dropdown.

  1. Under Remote Syslog, select Send system logs to remote Syslog servers.
  2. Move the remote syslog servers to which the logs will be sent from the Available Syslog Servers box to the Chosen Syslog Servers box.
  3. For information on adding syslog servers, see Syslog servers.

  4. Select Save to save your settings.
To send debug logs to a remote syslog server:
  1. Under Remote Syslog, select Send debug logs to remote Syslog servers.
  2. Move the available applications for which debug logs are to be forwarded from the Available Applications box to the Chosen Applications box.
  3. Move the remote syslog servers to which the debug logs will be sent from the Available Syslog Servers box to the Chosen Syslog Servers box.
  4. Select Save to save your settings.

Syslog servers

Syslog servers can be used to store remote logs. To view the syslog server list, go to Logging > Log Config > Syslog Servers. A maximum of 20 syslog servers can be configured.

Create New

Add a new syslog server.

Delete

Delete the selected syslog server or servers.

Edit

Edit the selected syslog server.

Name

The syslog server name on FortiAuthenticator.

Server name/IP

The server name or IP address, and port number.

To add a syslog server:
  1. From the syslog servers list, select Create New.
  2. Enter the following information:
    NameEnter a name for the syslog server on FortiAuthenticator.
    Server name/IPEnter the syslog server name or IP address.
    PortEnter the syslog server port number. The default port is 514.
    LevelSelect a log level to store on the remote server from the dropdown menu. See Level.
    FacilitySelect a facility from the dropdown menu.

    Secure Connection

    Enable

    Enable to send syslog messages over TLS.

    This option is disabled by default.

    Certificate authority type

    Select either the Local CA or the Trusted CA.

    CA certificate

    From the dropdown, select a local CA certificate used to verify the syslog server certificate.

    This option is only available when the Certificate authority type is Local CA.

    Trusted certificate

    From the dropdown, select a trusted certificate used to verify the syslog server certificate.

    This option is only available when the Certificate authority type is Trusted CA.

  3. Select Save to add the syslog server.

Log configuration

Log configuration

Logs can be remotely backed up to an FTP server, automatically deleted, and sent to a remote syslog server in lieu of storing them locally.

Log settings

To configure log backups, automatic deletion, and remote storage, go to Logging > Log Config > Log Settings.

To configure log backups:
  1. Under Log Backup, select Enable remote backup.
  2. Set the Frequency to either Daily, Weekly, or Monthly.
  3. Configure the time of day that the backup will occur in one of the following ways:
    • Enter a time in the Time field.
    • Select Now to enter the current time.
    • Select the clock icon and choose a time from the pop-up menu: Now, Midnight, 6 a.m., Noon, or 6 p.m.
  4. In FTP directory, enter the FTP directory for a folder on a remote computer.
  5. Select an FTP server from the FTP server dropdown menu. For information on configuring an FTP server, see FTP servers.
  6. Select Save to save your settings.
To configure automatic log deletion:
  1. Under Log Auto-Deletion, select Enable log auto-deletion.
  2. Use the Auto-delete logs older than field and dropdown menu to specify the number of either day(s), week(s), or month(s) after which a log will be deleted. By default, the logs are automatically deleted after 12 months.
  3. Select Save to save your settings.
To configure logging to a FortiManager/FortiAnalyzer unit:
  1. Under FortiManager/FortiAnalyzer, select Send logs to FortiManager/FortiAnalyzer.
  2. Enter the Internet-facing IP address of the FortiManager or FortiAnalyzer unit.
  3. Select Save to save your settings.
To configure logging to a remote syslog server:

To use a client certificate for TLS authentication, enable Use Client Certificate for TLS Authentication and select a client certificate from the Client certificate dropdown.

  1. Under Remote Syslog, select Send system logs to remote Syslog servers.
  2. Move the remote syslog servers to which the logs will be sent from the Available Syslog Servers box to the Chosen Syslog Servers box.
  3. For information on adding syslog servers, see Syslog servers.

  4. Select Save to save your settings.
To send debug logs to a remote syslog server:
  1. Under Remote Syslog, select Send debug logs to remote Syslog servers.
  2. Move the available applications for which debug logs are to be forwarded from the Available Applications box to the Chosen Applications box.
  3. Move the remote syslog servers to which the debug logs will be sent from the Available Syslog Servers box to the Chosen Syslog Servers box.
  4. Select Save to save your settings.

Syslog servers

Syslog servers can be used to store remote logs. To view the syslog server list, go to Logging > Log Config > Syslog Servers. A maximum of 20 syslog servers can be configured.

Create New

Add a new syslog server.

Delete

Delete the selected syslog server or servers.

Edit

Edit the selected syslog server.

Name

The syslog server name on FortiAuthenticator.

Server name/IP

The server name or IP address, and port number.

To add a syslog server:
  1. From the syslog servers list, select Create New.
  2. Enter the following information:
    NameEnter a name for the syslog server on FortiAuthenticator.
    Server name/IPEnter the syslog server name or IP address.
    PortEnter the syslog server port number. The default port is 514.
    LevelSelect a log level to store on the remote server from the dropdown menu. See Level.
    FacilitySelect a facility from the dropdown menu.

    Secure Connection

    Enable

    Enable to send syslog messages over TLS.

    This option is disabled by default.

    Certificate authority type

    Select either the Local CA or the Trusted CA.

    CA certificate

    From the dropdown, select a local CA certificate used to verify the syslog server certificate.

    This option is only available when the Certificate authority type is Local CA.

    Trusted certificate

    From the dropdown, select a trusted certificate used to verify the syslog server certificate.

    This option is only available when the Certificate authority type is Trusted CA.

  3. Select Save to add the syslog server.