Logging and reporting for large networks
This section explains how to configure the FortiGate unit for logging and reporting in a larger network, such as an enterprise network. To set up this type of network, you are modifying the default log settings, and you are also modifying the default report.
The following procedures are examples and can be used to help you when configuring your own network’s log topology.
Since some of these settings must be modified or enabled or disabled in the CLI, it is recommended to review the FortiGate CLI Reference for any additional information about the commands used herein, as well as any that you would need to use in your own newtork’s log topology.
Modifying default log device settings
The default log device settings must be modified so that system performance is not compromised. The FortiGate unit, by default, has all logging of FortiGate features enabled and well as logging to either the FortiGate unit’s system memory or hard disk, depending on the model.
Modifying multiple FortiGate units’ system memory default settings
When the FortiGate unit’s default log device is its system memory, you can modify it to fit your log network topology. In this topic, the following is an example of how you can modify these default settings.
To modify the default system memory settings
- Log in to the CLI.
-
Enter the following command syntax to modify the logging settings:
config log memory setting
set status enable
end
-
Enter the following command syntax to modify the FortiGate features that are enabled for logging:
config log memory filter
set forward-traffic enable
set local-traffic enable
set sniffer-traffic enable
set anomaly enable
set voip enable
set multicast-traffic enable
set dns enable
end
- Repeat steps 2 and 3 for the other FortiGate units.
- Test the modified settings using the procedure below.
Modifying multiple FortiGate units’ hard disk default log settings
You will have to modify each FortiGate unit’s hard disk default log settings. The following is an example of how to modify these default settings.
To modify the default hard disk settings
- Log in to the CLI.
-
Enter the following command syntax to modify the logging settings:
config log disk setting
set ips-archive disable
set status enable
set max-log-file-size 1000
set storage Internal
set log-quota 100
set report-quota 100
end
-
In the CLI, enter the following to disable certain event log messages that you do not want logged:
config log eventfilter
set event enable
set system enable
set vpn enable
set user enable
set router disable
set wan-opt disable
end
- Repeat the steps 2 to 4 for the other FortiGate units.
- Test the modified settings using the procedure below.
Testing the modified log settings
After modifying both the settings and the FortiGate features for logging, you can test that the modified settings are working properly. This test is done in the CLI.
To test sending logs to the log device
- In the CLI, enter the following command syntax:
diag log test
-
When you enter the command, the following appears:
generating a system event message with level - warning
generating an infected virus message with level - warning
generating a blocked virus message with level - warning
generating a URL block message with level - warning
generating a DLP message with level - warning
generating an IPS log message
generating an anomaly log message
generating an application control IM message with level - information
generating an IPv6 application control IM message with level - information
generating deep application control logs with level - information
generating an antispam message with level - notification
generating an allowed traffic message with level - notice
generating a multicast traffic message with level - notice
generating a ipv6 traffic message with level - notice
generating a wanopt traffic log message with level - notification
generating a HA event message with level - warning
generating netscan log messages with level - notice
generating a VOIP event message with level - information
generating a DNS event message with level - information
generating authentication event messages
generating a Forticlient message with level - information
generating a URL block message with level - warning
- In the GUI, go to Log & Report > System Events, and view the logs to see some of the recently generated test log messages. You will be able to tell the test log messages from real log messages because they do not have “real” information; for example, the test log messages for the vulnerability scan contain the destination IP address of 1.1.1.1 or 2.2.2.2.
Configuring the backup solution
Even though you are logging to multiple FortiAnalyzer units, this is more of a redundancy solution rather than a complete backup solution in this example.
The multiple FortiAnalyzer units act similar to a HA cluster, since if one FortiAnalyzer unit fails, the others continue storing the logs they receive. In a backup solution, the logs are backed up to another secure location if something happens to the log device.
A good alternate or redundant option is the FortiCloud service, which can provide secure online logging and management for multiple devices.
Configuring logging to multiple FortiAnalyzer units
The following example shows how to configure logging to multiple FortiAnalyzer units. Configuring multiple FortiAnalyzer units is quick and easy; however, you can only configure up to three FortiAnalyzer units per FortiGate unit.
To configure multiple FortiAnalyzer units
-
In the CLI, enter the following command syntax to configure the first FortiAnalyzer unit:
config log fortianalyzer setting
set status enable
set server 172.20.120.22
set max-buffer-size 1000
set buffer-max-send 2000
set address-mode static
set conn-timeout 100
set monitor-keepalive-period 120
set monitor-failure-retry-period 2000
end
-
Disable the features that you do not want logged, using the following example command syntax:
config log fortianalyzer filter
set forward-traffic disable
...
end
-
Enter the following commands for the second FortiAnalyzer unit:
config log fortianalyzer2 setting
set status enable
set server 172.20.120.23
set max-buffer-size 1000
set buffer-max-send 2000
set address-mode static
set conn-timeout 100
set monitor-keepalive-period 120
set monitor-failure-retry-period 2000
end
-
Disable the features that you do not want logged, using the following example command syntax:
config log fortianalyzer2 filter
set event disable
...
end
-
Enter the following commands for the last FortiAnalyzer unit:
config log fortianalyzer3 setting
set status enable
set server 172.20.120.23
set max-buffer-size 1000
set buffer-max-send 2000
set address-mode static
set conn-timeout 100
set monitor-keepalive-period 120
set monitor-failure-retry-period 2000
end
-
Disable the features that you do not want logged, using the following example command syntax:
config log fortianalyzer3 filter
set voip disable
...
end
- Test the configuration by using the procedure, “Testing the modified log settings”.
- On the other FortiGate units, configure steps 1 through 6, ensuring that logs are being sent to the FortiAnalyzer units.
Configuring logging to the FortiCloud server
The FortiCloud server can be used as a redundant backup, or your primary logging solution. The following assumes that this service has already been registered, and a subscription has been purchased for expanded space. The following is an example of how to these settings are configured for a network’s log configuration. You need to have access to both the CLI and the GUI when configuring uploading of logs. The upload time and interval settings can be configured in the GUI.
To configure logging to the FortiCloud server
- Go to Dashboard and click Login next to FortiCloud in the License Information widget.
- Enter your username and password, and click OK. (Or register, if you have not yet done so.)
- Logs will automatically be uploaded to FortiCloud as long as your FortiGate is linked to your FortiCloud account.
- To configure the upload time and interval, go to Log & Report > Log Settings.
- Under the Remote Logging and Archiving header, you can select your desired upload time.
- With FortiCloud you can easily store and access FortiGate logs that can give you valuable insight into the health and security of your network.