On This Page
Configuring a Fortinet FortiManager to Send Syslogs
To monitor with full accountability, define TOS Aurora as a syslog server for each monitored FortiGate or FortiManager device. To get rule and object usage reporting, the FortiGate or FortiManager devices must send syslogs to TOS Aurora. To do this, define TOS Aurora as a syslog server for each monitored FortiGate or FortiManager device. This can be done by configuring SecureTrack as a Syslog server on the FortiGate firewalls or the FortiAnalyzer devices that receive the FortiGate logs. Afterwards, configure each firewall to allow the relevant traffic.
Syslog traffic must be configured to arrive to the TOS Aurora cluster that monitors the device - see Sending Additional Information via Syslog.
Syslog proxy is supported for specific devices. For more information on syslog proxy support for supported devices, see Configuring Devices to Send Logs.
Add TOS Aurora as a Syslog Server
-
Run these commands to create a syslog server address:
-
Based on your deployment, run one of the following:
Cloud deployments:
On-premises deployments:
-
Configure and enable the syslog server setting:
-
where:
syslogd specifies the configuration for each syslog server destination as FortiManager supports multiple active syslog server destinations.
<n> corresponds to the number of syslog servers supported by your FortiManager device version. For example, syslogd, syslogd2, syslog3, syslog4.
-