FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Not applicable
Article Id 198497

Description

The steps below show how to enable and configure logging to Hard Drive.

Note :  FortiOS only allows the use of the CLI for this configuration.


Scope
This procedure is written for and can only be used with devices that have a Fortinet hard drive properly installed.


Solution
Configuration (CLI only)

Replace values between '<' and '>' with values from requirements.

config log disk filter
set app-ctrl enable
set attack enable
set dlp enable
set email enable
set event enable
set severity information
set virus enable
set web enable
set anomaly enable
set app-ctrl-all enable
set blocked enable
set dlp-all enable
set email-log-imap enable
set email-log-pop3 enable
set email-log-smtp enable
set ftgd-wf-block enable
set ftgd-wf-errors enable
set infected enable
set oversized enable
set signature enable
set url-filter enable
set web-content enable
set web-filter-activex enable
set web-filter-applet enable
set web-filter-cookie enable
end
config log disk setting
set status enable
end

Important : Once these steps have been performed in CLI the user must log out and log in as a GUI option has been added.

Console in GUI can be used to simplify this procedure in not requiring a terminal connection

sotoole_100113_100113-config_log_filter.jpg

Verification

In order to generate log events for the settings now made a CLI command can be used : Console in the GUI can be used in order to perform this in simple steps.


CLI log test command:

#diagnose log test

 

 

Related Articles

Configure traffic logging to FortiGate Hard Drive

Technical Tip : Troubleshoot and verify if traffic is hitting a Firewall Policy

Contributors