This is the multi-page printable view of this section. Click here to print.
Fortinet
- 1: FortiGate firewalls
- 2: FortiMail
- 3: FortiWeb
1 - FortiGate firewalls
The following sections show you how to configure FortiGate Next-Generation Firewall (NGFW) to send their log data to Axoflow.
CAUTION:
Make sure to set data forwarding on your appliances/servers as described in this guide. Different settings like alternate message formats or ports might be valid, but can result in data loss or incorrect parsing.Prerequisites
- You have administrative access to the firewall.
- The date, time, and time zone are correctly set on the firewall.
- You have an AxoRouter deployed and configured. This device is going to receive the logs from the firewall.
-
You know the IP address the AxoRouter. To find it:
- Open the Axoflow Console.
- Select the Hosts or the Topology page.
- Click on AxoRouter instance that is going to receive the logs.
- Check the Networks > Address field.
Steps
Note: The steps involving the FortiGate user interface are just for your convenience, for details, see the official FortiGate documentation.
-
Log in to your FortiGate device. You need administrator privileges to perform the configuration.
-
Register the address of your AxoRouter as an Address Object.
-
Select Log & Report > Log Settings > Global Settings.
-
Configure the following settings:
- Event Logging: Click All.
- Local traffic logging: Click All.
- Syslog logging: Enable this option.
- IP address/FQDN: Enter the address of your AxoRouter:
%axorouter-ip%
-
Click Apply.
-
-
Add the appliance to Axoflow Console.
- Open the Axoflow Console and select Topology.
- Select + > Source.
- Select your source.
- Enter the parameters of the source, like IP address and FQDN.
- Select Create.
Labels
Axoflow automatically adds the following labels to data collected from this source:
label | value |
---|---|
vendor | fortinet |
product | fortigate |
format | kv |
Sending data to Splunk
When sending the data collected from this source to Splunk, Axoflow uses the following sourcetype and index settings:
sourcetype | index |
---|---|
fortigate_event | netops |
fortigate_traffic | netfw |
fortigate_utm | netfw |
Tested with: Fortinet FortiGate Add-On for Splunk technical add-on
2 - FortiMail
To onboard such an appliance to Axoflow, complete the generic appliance onboarding steps.
Labels
Axoflow automatically adds the following labels to data collected from this source:
label | value |
---|---|
vendor | fortinet |
product | fortimail |
format | kv |
Sending data to Splunk
When sending the data collected from this source to Splunk, Axoflow uses the following sourcetype and index settings:
sourcetype | index |
---|---|
fml:log |
Tested with: FortiMail Add-on for Splunk technical add-on
3 - FortiWeb
To onboard such an appliance to Axoflow, complete the generic appliance onboarding steps.
Labels
Axoflow automatically adds the following labels to data collected from this source:
label | value |
---|---|
vendor | fortinet |
product | fortiweb |
product | kv |
Sending data to Splunk
When sending the data collected from this source to Splunk, Axoflow uses the following sourcetype and index settings:
sourcetype | index |
---|---|
fwb_log | netops |
fwb_attack | netids |
fwb_event | netops |
fwb_traffic | netfw |
Tested with: Fortinet FortiWeb Add-0n for Splunk technical add-on