Fortinet FortiGate NGFW Logs
Updated Nov 10, 2023Configure Fortinet FortiGate NGFW log forwarding using the CLI
You can configure Fortinet® FortiGate® Next-Generation Firewall (NGFW) to send the necessary logs to Arctic Wolf® for security monitoring.
Requirements
- An activated Arctic Wolf Sensor
- An SSH client (for example, PuTTY)
- A console cable
Steps
Step 1: Launch your SSH client
-
Connect one end of your console cable to the console port on the FortiGate appliance.
-
Connect the other end of your console cable to a serial communications (COM) port on your computer.
-
In your SSH client, configure these settings:
- Serial line — Enter
COM1
. - Speed (baud) — Enter
9600
. - Data bits — Enter
8
. - Stop bits — Enter
1
. - Parity — Select None.
- Flow control — Select None.
- Serial line — Enter
-
Sign in to the CLI with administrator permissions using your SSH client.
-
Run this command:
config log syslogd setting set status enable set server <sensor_ip> set mode udp set port 514 set format default end
Where:
<sensor_ip>
is the IP address of your Arctic Wolf physical or virtual sensor.
Step 2: Provide your Fortinet Fortigate information to Arctic Wolf
-
Sign in to the Arctic Wolf® Unified Portal.
-
Click Help > Open a New Ticket.
-
On the Open a New Ticket page, configure these settings:
- What is this ticket related to? — Select General request.
- Subject — Enter
Syslog changes
. - Related ticket (optional) — Keep blank.
- Message — Enter this information for your Concierge Security® Team (CST):
- Confirmation that you completed the steps in this configuration guide.
- The IP address or hostname you used during the configuration.
- Any questions or comments that you have.
-
Click Send Message.
Your CST will review the details, and then confirm that Arctic Wolf is successfully processing the logs.