Configure Fortinet Fortigate for syslog log forwarding to Radiant Security.
Overview
In this guide, you will configure syslog log forwarding for Fortinet Fortigate.
You’ll do this by completing the following steps:
- Add the data connector in Radiant Security
- Configure the syslog token on the Fortigate Firewalls
- Configure TLS syslog directly from FortiGate Firewalls
- Configure a local Radiant Security Syslog Forwarder
- Configure log forwarding with FortiAnalyzer
Licenses
No additional license is required to forward the syslog events directly from each firewall console, but if the client has FortiAnalyzer the log collection and forwarding is centralized and requires a different step-by-step which is covered below on the Configure log forwarding with FortiAnalyzer section.
Configure the syslog token on the Fortigate Firewalls
- Access the Fortigate CLI.
- Enter the following commands to create a custom log field and apply it to the logging configuration. Repeat this step on all Fortigate firewalls.
- Update the values between
<>
with the corresponding values:- The
fieldID
can be set to any value that can help identify thecustom-field
. - The
token
is provided by Radiant Security during the Data Connector setup.
- The
- Update the values between
config log custom-field
edit <fieldID>
set name rs_fg_st
set value <token>
end
config log setting
set custom-log-fields <fieldID>
end
Configure TLS syslog directly from FortiGate Firewalls
Use the following help article as a reference: Log settings and targets.
- In FortiGate, go to System > Certificates > Create/Import > CA Certificate > File
- Upload the CA certificate provided by Radiant Security to FortiGate as a Remote CA.
-
Log into the FortiGate CLI and configure the following syslogd setting:
config log syslogd setting
set status enable
set server "primary.syslog.radiantsecurity.ai"
set mode reliable
set port 6514
set enc-algorithm high
end
Configure a local Radiant Security Syslog Forwarder
Note: When using FortiAnalyzer, the implementation of the Radiant Security Syslog Collector is mandatory.
Refer to the Deploy a Radiant Security Syslog Collector guide to set up a local Radiant Syslog Forwarder.
Configure log forwarding with FortiAnalyzer
- Access the FortiAnalyzer Console, go to System Settings > Log Forwarding.
- In the toolbar, click Create New.
- On the new pane, configure the following settings:
- Name: RadiantSecurity_Connector
- Status: ON
- FQDN/IP: Enter the IP address of the local syslog forwarder
- Syslog Server Port: 6514
- Reliable Connection: ON
- Log Filters: ON
- Log messages that match: Any of the Following Conditions
- Add the following filters:
- Log Type Equal To Traffic
- Log Type Equal To Event
- Log Type Equal To UTM
- Click OK to save your changes.
We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai
Last updated: 2025-01-09