Description |
This article discusses security event alerts created by SNMP Traps and Event Logging and compares the two for usage in enterprise environments. |
Scope | FortiGate, SNMP, Logging. |
Solution |
Consider the following example scenario:
In this scenario, the following traffic has been sent through the FortiGate and causes it to both generate a log entry and also an SNMP trap for the event:
Attacker (Source) IP Address: 192.168.0.4 Server (Destination) IP Address: 10.0.0.4 FortiGate mgmt Interface Address: 172.16.0.1 Network Management Station (SNMP Trap Destination) Address: 172.16.0.85
Log generated:
date=2022-07-09 time=18:03:06 eventtime=1657414986873030266 tz="-0700" logid="0720018433" type="utm" subtype="anomaly" eventtype="anomaly" level="alert" vd="root" severity="critical" srcip=192.168.0.4 srccountry="Reserved" dstip=10.0.0.4 dstcountry="Reserved" srcintf="port2" srcintfrole="undefined" sessionid=0 action="detected" proto=1 service="PING" count=18990 attack="icmp_flood" icmpid="0x2f27" icmptype="0x08" icmpcode="0x00" attackid=16777316 policyid=1 policytype="DoS-policy" ref=http://www.fortinet.com/ids/VID16777316 msg="anomaly: icmp_flood, 650 > threshold 20, repeats 18990 times since last log, pps 656 of prior second" crscore=50 craction=4096 crlevel="critical"
SNMP trap generated:
Comparing the two, it is evident that the log entry contains more in-depth information than the SNMP trap. Both tools are still useful depending on the needs of the business employing the FortiGate:
Ultimately, administrators can select the alerting method(s) based on the needs/requirements of the business and what best aligns with existing processes/tools.
Key Points to Consider:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.