FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
kwcheng__FTNT
Article Id 189616

Description

 

This article describes the configuration of email alerts on the FortiGate and the VPN event ID which can be used to monitor IPsec VPN events.

Solution

 

Make sure that the IPsec tunnel is up and running before configuring the FortiGate to monitor the IPsec VPN status.

The default SMTP configuration will be used on the FortiGate and therefore, configure custom SMTP to use the SMTP server.


 
  1. Create an Automation Stitch under:
    Security Fabric -> Automation and create 'New Automation Stitch'.
 
 
 
 
  1. Select 'Add Trigger' and Create a new trigger.
     
     

     
     
     
  2. Select 'FortiOS Event Log'.
     
     
     
  3. Search for Event ID 37138 and select 'OK'.
     
     

     
  4. It is possible to see the trigger being added as above. Next, proceed to 'Add Action'.
     
     
     
     
  1. Create a new action.
     
     

     
     
     
  2. Select 'Email'.
     
     
     
     
  1. Configure the action name and recipient email address. Select 'OK' to save all configurations.

    Important Notes.
    23101 LOG_ID_IPSEC_TUNNEL_UP
    23102 LOG_ID_IPSEC_TUNNEL_DOWN
    23103 LOG_ID_IPSEC_TUNNEL_STAT

    The above logs are obsolete and cannot be used. Avoid using the above Event IDs to configure as the Automation Trigger.

    Moving forward, need to use the event IDs below instead for setting up as triggers for IPsec VPN.

37138 - MESGID_CONN_UPDOWN
37139 - MESGID_P2_UPDOWN