FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
avneesh_
Staff
Staff
Article Id 275145
Description This article describes that FortiGate can be configured to forward only VPN event logs to the Syslog server.
Scope FortiGate.
Solution

Once the syslog server is configured on the FortiGate, it is possible to create an advanced filter to only forward VPN events.

 

To create the filter run the following commands:

 

config log syslogd filter

    config free-style

        edit 1

            set category event

            set filter " action ssl-alert ssl-login-fail ssl-new-con tunnel-down tunnel-up ssl-exit-error"

            set filter-type include

        next 

     end

 

syslog.png

 

If there is a need to filter out certain VPN events or add them, check the action of the log entry and include/exclude that in the set filter 'action' list that is configured above.

 

To check the VPN events generated by the FortiGate, go to Log & Report -> System Events -> VPN Events and look for the value under the Action tab to add/delete from the filter list:

 

Example:

 

1.gif

 

Alternative filter example: 

 

set filter "subtype vpn"

 

Note:

To send only logs from the free-style filter, it is necessary to disable all of the default log domains: 

 

config log syslogd filter

set forward-traffic disable
set local-traffic disable
set multicast-traffic disable
set sniffer-traffic disable
set ztna-traffic disable
set anomaly disable
set voip disable
set gtp disable

end

 

Related documents:

Technical Tip: Configuring advanced syslog free-style filters.

Technical Tip : How to use the facility function of syslogd.

config log syslogd setting - FortiGate CLI reference.