Created on
‎05-22-2022
01:01 AM
Edited on
‎10-09-2025
05:34 AM
By
Jean-Philippe_P
Description | This article describes how to configure the automation stitch settings to get an email alert when the WAN link goes down. |
Scope | FortiGate v6.4.x, v7.0.x, v7.2.x., v7.4.x, FortiProxy. |
Solution |
Configuration.
CLI configuration.
Note: Event ID 22922 is for the link monitor configured here. It is possible to change it as per the requirement.
Note: The email server config is not mentioned here; refer to docs.fortinet.com for the email server config.
GUI configuration: Navigate to Security Fabric -> Automation -> Action and select 'Create New'.
Select 'Email':
Enter the Email address where to receive an email alert:
Select Trigger and select 'Create New':
Name the trigger and add the Link monitor status under the event: Note that in the Field filters, must to be add the interface that will be monitored.
Select Stitch and then select 'Create new'.
Add the trigger that was created in the above steps.
Add the action (Email), which was created in the above steps.
The Configuration is now complete:
Example configuration in the CLI:
config system automation-action
config system automation-trigger
config system automation-stitch
Note: GUI Test Automation Stitch would be greyed out for that. Refer to Technical Tip: 'Test Automation Stitch' button is greyed out when trying to test a newly created aut....
To correctly trigger the automation stitch, it is necessary to have set a link-monitor configuration that generates the FortiOS event log, for example:
config system link-monitor edit 1 end
With this, when the link-monitor status is down, an event ID 22922 is generated by the system, which will trigger an email configured in the automation action.
Note: Starting with v7.4.4, the default email server has been switched from notification.fortinet.net to fortinet-notifications.com. This default server is only available to registered devices with an active FortiCare support contract. The reply-to field in the source email is automatically updated to DoNotReply@fortinet-notifications.com for all servers, including custom ones. The alert mail will get triggered when only the event is generated in system events.
To filter events based on log parameters, follow the steps in:
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.