Description |
This article describes how to prevent ESP error logs from being sent to FortiAnalyzer. |
Scope | FortiGate v7.2.4 or more recent with FortiAnalyzer Logging. |
Solution |
From FortiOS v7.2.4, the ESP packet handling process has the detection of unknown ESP packets enabled by default. To verify if the feature is enabled, execute the following CLI command:
show full system settings | grep esp
When the FortiGate detects an invalid IPsec connection attempt, the IKE daemon drops the unknown ESP packet based on SPI. When an unknown ESP packet is dropped, an event log is generated.
Below is a sample log:
In some cases, an administrator would not like these logs to be forwarded to the FortiAnalyzer. Using the logid '0101037131', configure a filter to exclude these logs from being sent to FortiAnalyzer.
config log fortianalyzer filter config free-style edit 1 set category event next end end
On FortiGate, up to three FortiAnalyzers can be configured. The same configuration can be applied in 'config log fortianalyzer2 filter' and 'config log fortianalyzer3 filter'.
Related document: Blocking unwanted IKE negotiations and ESP packets with a local-in policy |