Created on
12-22-2025
01:45 AM
Edited on
12-23-2025
09:37 AM
By
Stephen_G
| Description | This article discusses an airgap environment scenario in which a small number of logs might be generated for configured UTMs. |
| Scope | FortiGate. |
| Solution |
UTM logs are generated only when relevant signatures or patterns are matched. If the traffic passing through the firewall does not match any signatures, the logs will not appear.
To test if IPS signatures are being correctly matched, the article Technical Tip: No IPS logs are being generated can be followed.
In an airgap environment, FortiGate devices can get the signature database updates from FortiManager.
It needs to be verified if the signature database is up-to-date or not with the following command:
FGT # diagnose autoupdate versions
If the last update date is old, as in the example below:
Application Definitions
FortiGate will be able to match a lesser number of signatures and patterns as per the old database; hence, fewer UTM logs will be generated.
The latest version info of any security service database can be found on the FortiGuard website, along with certain information pertaining to the change made in the release.
Verify if the central-management configuration is correct:
config system central-management
If the above configuration is correct, make sure the following steps are correctly done on FortiManager:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.