Description | This article describes basic steps to gather information about triggers and parameters for a certain attack ID and the attack signature. |
Scope | FortiGate v6.x, v7.x. |
Solution |
A lot of data can be collected with related logs
Example: Using FortiAnalyzer to collect DDoS attack logs.
Fortinet Product Security Incident Response Team (PSIRT) Contact Form
Technical Tip: How to find the description of signature in attack log
Troubleshooting Tip: Identify the IPS signature matching context
Example:
config ips sensor
After these are enabled, when the signature triggers again a packet capture file (.pcap) will be generated and can be downloaded alongside the normal log.
The packet log can be downloaded on the same page Log & Report -> Intrusion Prevention. Select the alert for IPS signature 'Sybase.EAServer.Remote.Buffer.Overflow' and in the right panel under log details there should be a tab 'Archived Data'. Select the 'Archive File' button to download the PCAP file.
Make sure the following settings are enabled to gather Archived Data:
config log disk setting
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.