Created on 11-24-2022 09:33 PM Edited on 07-29-2024 02:33 PM By Jean-Philippe_P
Description |
This article describes the commands to backup logs from FortiGate using CLI which are stored on disk.
By default, if the logs are backed up to the FTP server, logs will be encrypted.
execute backup disk alllogs ftp <IP_address> <username> <password> execute backup disk log ftp <IP_address> <username> <password> <log_type> If it is necessary to upload the logs to FortiAnalyzer, it is necessary to decrypt it using LZ4 and then upload it to FortiAnalyzer. |
Scope | FortiGate version 7.0.4+ and Firewall with SSD. |
Solution |
To download the local logs stored on system memory or disk using CLI, the below commands can be used:
execute backup disk alllogs [ftp/tftp] <ftp server>[:ftp port] <user> <passwd> execute backup memory alllogs [ftp/tftp] <ftp server>[:ftp port] <user> <passwd>
For the logs stored on disk, there is an option to directly backup using a USB stick:
execute backup disk alllogs usb
execute backup disk alllogs ftp <IP_address> <username> <password> <compressed | uncompressed> execute backup disk log ftp <IP_address> <username> <password> <log_type> <compressed |uncompressed>
Now decompress the logs which can be uploaded to FortiAnalyzer: Technical Note: Transferring historical logs from a FortiGate hard disk to a FortiAnalyzer
Note:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.