Description
Solution
# conf vdom
edit "VDOM_NAME"
# conf log syslogd override-setting
set override enable
set status enable
set server x.x.x.x <----- Where x.x.x.x is the IP address of syslog server.
set port 514
set source-ip x.x.x.x <----- Optional to specify the source IP from where the connections will originate.
end
# config vdomWhen syslog-override is enabled, the following CLI commands are available for configuring VDOM override:
edit "VDOM_NAME"
# config log setting
set syslog-override enable
end
# config log syslogd/syslogd2/syslogd3/syslogd4 override-setting2) Configure the override filters.
set status enable
set server x.x.x.x <----- Where x.x.x.x is the IP address of syslog server.
set port 514
set source-ip x.x.x.x <----- Optional to specify the source IP from where the connections will originate.
end
# config log syslogd/syslogd2/syslogd3/syslogd4 override-filterThe change can now be verified from GUI.
set severity information
set forward-traffic enable
set local-traffic enable
set multicast-traffic enable
set sniffer-traffic enable
set anomaly enable
set voip enable
set dns enable
set ssh enable
set ssl enable
end
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.