Created on
08-10-2024
01:51 PM
Edited on
08-06-2025
04:11 AM
By
Stephen_G
Description | This article describes how to verify if the logs are being sent out from the FortiGate to the Syslog server. |
Scope | FortiGate. |
Solution |
Make sure FortiGate's Syslog settings are correct before beginning the verification. Technical Tip: How to configure syslog on FortiGate
For the traffic in question, the log is enabled. Technical Tip: View historic SSL VPN user connectivity logs
diagnose sniffer packet any "host x.x.x.x and port 514" 6 0 a Replace x.x.x.x with the Syslog server IP address.
diagnose log test The default port is 514. However, in the example below, the Syslog server is configured on port 515:
As seen in the snippet of the packet capture below, tested a failed SSL VPN login with the username 'abcde' after initiating the capture. It is evident from the packet capture that FortiGate's specified port 515 was used to send logs to the Syslog server.
Related Articles: Technical Tip: How to configure syslog on FortiGate |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.