FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Cayazo
Staff
Staff
Article Id 344977
Description This article describes the steps to configure the IBM Qradar as the Syslog server of the FortiGate.
Scope FortiGate, IBM Qradar.
Solution

To set up IBM QRadar as the Syslog server for FortiGate to send its logs to, follow the steps:

 

Step 1: Configure IBM QRadar to Receive Syslog Messages.

  • Create a Log Source in QRadar.
    Log in to the QRadar Console. In the Admin tab, go to Data Sources -> Log Sources.

Screenshot 2024-09-27 015453.jpg

 

Select 'New Log Source'.

 

Screenshot 2024-09-27 015537.jpg

 

Select 'Single Log Source'.

 

Screenshot 2024-09-27 015611.jpg

 

Search for the FortiGate.

 

Screenshot 2024-09-27 015646.jpg

 

Choose the 'Syslog' protocol.

 

Screenshot 2024-09-27 015256.jpg

 

Here, it is necessary to fill out these boxes:

Name: Give it a name, like 'FortiGate Syslog'.
Description: To properly identify the FortiGate that sends the logs.

Enabled: This is to enable/disable the log source.

Groups: If having groups of log sources pre-configured it is possible to choose them.

Events Coalescing: Enable or disable it depending on how it is desired to handle duplicate events.

 

Screenshot 2024-09-27 020039.jpg

 

Log Source Identifier: Type the IP address of the FortiGate device. Select Save.

 

If the Source is showing as 'Not Available' is required to 'deploy' the changes.

 

Screenshot 2024-09-27 020314.jpg

 

  • Syslog Port Configuration.
    QRadar needs to listen on the appropriate port for Syslog, usually UDP 514 or TCP 514. This can be verified at Admin -> System Settings. If necessary, enable listening on an alternate port by changing firewall rules on QRadar.

Step 2: Configure FortiGate to Send Syslog to QRadar.

Log in to the FortiGate device via a CLI or GUI.

 

  • Add Syslog Server in FortiGate (CLI).
    It is required to define QRadar as a Syslog server in the FortiGate configuration.

config log syslogd setting
    set status enable
    set server <QRadar_IP> ---> Enter the IP address of the QRadar server.
    set mode <udp or TCP>  ---> Depending on the QRadar configuration.
    set port <port> ---> Port 514 is the default Syslog port.
    set facility local7 ---> It is possible to choose another facility if necessary.
    set format default ---> Use the default Syslog format.
end

 

  • Configure Syslog Filtering (Optional).
    It is possible to filter what logs to send. For example, traffic logs, and event logs:

 

config log syslogd filter
    set severity information ---> Change the log level as desired: information, warning, critical, etc.
    set forward-traffic enable ---> Enable forwarding traffic logs.
    set local-traffic enable ---> Enable local traffic logs.
end

 

  • Adding Syslog Server using FortiGate GUI.
    It is also possible to configure Syslog using the FortiGate GUI:

Log in to the FortiGate GUI.
Go to Log & Report -> Log Settings.
On the configuration page, select Add Syslog in Remote Logging and Archiving.

 

Screenshot 2024-09-27 020511.jpg

 

Input the IP address of the QRadar server. Select Apply.

 

Related article:

Troubleshooting Tip: Syslog and log trouble shooting via CLI

Comments
MaryBolano
Staff
Staff

Excellent article @Cayazo !! Keep up the great job!!!

GILMENDO
Staff
Staff

Excellent contribution @Cayazo