Description
Solution
# execute ping logctrl1.fortinet.com
PING logctrl1.fortinet.com (208.91.113.103)
# diagnose test application dnsproxy 7
vfid=0, name=logctrl1.fortinet.com, category=255, ttl=10386:9724:1138
208.91.113.103 (ttl=10412)
# config log fortiguard settingNOTE.
(setting) # show full-configuration
# config log fortiguard setting
set status enable
set ssl-min-proto-version default
set source-ip 0.0.0.0
set interface-select-method auto
set upload-option 5-minute
set priority default
set max-log-rate 0
set enc-algorithm high
set conn-timeout 10
end
# diagnose test application forticldd 15) Validate FortiCloud log state
System=FGT Platform=Fortigate_Model
Management vdom: root, id=0, ha=master.
acct_id=User_ID@company_id.com
acct_st=OK
FortiGuard log: status=enabled, full=overwrite, ssl_opt=3, source-ip=0.0.0.0
Centra Management: type=FGD, flags=000000bf.
active-tasks=0
# diagnose test application miglogd 20(Other examples)
Home log server:
Address: 208.91.113.241:514, st: down
oftp status: connecting
spos: 0, slen: 0
rpos: 0, rlen: 12
Alternative log server:
Address: 208.91.113.201:514, st: down
oftp status: connecting
spos: 0, slen: 0
rpos: 0, rlen: 12
Active log server: ALTER
Number of log task: 1024
Number of task in list: 1024
Debug zone info:
Server IP: 208.91.113.241
Server port: 514
Server status: down
Log quota: 102400MB
Log used: 224MB
Daily volume: 20480MB
FDS arch pause: 0
fams archive pause: 0
stats: total=95970, acked=0, discard=94946, rejected=0
FGT # diagnose test application forticldd 36) Change FortiGuard Log setting
Debug zone info:
Domain:GLOBAL
Home log server: 173.243.132.171:514
Alt log server: 173.243.132.132:514
Active Server IP: 173.243.132.132
Active Server status: unknown
Log quota: 3145728MB
Log used: 0MB
Daily volume: 20480MB
fams archive pause: 0
APTContract : 0
APT server: 0.0.0.0:0
APT Altserver: 0.0.0.0:0
Active APTServer IP: 0.0.0.0
Active APTServer status: unknown
FGT # diagnose test application miglogd 20
Home log server:
Address: 173.243.132.171:514
Alternative log server:
Address: 173.243.132.143:514
oftp connection haven't been established
Debug zone info:
Server IP: 173.243.132.143
Server port: 514
Server status: unknown
Log quota: 3145728MB
Log used: 0MB
Daily volume: 20480MB
FDS arch pause: 0
fams archive pause: 0
# diagnose test application miglogd 208) Test connectivity to TCP port 514 on the FortiGateCloud servers from the FortiGate.
Home log server:
Address: 208.91.113.194:514, st: up
oftp status: established
spos: 521, slen: 521
rpos: 24, rlen: 24
Alternative log server:
Address: 208.91.113.101:514, st: unknown
oftp connection haven't been established
Active log server: HOME
Number of log task: 0
Number of task in list: 0
Debug zone info:
Server IP: 208.91.113.194
Server port: 514
Server status: up
Log quota: 102400MB
Log used: 394MB
Daily volume: 20480MB
FDS arch pause: 0
fams archive pause: 0
stats: total=610774, acked=610774, discard=0, rejected=0
# execute telnet 173.243.132.171 514A failed telnet connection, indicating that TCP port 514 is being blocked before reaching the FortiGateCloud server.
Trying 173.243.132.171...
Connected to 173.243.132.171.
<<the console may freeze for few moments then drop the connection with the following message>>
Connection closed by foreign host.
# execute telnet 173.243.132.171 5149) The FortiGate unit is using its routing table, to route the self-originated traffic to FortiGateCloud.
Trying 173.243.132.171...
Timeout!
Failed to connect to specified unit.
# config log fortiguard settingThis source-ip must be the IP address of some of the FortiGate interfaces.
set status enable
set ssl-min-proto-version default
set source-ip <IP-address (0.0.0.0 by default)>
set interface-select-method auto
end
# diagnose debug resetThe last command will restart the FortiCloud process and after a minute, it is possible to stop the outputs: '# diagnose debug reset'.
# diagnose debug console timestamp enable
# diagnose debug application forticldd -1
# diagnose debug enable
# fnsysctl killall forticldd
# diagnose sniffer packet any 'host <IP from previous output>' 4 0 l
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.