Created on 
    
	
		
		
		08-05-2016
	
		
		06:47 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
  Edited on 
    
	
		
		
		10-31-2025
	
		
		03:28 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 By  
				
		
		
			Jean-Philippe_P
		
		
		
		
		
		
		
		
	
			 
		
Description
Scope
FortiCloud, FortiGate.
Solution
FGT # execute ping logctrl1.fortinet.com
PING logctrl1.fortinet.com (208.91.113.103)
FGT # diagnose test application dnsproxy 7
vfid=0, name=logctrl1.fortinet.com, category=255, ttl=10386:9724:1138
  208.91.113.103 (ttl=10412)
config log fortiguard setting
FGT (setting) # show full-configuration
config log fortiguard setting
    set status enable
    set ssl-min-proto-version default
    set source-ip 0.0.0.0
    set interface-select-method auto
    set upload-option 5-minute
    set priority default
    set max-log-rate 0
    set enc-algorithm high
    set conn-timeout 10
end
Note:
If there is no successful FortiCloud activation, it cannot adjust the above settings, and the status will be set to disabled.
FGT # diagnose test application forticldd 1
System=FGT Platform=Fortigate_Model
Management vdom: root, id=0,  ha=master.
acct_id=User_ID@company_id.com
acct_st=OK
FortiGuard log: status=enabled, full=overwrite, ssl_opt=3, source-ip=0.0.0.0
Centra Management: type=FGD, flags=000000bf.
active-tasks=0
diagnose test application miglogd 20
For v7.2.4 and above:
diagnose test application fgtlogd 20
FGT # diagnose test application fgtlogd 20
Home log server:
Address: 208.91.113.241:514, st: down
oftp status: connecting
spos: 0, slen: 0
rpos: 0, rlen: 12
Alternative log server:
Address: 208.91.113.201:514, st: down
oftp status: connecting
spos: 0, slen: 0
rpos: 0, rlen: 12
Active log server: ALTER
Number of log task: 1024
Number of task in list: 1024
Debug zone info:
Server IP: 208.91.113.241
Server port: 514
Server status: down
Log quota: 102400MB
Log used: 224MB
Daily volume: 20480MB
FDS arch pause: 0
fams archive pause: 0
stats: total=95970, acked=0, discard=94946, rejected=0
Other examples:
FGT # diagnose test application forticldd 3
Debug zone info:
Domain:GLOBAL
Home log server: 173.243.132.171:514
Alt log server: 173.243.132.132:514
Active Server IP: 173.243.132.132
Active Server status: unknown
Log quota: 3145728MB
Log used: 0MB
Daily volume: 20480MB
fams archive pause: 0
APTContract : 0
APT server: 0.0.0.0:0
APT Altserver: 0.0.0.0:0
Active APTServer IP: 0.0.0.0
Active APTServer status: unknown
FGT # diagnose test application forticldd 3
Debug zone info:
Domain:GLOBAL
Home log server: 173.243.132.171:514
Alt log server: 173.243.132.132:514
Active Server IP: 173.243.132.132
...
FGT # execute telnet 173.243.132.171 514
Trying 173.243.132.171...
Connected to 173.243.132.171. <- The console may freeze for a few moments, then drop the connection with the following message.
Connection closed by foreign host.
A failed telnet connection indicates that TCP port 514 is being blocked before reaching the FortiGateCloud server.
FGT # execute telnet 173.243.132.171 514
Trying 173.243.132.171...
Timeout!
Failed to connect to specified unit.
If there is no response from the server, change the outgoing interface.
config log fortiguard setting
    set interface-select-method specify
set interface port1 <- Specify the outgoing interface.
end
Also, the ISP might be blocking or filtering port 514 (image below). Contact the ISP to determine if port 514 is filtered or blocked.
config log fortiguard setting
    set status enable
    set ssl-min-proto-version default
    set source-ip <IP-address (0.0.0.0 by default)>
    set interface-select-method auto
end
This source must be the IP address of some of the FortiGate interfaces. Other useful troubleshooting information can be collected using the following commands:
diagnose debug disable
diagnose debug reset
diagnose debug console timestamp enable
diagnose debug application forticldd -1 or 255
diagnose debug enable 
Verify System Time and NTP Sync.
Why:
Incorrect system time can cause SSL/TLS handshake failures, OCSP/CRL validation errors, and even logging/authentication problems.
Commands:
Check the current system time:
get system status | grep Time
Check NTP sync status:
diagnose sys ntp status
Recommendation:
Ensure NTP is configured and reachable:
config system ntp
set status enable
set ntp sync enable
set server "pool.ntp.org"
end
Note:
From the debug, if the following error 'FATAL: Status checking failed due to missing OCSP/CRL' was observed, try the following command to disable anycast:
config system fortiguard
set fortiguard-anycast disable
set protocol udp
set port 8888
end
After that, restart the FortiCloud process, and use the following command:
fnsysctl killall forticldd
Then, run these commands to restart the FortiCloud process.  The first command will list the process ID, and replace the x's in the second command with the process ID:
diagnose sys process pidof forticldd  
diagnose sys kill 11 xxx
Use the following commands to stop the debug, the console will take the keyboard input even while filling up:
diagnose debug disable <- To disable.
diagnose debug reset <- To reset the debug setup.
If the above commands do not resolve the issue and logs are still not sent to the FortiCloud, restart the FortiGate log daemon by running the commands below. The first command will list the process ID, and replace the x's in the second command with the process ID:
diagnose sys process pidof fgtlogd  
diagnose sys kill 11 xxx
It is possible to use the IP information from the output in packet captures:
diagnose sniffer packet any 'host <IP from previous output>' 4 0 l
Note:
If all of the above settings are checked and the logs are still not received on the Cloud, make sure that FortiGate is running the latest firmware if using a Free Subscription with FortiGate Cloud.
Starting from February 28, 2025, a FortiGate without an active FortiGate Cloud subscription is required to upgrade to the latest firmware patch within 7 days of a new GA patch release, or FortiGate Cloud services will be paused for that device.
This will affect the cloud retention service, where logs will not be forwarded to FortiCloud until the device is updated to the latest firmware patch if using a Free FortiGate Cloud account: Technical Tip: Security enforcement change for FortiGates provisioned to FortiGate Cloud without act...
Related articles:
Troubleshooting Tip: Unable to connect to FortiGuard servers
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.