Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Leovigildo
New Contributor

Do not show the policies found in Firewall policy (Implicit Deny) in FortiAnalyzer.

I have a Fortigate F2K60FTK21900432 Fortigate proxy.

We have explisit-web-proxy policies that we normally use and its logs are sent to FortiAnalyzer . example :

 

But we also have the Implicit Deny policy found in Firewall Policy.

 

My problem is that the logs of the latter (Implicit Deny - Firewall Policy) appear in FortiAnalyzer and I do not want to have them because they generate confusion when analyzing the traffic in Fortinalizer.


Question: how can I prevent these logs from not being sent to Fortianalyzer.
Thanks for your help team

 

 

 

7 REPLIES 7
ebilcari
Staff
Staff

You can check the policy if the option 'Log IPv4 Violation Traffic' is enabled like shown here.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
Leovigildo
New Contributor

Hello ebilcari thank you for your cooperation but:

I had already seen this information on that website, anyway I did the test but I still see these local logs in my Fortianalyzer.
To be exact there are:
Forward Traffic - the ones I want to see in Fortianalyzer
Local Traffic - I don't want to see them in Fortianalyzer

abelio

Hello Leovigildo

 

Could you please share to the forum the output of  " show full log setting" CLI command in that fortigate?

regards




/ Abel

regards / Abel
Leovigildo

PROXY_MFG12_1  # show full log setting
config log setting
set resolve-ip disable
set resolve-port enable
set log-user-in-upper disable
set fwpolicy-implicit-log disable
set fwpolicy6-implicit-log disable
set log-invalid-packet disable
set local-in-allow disable
set local-in-deny-unicast disable
set local-in-deny-broadcast disable
set local-out enable
set local-out-ioc-detection enable
set neighbor-event disable
set brief-traffic-format disable
set user-anonymize disable
set fortiview-weekly-data disable
set expolicy-implicit-log enable
set log-policy-comment disable
set faz-override disable
set syslog-override disable
set rest-api-set disable
set rest-api-get disable
end

 

this is my proxy configurationUndesirable traffic in Fortianalyzer.png

ebilcari

You can read more about the local logs and policy 0 (without an ID) in this article here.

There is the option to enable or disable local traffic logs from CLI:

config log setting
set local-in-allow <enable/disable>
set local-in-deny-unicast <enable/disable>
set local-in-deny-broadcast <enable/disable>
set local-out <enable/disable>

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
Leovigildo

this is my proxy configuration Undesirable traffic in Fortianalyzer.png

Leovigildo
New Contributor

PROXY_MFG12_1  # show full log setting
config log setting
set resolve-ip disable
set resolve-port enable
set log-user-in-upper disable
set fwpolicy-implicit-log disable
set fwpolicy6-implicit-log disable
set log-invalid-packet disable
set local-in-allow disable
set local-in-deny-unicast disable
set local-in-deny-broadcast disable
set local-out enable
set local-out-ioc-detection enable
set neighbor-event disable
set brief-traffic-format disable
set user-anonymize disable
set fortiview-weekly-data disable
set expolicy-implicit-log enable
set log-policy-comment disable
set faz-override disable
set syslog-override disable
set rest-api-set disable
set rest-api-get disable
end

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors