Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
akshaywaghm
New Contributor II

Need command to activate syslog local traffic logging through fortimanager.

We have 242 devices we need to enable local traffic logging option of syslog through Forti manager.

 

Local traffic logging.png




AW
AW
4 REPLIES 4
AEK
SuperUser
SuperUser

Did you try with scripts?

FMG > Device Manager > Scripts > Create New

  • write the script: config log syslogd ...
  • Run on: Device Database

Hope it helps.

AEK
AEK
akshaywaghm
New Contributor II

We have created the script & its working ,but we need to enable local traffic logging option of syslog I have marked specific option in image which we need to enable.

AW
AW
Toshi_Esumi

The CLI to get that setting you showed in GUI is:
config log setting
  set local-in-allow disable
  set local-in-deny-unicast disable

  set local-in-deny-broadcast disable

  set local-out enable
end

And you could push this via a script or CLI template. But changes made by script might not stick when you swap the hardware with a new one. I recommend CLI template then sync it with both device DB and remote device config.

However, I believe this setting is default values after factory reset. Isn't this set already at those FGTs you manage?

Toshi 

Nishimot234
New Contributor

 

  • Login to FortiManager using your admin credentials through the web interface.

  • Go to the correct ADOM (Administrative Domain) where your FortiGate device is managed.

  • Navigate to Device Manager and select the FortiGate device you want to configure.

  • Click on “System Settings” or “Log & Report” depending on your FortiManager version.

  • Enable Syslog Logging by turning on the option to send logs to an external Syslog server.

  • Enter the Syslog server details such as IP address, port number (usually 514) like park registration, and the protocol (UDP or TCP).

  • Go to the Logging Options and ensure “Local Traffic Logging” is enabled.

  • Adjust the log filters to include local-in traffic, so internal sources like apps and services are captured.

  • Save the changes and make sure the logging settings are pushed to the FortiGate device.

  • Go to the Install Wizard, select the device, and install the updated configuration from FortiManager.

  • Check the Syslog server to ensure it is receiving logs that include local traffic data.

  • Example use case: If you're managing an internal app like register2park, enabling local traffic logging helps track user access and activity directly from your internal network for auditing or troubleshooting.

 

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors