Hello,
I would like to ask for your advice on how you would configure logging on Fortigate routers and whether it is worth enabling security fabric in such a configuration:
-one main Fortigate and Fortianalyzer in the main location.
-four Fortigate routers at the branches connected to the main Fortigate (hub and spoke topology) via doubled IPSEC (SD-WAN).
-the remote Fortigate routers do not have UTM licenses because all network traffic is reversed and goes out to the Internet through the main Fortigate router.
Now how would you configure the security fabric and logging in this case?
1. Security fabric disabled, logging into Fortianalyzer only from the main Fortigate (here, traffic to the Internet is visible from remote Fortigates anyway) - this is the current situation.
The downside of this solution is that in order to check local traffic, I have to log in to each of the branch Fortigates.
2. Security fabric disabled, but adding remote Fortigates to Fortianalyzer (there will be duplicate logs here)
3. Enabling security fabric and adding remote Fortigates to Fortianalyzer?
Thank you.
Hi,
I cannot speak to the fabric side, but I will watch for the replies.
We use Fortianalyzer and all of our firewalls log to it. One of the best things about this is that you an filter for the traffic you are interested in, and see where the problem occurs. Short answer: have everything log to Fortianalyzer.
Regards,
Pete
| User | Count |
|---|---|
| 2792 | |
| 1424 | |
| 812 | |
| 748 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.