Configure the FortiGate Firewall’s log push to Splunk!

Safiullah Khan
3 min readJun 4, 2024

--

In this article we will configure Forwarding logs from a Fortinet firewall to Splunk centralizes security data, enabling advanced analysis, streamlining compliance reporting, and automating security monitoring for a more comprehensive understanding of network activity and improved threat detection.

Step 1: Access FortiGate’s GUI > Log & Report > Log Settings:

Step 2: enable the Send logs to syslog feature

Scroll down to the Remote Logging and Archiving section, and enter the IP address of Splunk LB used to collect logs and select Apply to save the configuration:

In case if Splunk is used to collect logs on another port, we need to configure specifically using the CLI, access FortiGate’s CLI and use the following command to configure:

config log syslogd setting
set status enable
set server "<IP Splunk>"
set port <number port>
set source-ip "<IP Interface FortiGate>"
end

Step 3: To configure the push log on Policy

I. Go to Policy & Objects > IPv4 Policy

ii. select the Policy you want to push the log and select Edit

Step 4: With Policy ACCEPT, you enable the Log Allowed Traffic feature > All Sessions.

As for DENY Policies, you enable the Log Violation Traffic feature, select OK to save the configuration.

Step 4: Access Splunk, search to check if the log has been pushed back or not:

Now we will see logs related to FortiGate policy for which we have configured log forwarding.

Conclusion:

Splunk is centrallized log management tool which may collect different logs from different devices which may helpful in timely threat detection and response to maintain good IT infrastructure hygiene.

--

--

Safiullah Khan

IT & Network Support || Vulnerability Assessment || Google CPC || Blue Team Junior Analyst || SIEM || IDS/IPS || Wazuh || Cortex XDR || Splunk