Shipping Fortigate Logs to Distributed SO 2.4.20 #11617
Replies: 1 comment 21 replies
-
Hi, I hope it will help you. SO Firewall Configuration: Next, from "portgroups" we configure the destination port of the logs, in this case 9004. We configure it to "UDP" in "customportgroup1" Finally, in the "role" tab we look for the role of our so-manager, in this case "managersearch". Then we go to chain -> DOCKER-USER -> hostgrpups -> customhostgroup1 -> portgroups-> and put customportgroup1. We do the same in chain -> INPUT. Fortinet Fortigate logs integration configuration in elasticfleet: From Kibana's Web UI we go to "Fleet". Then we go to "Agent Policies" and from there we create a copy of the "so-grid-nodes_general" policy. Then we go to "Agents" and assign the so-manager agent to the new policy created. We click on the created policy and then click "Add integration". We search for "Fortinet FortiGate Firewall Logs" and install it. In the configuration we only enable logs via UDP on port 9004 and for IP 0.0.0.0. Checks: |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Was reading through conversation between @dougburks and @bdavedu on #11321. As I don't quite get the concept behind SO's firewall settings, I'm having a hard time setting this up as well. My current setup is a v2.4.20 distributed cluster with a ManagerSearch node and Forward node (which I believe it's called sensor?)
Background Information:
Both ManagerSearch node and sensor tie to the same policy, which has Fortinet-Fortigate integration setup on port 9004.
Fortigate log is now being sent to sensor node via TCP syslog on port 9004.
tcpdump shows there are logs arriving sensor node.
On SO's firewall settings, I have configured "customhostgroup1" and "customportgroup1" with the Fortigate firewall IP and port 9004.
Under SO's firewall -> role -> sensor -> chain, I have set both DOCKER-USER and INPUT's customhostgroup1 -> portgroups to "customportgroup1.
For those external logs, like Fortigate logs in this case, should I have the syslog send to the ManagerSearch Node or Sensor, or I need to setup anything else? Just wondering am I doing anything wrong, and what would be the recommended way to do so.
How should I understand the SO's firewall settings? My understanding now is that logs are sending to sensor node, that's why I go to role -> sensor, and use cusomt hostgroup and port group to control the sensor node, and make it allow access from my Fortigate firewall to sensor node's port 9004. Is this a correct understanding?
Is there any other configuration needed to make logs flow from Sensor node and ManagerSearch node?
Is that going to be the same case for network traffic?
Any help will be appreciated. Thanks in advanced.
Beta Was this translation helpful? Give feedback.
All reactions