Skip to content

FortiGate Integration

This guide covers how to configure Fortinet FortiGate firewalls to forward security logs to the KYRA MDR Collector via syslog.

Supported versions: FortiOS 6.4, 7.0, 7.2, 7.4+


Prerequisites

  • A KYRA MDR Collector installed and running (Installation Guide)
  • FortiGate administrative access (CLI or GUI)
  • Network connectivity from the FortiGate to the collector on port 514

Step 1: Enable Syslog on FortiGate (GUI)

  1. Log in to the FortiGate web console
  2. Navigate to Log & Report > Log Settings
  3. Under Remote Logging and Archiving, enable Send Logs to Syslog
  4. Configure the following:
SettingValue
IP Address/FQDNYour KYRA Collector IP (e.g., 10.0.1.50)
Port514
Server TypeSyslog
Minimum Log LevelInformation
Facilitylocal7 (recommended)
  1. Click Apply

Step 2: Enable Syslog on FortiGate (CLI)

Connect to the FortiGate CLI and run:

config log syslogd setting
set status enable
set server "10.0.1.50"
set port 514
set facility local7
set source-ip ""
set format default
set mode udp
end

For reliable delivery using TCP:

config log syslogd setting
set status enable
set server "10.0.1.50"
set port 514
set mode reliable
end

Note: reliable mode uses TCP, which prevents log loss during network congestion. Recommended for production deployments.


Step 3: Configure Log Categories

Enable the log types that matter for security monitoring:

config log syslogd filter
set severity information
set forward-traffic enable
set local-traffic enable
set multicast-traffic enable
set anomaly enable
set voip disable
set filter ""
set filter-type include
end
Log TypeCLI SettingWhy It Matters
Trafficforward-traffic enableNetwork flow visibility, lateral movement detection
UTM/SecurityEnabled by defaultIPS, AV, web filter, application control events
EventEnabled by defaultAdmin logins, config changes, HA failovers
Anomalyanomaly enableDoS detection, protocol anomalies
DNSdns enable (FortiOS 7.0+)DNS tunneling, C2 detection

Enable DNS Logging (FortiOS 7.0+)

config log syslogd filter
set dns enable
end

Step 4: Configure a Second Syslog Server (Optional)

FortiGate supports up to four syslog servers. To add KYRA as a secondary destination:

config log syslogd2 setting
set status enable
set server "10.0.1.50"
set port 514
set mode reliable
end

Step 5: Verify Logs Are Flowing

On the FortiGate

Check that syslog is active:

diagnose log test

This sends a test log entry. Then verify the connection status:

get log syslogd setting

Confirm server and status are correct.

On the KYRA Collector

Check that events are arriving:

Terminal window
# View incoming syslog traffic
sudo tcpdump -i any port 514 -c 10
# Check collector logs
sudo journalctl -u kyra-collector --since "5 minutes ago" | grep -i forti

In the KYRA Console

  1. Go to Log Search
  2. Search for source_type:fortigate or filter by your FortiGate’s IP address
  3. You should see firewall traffic, UTM events, and system events
  4. Go to Dashboard to confirm event ingestion metrics are increasing

FortiGate Log Format Reference

KYRA MDR automatically parses FortiGate log formats. Key fields extracted:

FortiGate FieldKYRA MDR FieldDescription
srcipsource.ipSource IP address
dstipdestination.ipDestination IP address
actionevent.actionallow, deny, drop, etc.
attackthreat.nameIPS signature name
severityevent.severitycritical, high, medium, low
logidevent.idFortiGate log identifier
devnameobserver.nameFortiGate hostname
policyidrule.idFirewall policy ID

Detection Rules

KYRA MDR includes built-in detection rules for FortiGate events:

DetectionMITRE ATT&CKDescription
Brute Force Admin LoginT1110Multiple failed admin login attempts
Configuration ChangeT1562.001Firewall policy or setting modifications
IPS Critical AlertVariousHigh-severity IPS signature matches
VPN AnomalyT1133Unusual VPN login patterns (geo, time)
DNS TunnelingT1071.004Suspicious DNS query patterns
Policy Deny SpikeT1046Sudden increase in denied traffic (port scan)

Troubleshooting

No Logs Received

  1. Firewall rules: Ensure no ACL between the FortiGate and collector blocks port 514
  2. Syslog status: Run get log syslogd setting — confirm status is enable
  3. Correct IP: Verify the syslog server IP matches your collector’s IP
  4. Log level: If set to warning or above, informational events are dropped. Set to information

Partial Logs

  • Missing traffic logs: Check forward-traffic is enable in the syslog filter
  • Missing DNS logs: DNS logging requires FortiOS 7.0+ and explicit enablement
  • Missing UTM logs: Ensure security profiles (IPS, AV, Web Filter) are applied to firewall policies

High Log Volume

FortiGate can generate significant log volume. To reduce noise:

config log syslogd filter
set severity warning
set forward-traffic disable
set anomaly enable
end

Warning: Disabling traffic logs reduces detection coverage. Only do this if volume is a concern. Consider upgrading your KYRA MDR plan for higher EPS limits.