mirror of
https://github.com/yuriskinfo/cheat-sheets.git
synced 2025-12-21 21:33:25 +01:00
ongoing additions, changes, and fixes
This commit is contained in:
@@ -397,3 +397,32 @@ a|View the kernel routing table (FIB). This is the list of resolved routes actua
|
||||
|
||||
|
||||
|===
|
||||
|
||||
|
||||
|
||||
== Fortianalyzer logging debug
|
||||
.Verify and debug sending logs from Fortigate to Fortianalyzer
|
||||
[cols=2, options="header"]
|
||||
|===
|
||||
|Command
|
||||
|Description
|
||||
|
||||
|*get log fortianalyzer setting*
|
||||
|Show active Fortianalyzer related settings on Fortigate.
|
||||
|
||||
|*config log fortianalyzer*
|
||||
|Complete Fortianalyzer configuration on CLI, as GUI configuring is usually not enough for it to work.
|
||||
|
||||
|*get log fortianalyzer filter*
|
||||
|Verify if any log sending filtering is being done, look for values of `filer` and `filter-type`. If there are any filters, it means not all logs are sent to FAZ.
|
||||
|
||||
|*exec log fortianalyzer test-connectivity*
|
||||
|Verify that Fortigate communicates with Fortianalyzer. Look at the statistics in `Log: Tx & Rx` line - it should report increasing numbers, and make sure the status is `Registration: registered`.
|
||||
|
||||
|*exec telnet <IP of Fortianalyzer> 514*
|
||||
|Test connectivity to port 514 on the Fortianalyzer. If pings are allowed between them, you can also try pinging.
|
||||
|
||||
|*diagnose sniffer packet any 'port 514' 4*
|
||||
|Run sniffer on Fortigate to see if devices exchange packets on port 514. Click in GUI on `Test Connectivity` to initiate connection.
|
||||
|
||||
|===
|
||||
|
||||
Reference in New Issue
Block a user