Fortinet FortiGate Data

App Installation

App Search Head Indexer Heavy Forwarder UF / Deployment Server Additional Details
Fortinet FortiGate Add-On for Splunk Required - Required - Installation and Configuration Guide

Important sourcetypes to be collected

  • fortigate_event
  • fortigate_traffic
  • fortigate_utm

Note : Create an index named fortigate or update the cs_fortigate macro definition from Cyences app configuration page (Cyences Settings > Cyences App Configuration > Products Setup).

FortiGate VPN Support and issue with action field extraction

  • Due to a field extraction issue in the Fortinet FortiGate Add-On for Splunk (field=action).

  • Verify that the FortiGate VPN data is supported by the Cyences App by following the instructions below.

How to fix the problem?

  1. From Splunk’s navigation bar, go to Settings > Data models.

  2. Search for the Authentication data model and click on it.

  3. Click Edit > Edit Acceleration.

  4. Uncheck the Acceleration box, then click Save.

  5. Under the Calculated fields section, click Edit for the action field.

    alt

  6. Your current configuration should look similar to this:

     if(isnull(action) OR action="","unknown",action) 
    
  7. Replace the above configuration/eval expression with the contents below:

     case(sourcetype="fgt_event" AND subtype="vpn" AND vendor_action IN ("tunnel-up", "phase2-up"), "success", sourcetype="fgt_event" AND subtype="vpn" AND vendor_action="ssl-login-fail", "failure", isnull(action) OR action="", "unknown", 1==1, action) 
    
  8. Click Save.

  9. Click Edit > Edit Acceleration.

  10. Enable the Acceleration, then click Save.

    alt

Estimated Data Size

TODO


Copyright © 2024 CrossRealms International.