Quantcast
Channel: Fortinet Cookbook
Viewing all articles
Browse latest Browse all 690

FortiAnalyzer Analyzer-Collector configuration

$
0
0

This example illustrates how to set up FortiAnalyzer Analyzer and Collector modes and make them work together to increase the overall performance of log receiving, analysis, and reporting. 

FortiAnalyzer provides two operation modes: Analyzer and Collector. Analyzer mode is the default mode that supports the full FortiAnalyzer features, while the primary task of a Collector is receiving logs from connected devices and uploading the logs to an Analyzer. Instead of writing logs to the database, the Collector retains the logs in their original (binary) format for uploading. The following table shows a comparison of the supported features of the Analyzer and Collector modes:

 

Analyzer Mode

Collector Mode

FortiView

Yes

No

Event Monitor

Yes

No

Reports

Yes

No

Log View

Yes

Compressed logs only; indexed logs not available

Device Manager

Yes

Yes

System Settings

Yes

Yes

In this example, Company A has a remote branch network with a FortiGate unit and a FortiAnalyzer 400E in the Collector mode deployed. In its head office, Company A has a FortiAnalyzer 3000D in the Analyzer mode deployed, which analyzes the FortiGate device logs of the remote branch that are forwarded by the Collector and generates reports. 

1. Checking and configuring the storage policy of the Analyzer-to-be and Collector-to-be 

Before you configure Analyzer and Collector, make sure the data policy and disk utilization policy for both the Analyzer-to-be and Collector-to-be are appropriate and provide sufficient disk space for receiving and storing logs. 

For both Analyzer-to-be and Collector-to-be, go to Device Manager, and click the Storage Used tab on the quick status bar.

Observe the storage usage pattern and trend of  the Analyzer-to-be and Collector-to-be, and consider the storage need of this Analyzer–Collector scenario. Decide if you need to adjust the data policy. 

 

To edit the date policy when ADOMs are enabled:

Go to System Settings > All ADOMs, double-click the ADOM to which your FAZ Analyzer/Collector belongs.

On the Edit ADOM Storage Configurations page that opens, edit the log storage policy. 

To edit log storage settings when ADOMs are disabled:

Go to System Settings > Dashboard. In the System Information widget, click the edit icon for Log Storage Policy.

In the Edit Log Storage Policy dialog box that opens, change the settings.

The screen shots on the right show an example of storage configurations for the Analyzer (top) and Collector (bottom) modes.

 

 

 

Recommended settings

  • Analyzer: You might want to initially set it to keep indexed logs for 6 months and compressed logs for 2 years (Data Policy), to meet regulatory requirements. You might want to keep the default Indexed : Compressed ratio of 70% : 30% (Disk Utilization). You can then monitor the storage usage and adjust the storage policy as you go.

  • Collector: You should allocate most if not all of the disk space to compressed logs (Indexed : Compressed ratio of Disk Utilization). You can then monitor the storage usage and adjust the storage policy as you go.

2. Setting up the Analyzer

Configure the Operation Mode. Go to System Settings > Dashboard. In the System Information widget, go to Operation Mode, and select Analyzer.  
Prepare an administrator account with a Super_User profile. (You can
use the default admin account, which is assigned the Super_User profile, or create a custom administrator account.) The Collector will need to provide the login credentials of this administrator account to get authenticated by the Analyzer. 

Add the FortiGate device to the Analyzer. Go to Device Manager, and click Device Unregistered in the quick status bar. Select the FortiGate device, and click Add.

In the Add Device dialog box that opens, select the ADOM to which to add the FortiGate device (if ADOM is disabled, select root), and give the device a name you prefer.

Once the FortiGate device is added, you can see it under the Device Total tab. 

 

Make sure that the log aggregation service is enabled on the Analyzer.  Go to System Settings > Dashboard.  In the CLI Console widget, enter the following CLI commands:
 config system aggregation-service
  set accept-aggregation enable
 end 

Make sure the interface that will receive logs allows aggregator access. Go to System Settings > Network. In the System Network Management Interface pane, select Aggregator under Administrative Access.

 

3. Setting up the Collector

Configure the Operation Mode. Go to System Settings > Dashboards. In the System Information widget, go to Operation Mode, and select Collector.

Once the FortiAnalyzer device is set to work in the Collector mode, features such as FortiView, Event Monitor, and Reports are disabled. Only Device Manager, System Settings, and Log View are available. 

 

Configure Log Forwarding. Go to System Settings > Log Forwarding. Click Create New.

Set Server Name to a name you prefer. Set Remote Server Type to FortiAnalyzer. Set Server IP to the IP address of the Analyzer to which this Collector will forward logs. Click Select Device and select the FortiGate device. 

Select both Enable Real-time forwarding and Enable Log Aggregation. Provide the user name and password of the Administrator account of the Analyzer.

 

Note: By enabling real-time forwarding, the Collector will forward logs to the Analyzer in real-time. By enabling log aggregation, the Collector will upload log archive files, which include DLP (data leak prevention) files, antivirus quarantine files, and IPS (intrusion prevention system) packet logs, to the Analyzer daily at the scheduled time.

Log forwarding is enabled by default. If you cannot see System Settings > Log Forwarding in the GUI, you will have to enable it first.  Go to System Settings > Dashboard.  In the CLI Console widget, enter the following CLI commands:

 config system admin setting
  set show-log-forwarding enable
 end

4. Results

At this point, the Collector starts to forward logs to the Analyzer. Log onto the Analyzer GUI and go to Log View. Select the FortiGate device from the device list, and select Real-time Log from the Tools drop-down. You will see real-time logs flowing into the log message list. 

The post FortiAnalyzer Analyzer-Collector configuration appeared first on Fortinet Cookbook.


Viewing all articles
Browse latest Browse all 690

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>