Home

How to Troubleshoot Connectivity Issues Between FortiGate and FortiAnalyzer

This article outlines the steps to diagnose and resolve connectivity problems between FortiGate and FortiAnalyzer.

Troubleshooting connectivity issues between FortiGate and FortiAnalyzer involves several systematic steps. Below is a comprehensive guide to help you identify and resolve these issues effectively.

Step 1: Verify Firmware Compatibility

Ensure that the firmware versions of both FortiGate and FortiAnalyzer are compatible. As a general rule, the firmware on the FortiAnalyzer should be equal to or higher than that on the FortiGate. Check the compatibility documentation for specific version details.

Step 2: Check FortiAnalyzer Configuration on FortiGate

Use the following command to verify the configuration settings for logging to FortiAnalyzer:

get log fortianalyzer setting

Ensure that:

  • status is set to enable
  • server points to the correct IP address of the FortiAnalyzer (e.g., 10.34.199.143)
  • upload-option is configured correctly (e.g., 5-minute for every 5 minutes)
  • reliable is set according to your needs (set it to enable for TCP, which is more reliable)

Also, check if any filters are applied that might restrict log transmission:

get log fortianalyzer filter

Verify that severity levels and traffic types are appropriately configured.

Step 3: Test Connectivity from CLI and GUI

CLI Testing

Run the following command from the FortiGate CLI:

exec log fortianalyzer test-connectivity

Look for messages indicating successful registration and connection status. If you see an error like “Authentication Failed,” ensure that your device is registered in the FortiAnalyzer.

GUI Testing

In the GUI, navigate to Log Settings and check for any prompts indicating authorization issues or connectivity problems.

Step 4: Basic Network Connectivity Tests

Perform basic network tests using ping, traceroute, and telnet commands from both devices:

exec ping 10.34.199.143 exec traceroute 10.34.199.143 exec telnet 10.34.199.143 514

Check if ICMP packets are allowed through firewalls between devices, as successful pings indicate basic connectivity.

Step 5: Check Firewall Rules

Ensure that TCP/UDP port 514 is open on any intermediate firewalls or routers between the two devices. This port is crucial for OFTPD protocol communication.

Step 6: MTU Size Verification

If connectivity seems fine but logs are not being sent, check for MTU size issues by executing:

exe ping-options df-bit yes exe ping-options data-size 1500 exec ping x.x.x.x # Replace with FAZ-IP.

Adjust data sizes downwards until you find a size with no packet loss, then adjust MTU settings accordingly.

Step 7: Advanced Debugging Commands

Utilize advanced debugging commands on both devices:

On FortiGate:

diag sniffer packet any 'host x.x.x.x and port 514' 6 0 l # Replace x.x.x.x with FAZ-IP. diag debug reset diag debug app fgtlog 255 # For detailed logging. diag debug enable

On FortiAnalyzer:

diag sniffer packet any 'host y.y.y.y and port 514' 3 0 l # Replace y.y.y.y with FG-IP.

Analyze SYN/ACK numbers in communication logs to identify where failures occur.

Step 8: Collect Logs for Further Analysis

If issues persist after all checks, gather logs from both devices using these commands:

On FortiGate:

get sys status get sys performance status # Run multiple times. exec log fortianalyzer test-connectivity 

On FortiAnalyzer:

get sys status exec top # Monitor system performance.

Attach these logs when contacting technical support if necessary.


By following these steps systematically, you can effectively troubleshoot connectivity issues between your FortiGate and FortiAnalyzer devices.


Authoritative Sources Used:

  • Fortinet Documentation
  • Fortinet Technical Support Articles
  • Fortinet Knowledge Base