System configuration in FortiAnalyzer is the essential foundation to ensure smooth operation and performance. This step involves setting up basic networking, enabling access, ensuring system synchronization, and configuring redundancy features like High Availability (HA) and RAID.
This phase ensures that FortiAnalyzer is correctly integrated into your network and accessible for management.
FortiAnalyzer must have proper network connectivity to communicate with other devices and allow administrative access. Here’s how to configure it step by step:
Management Interface IP Address:
Default Gateway:
DNS Servers:
www.google.com) into IP addresses.Static Routes:
10.0.0.0/24 via gateway 192.168.1.254, configure a static route with this information.To manage FortiAnalyzer, you must enable and configure secure access protocols. Follow these steps:
Enable Management Protocols:
Access Control:
192.168.1.0/24 to access management.Time synchronization is critical for accurate logging and reporting.
NTP Server Configuration:
time.google.compool.ntp.orgManual Time Synchronization:
Importance of Accurate Time:
High Availability ensures that FortiAnalyzer remains operational even if one node fails.
Active-Passive Mode:
Distributed Storage Mode:
Assign roles to the nodes:
Synchronize configurations between nodes:
Configure node priorities:
RAID (Redundant Array of Independent Disks) enhances data storage reliability and performance.
Redundancy:
Performance:
RAID 0 (Striping):
RAID 1 (Mirroring):
RAID 5 (Distributed Parity):
Understanding the basic concepts of FortiAnalyzer helps you operate the system effectively.
Analyzer Mode:
Collector Mode:
Log Storage:
Report Generation:
Event Management:
By mastering the basics of System Configuration, including initial setup, network access, time synchronization, HA, RAID, and operational concepts, you can confidently set up and manage FortiAnalyzer. These steps ensure a robust foundation for collecting, analyzing, and reporting on logs efficiently.
Devices must be added to FortiAnalyzer before logs can be collected and analyzed.
Steps to register a device:
Configuring Log Reception on FortiGate:
Log in to the FortiGate CLI.
Run the command:
config log fortianalyzer setting
set status enable
set server <FortiAnalyzer_IP>
end
Run a diagnostic log test in FortiAnalyzer to verify log reception:
diagnose log test
Check logs on FortiGate to confirm whether they are being sent:
execute log display
Ensure FortiGate is correctly set to send logs to FortiAnalyzer:
config log fortianalyzer setting
set status enable
set server <FortiAnalyzer_IP>
end
Check if the log forwarding feature is enabled in FortiGate GUI.
FortiGate logs are sent via UDP port 514 by default.
Ensure the firewall allows traffic on UDP 514.
To check if the port is blocked:
diagnose debug enable
diagnose sniffer packet any 'port 514' 4
If no traffic is detected, the firewall is likely blocking logs.
If storage is full, logs may be discarded.
Check disk space usage:
diagnose system df
Solution:
These additional details enhance System Configuration by addressing:
Why is FortiAnalyzer not receiving logs from a FortiGate even though the device has been added successfully?
Because log forwarding is not enabled or the FortiGate is not configured to send logs to FortiAnalyzer.
Adding a device to FortiAnalyzer only registers it for management and log correlation. The FortiGate must explicitly forward logs to FortiAnalyzer. This is configured on FortiGate under Log & Report → Log Settings where FortiAnalyzer logging must be enabled and the FAZ IP specified. Network reachability and proper authorization (device registration) must also be verified. A common mistake is assuming device discovery automatically enables log forwarding. Administrators should also confirm that log categories (traffic, event, UTM) are enabled. If logging is configured but still failing, verify connectivity and authentication status under the FortiAnalyzer Device Manager.
Demand Score: 82
Exam Relevance Score: 88
What is the difference between disk quota and ADOM quota in FortiAnalyzer?
Disk quota defines total storage allocation, while ADOM quota limits how much of that storage a specific ADOM can use.
FortiAnalyzer divides storage into logical allocations to manage logs efficiently. The system disk quota determines the total log storage available on the device. Within that storage, ADOM quotas allocate portions to individual administrative domains. This prevents one domain from consuming all storage. When an ADOM reaches its quota, older logs are automatically deleted based on the configured retention policy. Administrators often misunderstand this relationship and assume increasing system disk space automatically increases ADOM capacity. In reality, ADOM quotas must also be adjusted manually to reflect the new allocation.
Demand Score: 70
Exam Relevance Score: 84
How can an NTP mismatch between FortiAnalyzer and FortiGate affect log analysis?
It can cause incorrect timestamps, making logs appear out of order or outside expected time ranges.
FortiAnalyzer correlates logs using timestamps. If the FortiGate and FortiAnalyzer clocks are not synchronized, the received logs may appear in the wrong time window. This can result in incomplete reports, missing data during investigations, and difficulty correlating events across multiple devices. For example, if the FortiGate clock is ahead by several minutes, its logs may appear in the future relative to the analyzer's system time. The best practice is to configure both devices to use the same NTP server. Time synchronization ensures accurate event correlation and consistent reporting.
Demand Score: 64
Exam Relevance Score: 78
What configuration step is required on FortiAnalyzer before FortiGate devices can send logs?
The FortiGate must be authorized and added to the correct ADOM on FortiAnalyzer.
FortiAnalyzer uses Administrative Domains (ADOMs) to logically separate devices and logs. When a FortiGate attempts to send logs, FortiAnalyzer checks whether the device is registered and assigned to an ADOM. If the device is not authorized, logs may be rejected or remain unprocessed. Administrators must add the device through Device Manager and assign it to the appropriate ADOM. Authorization ensures secure device management and proper log indexing. A frequent issue occurs when administrators forget to authorize newly discovered devices after enabling log forwarding.
Demand Score: 68
Exam Relevance Score: 85