Skip to content

Commit

Permalink
Updated the documentation
Browse files Browse the repository at this point in the history
  • Loading branch information
fdurand committed Dec 31, 2024
1 parent d8220f9 commit 2e2862a
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 2 deletions.
Binary file added docs/images/fortigate_syslog.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
Expand Up @@ -57,15 +57,14 @@ Action -
PacketFence is able to receive DHCP information from the FortiGate firewall.
On the PacketFence server:
Modify rsyslog configuration to allow incoming UDP packets by uncommenting the following two lines in [filename]`/etc/rsyslog.conf`:
$ModLoad imudp
$UDPServerRun 514
Configure [filename]`/etc/rsyslog.d/fortigate.conf` so it contains the following which will redirect fortigate log entries and stop further processing of current matched message:
Configure [filename]`/etc/rsyslog.d/fortigate.conf` so it contains the following which will redirect fortigate log entries and stop further processing of current matched message (in that case 192.168.40.1 is the ip of the FortiGate):
if $fromhost-ip=='192.168.40.1' then /usr/local/pf/var/fortigate
& ~
Expand All @@ -78,6 +77,10 @@ Restart the rsyslog daemon
service rsyslog restart
On the FortiGate side make sure to configure the syslog configuration as the following:
image::fortigate_syslog.png[scaledwidth="100%",alt="FortiGate Syslog"]
=== Suricata IDS
PacketFence already contains a event handler for Suricata. This is an example to raise a security event from a syslog alert on the Suricata SID.
Expand Down

0 comments on commit 2e2862a

Please sign in to comment.