Skip to Content

How to enable local traffic logging per local-in policy

This article describes how to enable local traffic logging per local-in policy. This option allows logging to be configured per local-in policy. Ability to focus on specific local-in policies that are most relevant.

Scope

FortiGate v7.6.x

Solution

The local-in policy logs are displayed in Memory, Disk, FortiAnalyzer, and FortiGate Cloud.

Logging can be configured per local-in policy in the Log & Report > Log Settings page or by using the following commands:

config log setting
set local-in-policy-log {enable | disable}
end
config firewall local-in-policy
edit <id>
set logtraffic {enable | disable}
next

Logging can be configured per local-in policy in the Log & Report, Log Settings page or by using the following commands

In case the log location is Memory/Disk, FortiAnalyzer, or FortiCloud, follow the below settings to enable the local traffic.

config log memory filter
set local-traffic enable
end
config log fortianalyzer filter
set local-traffic enable
end
config log disk filter
set local-traffic enable
end
config log fortiguard setting
set local-traffic enable
end

Note: For low-end devices ( <2 GB RAM) with no Disk logs, in case the log-in memory is disabled to save memory, it is necessary to use FortiAnalyzer or FortiGate Cloud.

For low-end devices with no Disk logs, in case the log-in memory is disabled to save memory, it is necessary to use FortiAnalyzer or FortiGate Cloud.

Local-in traffic can also continue to be logged globally instead of per policy. To configure global local-in traffic logging in the CLI:

disable local-in-policy-log