


If Firewall Analyzer is unable to receive the logs from the FortiGate after configuring from UI, please carryout the steps to configure it through command prompt In order to get the vdom support for FortiGate Firewall, ensure that the log format selected is Syslog instead of WELF. For configuring High Availablity for FortiGate Firewall with vdoms, refer the procedure given below. There is no separate configuration required in Firewall Analyzer for receving logs from Virtual Firewalls of the Fortinet physical device. Firewall Analyzer supports the following versions of FortiGate:
