We used configuration files for the traffic define as "local" and "forward" as defined from the fortinet documentation for FortiOS 5.4.(https://docs.fortinet.com/product/fortigate/5.4)
We defined:
processName as "type=traffic"
tag as "subtype=local" and "subtype=forward"
The Fortinet configuration apply :
config log syslogd setting
set status enable
set server "Remote IP server"
set reliable disable
set port 514
set csv disable
set facility local7
set source-ip 'One IP interface on the Fortinet'
Coverage remained the same at 43.107% when pulling 4e90cf588c043ecc3c607f9a284936b77306a93e on tkinet:develop into 8850ac87d9bec67ee54cd15b9815bf84a335c12e on napalm-automation:develop.
We used configuration files for the traffic define as "local" and "forward" as defined from the fortinet documentation for FortiOS 5.4.(https://docs.fortinet.com/product/fortigate/5.4) We defined:
The Fortinet configuration apply : config log syslogd setting set status enable set server "Remote IP server" set reliable disable set port 514 set csv disable set facility local7 set source-ip 'One IP interface on the Fortinet'