In a Security Fabric, every FortiGate device sends its logs directly to FortiAnalyzer, independently of the root FortiGate.
While the root FortiGate is typically responsible for configuring and managing the log forwarding configuration, all leaf FortiGates (downstream devices) send their logs to FortiAnalyzer, ensuring complete visibility across the Security Fabric.
This design ensures redundancy and guarantees that logs are not lost if a specific FortiGate device in the fabric fails.
Other options are incorrect for the following reasons:
A: Only the root FortiGate is responsible for configuration synchronization, not exclusive logging.
C: NAT or UTM devices log traffic details, but all devices in the Security Fabric send logs, not just these.
D: Logging is not limited to the last FortiGate in the session chain; all devices log their activity independently.
All Fortigates send logs to FortiAnalyzer.
But session logs only sent by first fortigate that handle the session, so it's not being duplicated. If any fortigate that performs NAT or UTM, it will generate additional log for that session and send it to FortiAnalyzer.
See page 69
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
myrmidon3
4 months, 2 weeks agoFebrian
5 months, 2 weeks agoTotoahren
5 months, 3 weeks ago140ecf2
7 months agoMellon
8 months, 2 weeks agoMellon
8 months, 2 weeks agocharruco
11 months, 2 weeks agoGCISystemIntegrator
12 months agodsticht
1 year ago