Traffic
Traffic log messages record requests that a FortiWeb policy accepted or blocked. If the request was successful, it also includes the reply. Each log message represents its whole HTTP transaction.
Traffic logs do not record non-HTTP/HTTPS traffic such as FTP. This type of traffic is forwarded to your web servers if you have enabled IP-layer forwarding.
Traffic log messages are described below. For descriptions of header fields not mentioned here, see Header & body fields.
| Meaning |
|---|
|
Traffic matching and complying with a policy passed through or by FortiWeb. If there is an error in the message and the request/response used HTTPS, FortiWeb could not scan it. Depending on the mode of operation, an attack could have bypassed FortiWeb. |
| Solution | |
|---|---|
|
Response times can often be improved by regular expression tuning, offloading SSL/TLS from your back-end server to your FortiWeb (especially if the model supports hardware acceleration), and/or offloading compression. For performance tips, see the FortiWeb Administration Guide. If HTTPS traffic is not flowing as you expect or not being inspected, and you have recently enabled HTTPS, typically this is due to a misconfiguration. The error message in the
If FortiWeb is operating in Reverse Proxy or True Transparent Proxy mode, the traffic was blocked and no attack could have passed through to your protected web servers. No action is required except to make sure that you have uploaded to FortiWeb the correct certificate for all protected web servers. Otherwise, if your appliance was:
examine the web server to determine whether or not an encrypted attack has passed through. You should also examine your web server’s HTTPS configuration and disable cipher suites and key exchanges that are not supported by FortiWeb so that during negotiation with clients, your web server does not agree to use encryption that FortiWeb cannot scan for attacks. By the nature of log-only actions, detected attack attempts are logged but not blocked. You may also want to determine if the attack is from a single source IP address or distributed: blocklisting an offending client may help you to efficiently prevent further attack attempts, improving performance, until you can take further action. By the nature of the network topology for Offline Protection mode (which can potentially cause differences in speeds of the separate routing paths), and asynchronous inspection for Transparent Inspection mode, blocking cannot be guaranteed and some key exchanges are not supported. For details, see the FortiWeb Administration Guide. |
HTTP traffic logs
| Field name | Description |
|
ID ( |
|
|
Sub Type ( |
|
|
Level ( |
See Priority level. |
|
Message ( |
If the HTTP request triggered the FortiWeb web caching feature, the message begins with The HTTP request’s:
such as: |
HTTPS traffic logs
| Field name | Description |
|
ID ( |
|
|
Sub Type ( |
|
|
Level ( |
See Priority level. |
|
Message ( |
If the HTTPS request triggered the FortiWeb web caching feature, the message begins with The HTTPS request’s:
such as:
If the transaction used HTTPS, and there was an error when either decoding it or participating in the handshake, there may be an error message instead of the HTTP method, such as:
|
| Examples | |
|---|---|
|
date=2023-10-13 time=13:55:23 log_id=30001000 msg_id=000000041654 device_id=FVVM08TM23001463 vd="root" timezone="(GMT+8:00)Taipei" timezone_dayst="GMTe-8" type=traffic subtype="https" pri=notice proto=tcp service=https/tls1.2 status=success reason=none policy=RL-HTTP-A-44.1.0.2-HCP-AlertDeny original_src=44.1.2.57 src=44.1.2.57 src_port=10000 dst=10.20.128.10 dst_port=8080 http_request_time=0 http_response_time=0 http_request_bytes=1401 http_response_bytes=38734 http_method=get http_url="/admin" http_agent="Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36" http_retcode=500 msg="HTTPS get request from 44.1.2.57:10000 to 10.20.128.10:8080, clievent(0:0), svrevent(0:0)" original_srccountry="United States" srccountry="United States" content_switch_name="none" server_pool_name="tester-10.20.128.10-11-12-HTTP-8080" http_host="msg.gov.hu" user_name="Unknown" http_refer="none" http_version="1.x" dev_id=3CD3AC15B0B5CE4760A202E0350F82BD6222 cipher_suite="TLS_DHE_RSA_WITH_AES_128_GCM_SHA256" |
FTP traffic logs
| Field name | Description |
|
ID ( |
|
|
Sub Type ( |
|
|
Level ( |
See Priority level. |
| Examples | |
|---|---|
|
date=2023-08-13 time=17:53:05 log_id=30002000 msg_id=000000761559 device_id=FVVM02TM22001887 eventtime=1691920385711464343 vd="root" timezone="(GMT+8:00)Taipei" timezone_dayst="GMTe-8" type=traffic subtype="ftp" pri=notice proto=tcp service=ftps status=success reason=none policy="ftp" original_src=44.5.1.40 src=44.5.1.40 src_port=37708 dst=172.23.132.39 dst_port=21 http_request_time=0 http_response_time=0 http_request_bytes=0 http_response_bytes=143 http_method=OTHERS http_url="none" http_agent="none" http_retcode=220 msg="FTPS OTHERS from 44.5.1.40:37708 to 172.23.132.39:21" original_srccountry="Sweden" srccountry="Sweden" content_switch_name="none" server_pool_name="ftp-172.23.132.39" http_host="none" user_name="Unknown" http_refer="none" http_version="Unknown" dev_id=none cipher_suite="none" x509_cert_subject="none" |