Support Center Home


Fortinet FortiAuthenticator Monitoring

Overview

LogicMonitor offers out-of-the-box monitoring for the Fortinet FortiAuthenticator user identity management appliance. Our monitoring suite uses SNMP to query the FortiAuthenticator appliance for a variety of health and performance metrics. ​

Setup Requirements

Add Resource Into Monitoring

Add your FortiAuthenticator host into monitoring. For more information on adding resources into monitoring, see Adding Devices.

Enable SNMP

SNMP must be configured on the FortiAuthenticator host in order for the DataSources to apply.

SNMP Credentials

LogicMonitor must provide the appropriate credentials in order to successfully access the FortiAuthenticator device via SNMP. For instructions on how to set the appropriate credentials as properties on the resource within LogicMonitor, see Defining Authentication Credentials.

Import LogicModules

From the LogicMonitor repository, import all Fortinet FortiAuthenticator LogicModules, which are listed in the LogicModules in Package section of this support article. If these LogicModules are already present, ensure you have the most recent versions.

Once the LogicModules are imported (assuming all previous setup requirements have been met), the suite of FortiAuthenticator DataSources will automatically begin collecting data.

LogicModules in Package

LogicMonitor's package for Fortinet FortiAuthenticator consists of the following LogicModules. For full coverage, please ensure that all of these LogicModules are imported into your LogicMonitor platform.

Display Name Type Description
FortiAuthenticator: High Availability DataSource Monitors FortiAuthenticator high availability status.
FortiAuthenticator: Global Statistics DataSource Monitors FortiAuthenticator global system performance metrics.
FortiAuthenticator: Authentication DataSource Monitors FortiAuthenticator authentication metrics.

When setting static datapoint thresholds on the various metrics tracked by this package's DataSources, LogicMonitor follows the technology owner's best practice KPI recommendations. If necessary, we encourage you to adjust these predefined thresholds to meet the unique needs of your environment. For more information on tuning datapoint thresholds, see Tuning Static Thresholds for Datapoints.

In This Article