Fortinet FortiGate-800 Displaying the FortiGate up time, Displaying log hard disk status, 108

Page 108

Displaying the FortiGate up time

System status

 

 

Displaying the FortiGate up time

1Go to System > Status.

The FortiGate up time displays the time in days, hours, and minutes since the FortiGate unit was last started.

Displaying log hard disk status

1Go to System > Status.

Log Hard Disk displays Available if the FortiGate unit contains a hard disk and Not Available if no hard disk is installed. The FortiGate unit uses the hard disk to store log messages and quarantine files infected with a virus or blocked by antivirus file blocking.

Backing up system settings

You can back up system settings by downloading them to a text file on the management computer.

To back up system settings

1Go to System > Status.

2Select System Settings Backup.

3Select Backup System Settings.

4Type a name and location for the file.

The system settings file is backed up to the management computer.

5Select Return to go back to the Status page.

Restoring system settings

You can restore system settings by uploading a previously downloaded system settings text file.

To restore system settings

1Go to System > Status.

2Select System Settings Restore.

3Enter the path and filename of the system settings file, or select Browse and locate the file.

4Select OK to restore the system settings file to the FortiGate unit. The FortiGate unit restarts, loading the new system settings.

5Reconnect to the web-based manager and review your configuration to confirm that the uploaded system settings have taken effect.

108

Fortinet Inc.

Image 108
Contents Installation and Configuration Guide January 15Trademarks Regulatory ComplianceTable of Contents NAT/Route mode installation High availability Virus and attack definitions updates and registration 117 Network configuration 137 System configuration 169 Users and authentication 223 IPSec VPN 231 Network Intrusion Detection System Nids 269 Email filter 303 Glossary 323 Index 327 Contents Introduction Flexibility demanded by large enterprisesWeb content filtering Antivirus protectionEmail filtering FirewallNAT/Route mode Transparent modeVLANs and virtual domains Network intrusion detectionVPN High availabilitySecure installation, configuration, and management Web-based managerCommand line interface Logging and reportingDocument conventions Fortinet documentationCustomer service and technical support Comments on Fortinet technical documentationCustomer service and technical support Getting started Package contents MountingPowering on Power requirementsEnvironmental specifications To power on the FortiGate-800 unitConnecting to the web-based manager To connect to the web-based managerConnecting to the command line interface CLI To connect to the CLIBits per second 9600 Data bits Parity Stop bits Flow controlFactory default FortiGate configuration settings Factory default NAT/Route mode network configurationAccount Internal interfaceFactory default Transparent mode network configuration Factory default firewall configuration Factory default content profiles Strict content profileScan content profile Strict content profile OptionsScan content profile Options Web content profile Unfiltered content profileWeb content profile Options Unfiltered content profile OptionsPlanning the FortiGate configuration Example NAT/Route mode network configurationNAT/Route mode with multiple external network connections Example NAT/Route multiple internet connection configurationConfiguration options Setup wizardFortiGate model maximum values matrix Front keypad and LCDNext steps Signatures Antivirus file Block patterns Web filterNAT/Route mode installation Preparing to configure NAT/Route modeAdvanced NAT/Route mode settings Advanced FortiGate NAT/Route mode settingsDhcp server Using the setup wizard Starting the setup wizardReconnecting to the web-based manager DMZ and user-defined interfacesUsing the front control buttons and LCD Using the command line interfaceConfiguring the FortiGate unit to operate in NAT/Route mode Configuring NAT/Route mode IP addressesSet system interface external mode static ip 204.23.1.5 Connecting the FortiGate unit to your networks To connect the FortiGate unit running in NAT/Route modeFortiGate-800 External To connect to FortiGate-800 user-defined interfacesConfiguring your networks Example FortiGate-800 user-defined interface connectionsCompleting the configuration Configuring the DMZ interfaceConfiguring interfaces 1 to Setting the date and timeConfiguration example Multiple connections to the Internet Configuring virus and attack definition updatesRegistering your FortiGate unit Configuring ping servers InternalUsing the CLI Primary and backup links to the InternetDestination-based routing examples Go to System Network Routing TableLoad sharing Load sharing and primary and secondary connectionsTo add the routes using the CLI Routing table should have routes arranged as shown in TableRouting a service to an external network Policy routing examplesAdding a redundant default policy Destination DMZAll Schedule Always ServiceFirewall policy example Adding more firewall policiesRestricting access to a single Internet connection Configuration example Multiple connections to the Internet Transparent mode installation Preparing to configure Transparent modeTransparent mode settings Administrator Password DNS SettingsChanging to Transparent mode using the web-based manager Go to System StatusChanging to Transparent mode using the CLI Operation mode TransparentConfiguring the Transparent mode management IP address Configure the Transparent mode default gatewayEnabling antivirus protection Connecting the FortiGate unit to your networks Transparent mode configuration examples FortiGate-800Default routes and static routes Example default route to an external networkGeneral configuration steps Default route to an external networkWeb-based manager example configuration steps CLI configuration stepsExample static route to an external destination Go to System Network ManagementDMZ Example static route to an internal destination FortiGate-800 Set system route number 1 dst 172.16.1.11 255.255.255.0 gw1 Transparent mode configuration examples High availability Configuring an HA cluster Configuring FortiGate units for HA operationTo configure a FortiGate unit for HA operation Go to System Config HAWeighted Round Robin NoneHub Least ConnectionConnecting the cluster Example Active-Active HA configurationHA network configuration To connect the clusterManaging an HA cluster Adding a new FortiGate unit to a functioning clusterTo add a new unit to the cluster Configuring cluster interface monitoring Viewing the status of cluster members Monitoring cluster membersTo set the update frequency Example cluster CPU, memory, and hard disk displayViewing cluster sessions Viewing and managing cluster log messagesMonitoring cluster units for failover Viewing cluster communication sessionsManaging individual cluster units Changing cluster unit host names To manage a cluster unitTo set the host name of each cluster member Synchronizing the cluster configuration Keyword DescriptionUpgrading firmware Advanced HA options Replacing a FortiGate unit after failoverSelecting a FortiGate unit as a permanent primary unit To select a permanent primary unitConfiguring weighted-round-robin weights To set the priority of each FortiGate unit in a clusterActive-Active cluster packet flow Active-active HA packet flowNAT/Route mode packet flow Transparent mode packet flow Active-Active cluster packet flow System status System statusFirmware upgrade procedures Procedure Description Changing the FortiGate host nameChanging the FortiGate firmware To change the FortiGate host name Go to System StatusUpgrading the firmware using the web-based manager Upgrading the firmware using the CLITo upgrade the firmware using the web-based manager To upgrade the firmware using the CLIReverting to a previous firmware version Execute pingReverting to a previous firmware version using the CLI To revert to a previous firmware version using the CLI To install firmware from a system reboot Press any key to enter configuration menu 100Restoring the previous configuration Testing a new firmware image before installing it101 102 To test a new firmware imageInstalling and using a backup firmware image Installing a backup firmware image103 To install a backup firmware image 104Switching to the backup firmware image To switch to the backup firmware image105 Manual virus definition updates Switching back to the default firmware imageTo switch back to the default firmware image To update the antivirus definitions manuallyManual attack definition updates To update the attack definitions manuallyDisplaying the FortiGate serial number 107Backing up system settings Restoring system settingsDisplaying the FortiGate up time Displaying log hard disk statusRestoring system settings to factory defaults Changing to Transparent modeTo change to Transparent mode Go to System Status 109Changing to NAT/Route mode To change to NAT/Route mode Go to System StatusRestarting the FortiGate unit Shutting down the FortiGate unitSystem status Viewing CPU and memory status111 To view CPU and memory status Go to System Status MonitorViewing sessions and network status CPU and memory status monitorViewing virus and intrusions status 113Session list To view the session list Go to System Status Session115 Protocol116 Virus and attack definitions updates and registration Updating antivirus and attack definitions117 Connecting to the FortiResponse Distribution Network Go to System UpdateVersion Expiry date Last update attempt Last update status To make sure the FortiGate unit can connect to the FDNManually initiating antivirus and attack definitions updates 119Scheduling updates Configuring update loggingEnabling scheduled updates 120To add an override server Go to System Update Adding an override server121 Enabling push updates Enabling scheduled updates through a proxy server122 Enabling push updates Push updates when FortiGate IP addresses changeTo enable push updates Go to System Update 123Enabling push updates through a NAT device Example push updates through a NAT device124 General procedure 125126 To configure the FortiGate NAT device Schedule Always Service ANY Action AcceptAdding a firewall policy for the port forwarding virtual IP 127Registering FortiGate units 128FortiCare Service Contracts 129Registering the FortiGate unit 130Updating registration information 131Recovering a lost Fortinet support password Viewing the list of registered FortiGate units132 Registering a new FortiGate unit Adding or changing a FortiCare Support Contract number133 Changing your Fortinet support password Changing your contact information or security question134 Downloading virus and attack definitions updates 135Registering a FortiGate unit after an RMA 136Network configuration Configuring zones137 Configuring interfaces Adding zonesDeleting zones 138Changing the administrative status of an interface Viewing the interface listAdding an interface to a zone 139Configuring an interface with a manual IP address Configuring an interface for Dhcp140 Configuring an interface for PPPoE 141Adding a secondary IP address to an interface Adding a ping server to an interface142 Controlling administrative access to an interface 143Configuring traffic logging for connections to an interface Configuring the management interface in Transparent modeChanging the MTU size to improve network performance 144Vlan overview 145VLANs in NAT/Route mode Rules for Vlan IDsRules for Vlan IP addresses 146Virtual domains in Transparent mode Adding Vlan subinterfaces147 To add Vlan subinterfaces Go to System Network Interface148 FortiGate unit with two virtual domainsConfiguring a virtual domain Virtual domain propertiesAdding a virtual domain 149Adding Vlan subinterfaces to a virtual domain Adding zones to virtual domains150 151 To add a zone to a virtual domain Go to System Network ZoneAdding firewall policies for virtual domains Adding addresses for virtual domains152 Go to Firewall AddressConfiguring routing Adding DNS server IP addressesDeleting virtual domains 153Adding a default route To add a default route Go to System Network Routing TableAdding destination-based routes to the routing table 154Adding routes in Transparent mode 155Configuring the routing table Policy routing156 Configuring Dhcp services Policy routing command syntax157 Configuring a Dhcp relay agent Configuring a Dhcp serverAdding a Dhcp server to an interface Adding scopes to a Dhcp server159 To add a scope to a Dhcp server Go to System Network DhcpAdding a reserve IP to a Dhcp server Viewing a Dhcp server dynamic IP list160 Selected scopeRIP configuration RIP settings161 162 InvalidHolddown FlushConfiguring RIP for FortiGate interfaces 163Example RIP configuration for an internal interface 164Adding RIP filters Adding a RIP filter list165 To add a RIP filter list Go to System RIP FilterAssigning a RIP filter list to the neighbors filter Assigning a RIP filter list to the incoming filter166 Assigning a RIP filter list to the outgoing filter 167168 System configuration Setting system date and timeTo set the date and time Go to System Config Time 169To set the system idle timeout Go to System Config Options To set the Auth timeout Go to System Config OptionsChanging system options 170Modifying the Dead Gateway Detection settings 171Adding and editing administrator accounts Adding new administrator accountsTo add an administrator account Go to System Config Admin 172Configuring Snmp Editing administrator accountsTo edit an administrator account Go to System Config Admin 173Configuring the FortiGate unit for Snmp monitoring Configuring FortiGate Snmp supportConfiguring Snmp access to an interface Configuring Snmp community settings175 System NameSystem Location FortiGate MIBs 176FortiGate traps General FortiGate trapsSystem traps 177VPN traps Nids trapsAntivirus traps Logging trapsSystem configuration and status Firewall configurationFortinet MIB fields 179180 Replacement messages Logging and reporting configuration181 Customizing replacement messages 182Customizing alert emails 183Alert email message sections 184 Alert email message sectionsFirewall configuration 185Default firewall configuration 186Interfaces Vlan subinterfacesZones 187Services Default addresses Interface Address DescriptionAddresses SchedulesContent profiles Adding firewall policies189 To add a firewall policy Go to Firewall PolicyFirewall policy options Source190 Service DestinationSchedule ActionVPN Tunnel Traffic Shaping192 Dynamic IP Pool Fixed PortAuthentication Anti-Virus & Web filter193 Maximum Bandwidth Traffic PriorityLog Traffic Comments194 Configuring policy lists Policy matching in detail195 Changing the order of policies in a policy list Enabling and disabling policiesDisabling policies Enabling policiesAddresses Adding addresses197 To add an address Go to Firewall AddressEditing addresses 198To edit an address Go to Firewall Address Deleting addresses Organizing addresses into address groups199 To delete an address Go to Firewall AddressServices Predefined services200 201 GRE202 LdapAdding custom TCP and UDP services 203Adding custom Icmp services Adding custom IP servicesGrouping services 204Schedules 205Creating one-time schedules 206Creating recurring schedules 207Virtual IPs Adding schedules to policies208 To add a schedule to a policy Go to Firewall PolicyAdding static NAT virtual IPs 209To add a static NAT virtual IP Go to Firewall Virtual IP Virtual IP External Interface examples Description InternalAdding port forwarding virtual IPs 210211 Adding policies with virtual IPs 212To add a policy with a virtual IP Go to Firewall Policy IP pools Adding an IP pool213 To add an IP pool Go to Firewall IP PoolIP/MAC binding IP Pools for firewall policies that use fixed portsIP pools and dynamic NAT 214215 Go to Firewall IP/MAC Binding Static IP/MACAdding IP/MAC addresses 216Viewing the dynamic IP/MAC list Enabling IP/MAC binding217 Content profiles 218Default content profiles Adding content profilesTo add a content profile Go to Firewall Content Profile 219220 Oversized File/Email Pass Fragmented EmailAdding content profiles to policies To add a content profile to a policy Go to Firewall Policy221 222 Users and authentication 223Setting authentication timeout Adding user names and configuring authenticationAdding user names and configuring authentication To set authentication timeout Go to System Config OptionsDeleting user names from the internal database 225Configuring Radius support Adding Radius serversDeleting Radius servers 226Configuring Ldap support Adding Ldap servers227 To add an Ldap server Go to User LdapDeleting Ldap servers 228To delete an Ldap server Go to User Ldap Configuring user groups Adding user groups229 To add a user group Go to User User GroupDeleting user groups 230To delete a user group Go to User User Group IPSec VPN 231Key management Manual KeysAutoIKE with pre-shared keys AutoIKE with certificatesGeneral configuration steps for a manual key VPN Manual key IPSec VPNsAdding a manual key VPN tunnel 233234 AES128AES192 AES256General configuration steps for an AutoIKE VPN Adding a phase 1 configuration for an AutoIKE VPNAutoIKE IPSec VPNs 235236 Remote Gateway Static IP AddressRemote Gateway Dialup User Configuring advanced options To configure phase 1 advanced options237 238 Adding a phase 1 configuration Standard options 239Adding a phase 2 configuration for an AutoIKE VPN To add a phase 2 configuration Go to VPN Ipsec Phase240 241 Use selectors from policyUse wildcard selectors Managing digital certificates Obtaining a signed local certificateGenerating the certificate request 242243 Key TypeKey Size Downloading the certificate request Importing the signed local certificate244 Configuring encrypt policies Obtaining CA certificatesImporting CA certificates 245Adding a source address 246To add a source address Go to Firewall Address Adding a destination address Adding an encrypt policy247 To add a destination address Go to Firewall Address248 IPSec VPN concentrators 249VPN concentrator hub general configuration steps To create a VPN concentrator configuration250 Adding a VPN concentrator 251VPN spoke general configuration steps To create a VPN spoke configuration252 Redundant IPSec VPNs 253Configuring redundant IPSec VPNs To configure a redundant IPSec VPN254 Monitoring and Troubleshooting VPNs To view VPN tunnel status Go to VPN Ipsec PhaseViewing VPN tunnel status Viewing dialup VPN connection statusTesting a VPN 256Configuring Pptp Pptp and L2TP VPN257 Configuring the FortiGate unit as a Pptp gateway 258To add users and user groups To add a source address259 To add a source address groupTo add a destination address To add a firewall policyConfiguring a Windows 98 client for Pptp 260Configuring a Windows 2000 client for Pptp Configuring a Windows XP client for Pptp261 To connect to the Pptp VPNTo configure the VPN connection 262Select Properties Security Configuring L2TP Configuring the FortiGate unit as an L2TP gateway263 264 To add source addressesConfiguring a Windows 2000 client for L2TP 265To disable IPSec 266To connect to the L2TP VPN Configuring a Windows XP client for L2TP 267268 Network Intrusion Detection System Nids Detecting attacks269 Configuring checksum verification Selecting the interfaces to monitorDisabling monitoring interfaces 270Viewing the signature list Viewing attack descriptions271 Disabling Nids attack signatures Adding user-defined signatures272 Downloading the user-defined signature list 273To enable Nids attack prevention Go to Nids Prevention Preventing attacksEnabling Nids attack prevention Enabling Nids attack prevention signaturesSetting signature threshold values 275Logging attacks Logging attack messages to the attack logReducing the number of Nids attack log and email messages Automatic message reductionManual message reduction 277278 General configuration steps Antivirus protection279 Antivirus scanning 280To scan FortiGate firewall traffic for viruses File blocking 281Blocking files in firewall traffic Adding file patterns to block282 To block files in firewall trafficQuarantine Quarantining infected filesQuarantining blocked files 283Viewing the quarantine list Sorting the quarantine list284 To view the quarantine list Go to Anti-Virus QuarantineConfiguring quarantine options Filtering the quarantine listDeleting files from the quarantine list Downloading quarantined filesConfiguring limits for oversized files and email Blocking oversized files and emails286 To view the virus list Go to Anti-Virus Config Virus List Exempting fragmented email from blockingViewing the virus list 287288 Web filtering 289Content blocking Go to Web Filter Content BlockAdding words and phrases to the Banned Word list 290Clearing the Banned Word list 291Backing up the Banned Word list Restoring the Banned Word list292 Configuring FortiGate Web URL blocking URL blockingAdding URLs to the Web URL block list 293Clearing the Web URL block list 294Downloading the Web URL block list Uploading a URL block list295 To upload a URL block listConfiguring Cerberian URL filtering Configuring FortiGate Web pattern blocking296 Installing a Cerberian license key Configuring Cerberian web filterAbout the default group and policy Adding a Cerberian userTo configure Cerberian web filtering Enabling Cerberian URL filtering298 Script filtering Enabling script filteringSelecting script filter options 299Exempt URL list Adding URLs to the URL Exempt list300 Go to Web Filter URLExemptDownloading the URL Exempt List Uploading a URL Exempt List301 Go to Web Filter URL Exempt302 Email filter 303Email banned word list Adding words and phrases to the email banned word list304 Downloading the email banned word list Uploading the email banned word list305 Email block list Adding address patterns to the email block listDownloading the email block list 306Email exempt list Uploading an email block list307 To upload the email block listTo add a subject tag Go to Email Filter Config Adding a subject tagAdding address patterns to the email exempt list 308Logging and reporting Recording logs309 Recording logs on a remote computer Recording logs on a NetIQ WebTrends server310 Recording logs on the FortiGate hard disk 311Overwrite OptionRecording logs in system memory Log message levels312 To filter log entries Go to Log&Report Log Setting Filtering log messages313 Configuring traffic logging 314Enabling traffic logging Enabling traffic logging for an interfaceEnabling traffic logging for a Vlan subinterface Enabling traffic logging for a firewall policyConfiguring traffic filter settings Adding traffic filter entries316 Resolve IPDestination IP Address Destination Netmask Service Viewing logs saved to memoryViewing logs 317Viewing and managing logs saved to the hard disk Searching logs318 Keyword319 To view the active or saved logs Go to Log&Report LoggingDownloading a log file to the management computer Deleting all messages from an active logDeleting a saved log file 320Configuring alert email Testing alert emailAdding alert email addresses 321Enabling alert email 322Glossary 323324 325 326 Index 327328 Index329 Dialup Pptp330 Http331 Ldap332 333 Pptp dialup connection334 335 TCP336 Vlan