Fortinet FortiGate-800 manual Enabling alert email, 322

Page 322

Configuring alert email

Logging and reporting

 

 

Enabling alert email

You can configure the FortiGate unit to send alert email in response to virus incidents, intrusion attempts, and critical firewall or VPN events or violations. If you have configured logging to a local disk, you can enable sending an alert email when the hard disk is almost full.

To enable alert email

1Go to Log&Report > Alert Mail > Categories.

2Select Enable alert email for virus incidents.

Alert email is not sent when antivirus file blocking deletes a file.

3Select Enable alert email for block incidents to have the FortiGate unit send an alert email when it blocks files affected by viruses.

4Select Enable alert email for intrusions to have the FortiGate unit send an alert email to notify the system administrator of attacks detected by the NIDS.

5Select Enable alert email for critical firewall/VPN events or violations to have the FortiGate unit send an alert email when a critical firewall or VPN event occurs. Critical firewall events include failed authentication attempts.

Critical VPN events include when replay detection detects a replay packet. Replay detection can be configured for both manual key and AutoIKE Key VPN tunnels.

6Select Send alert email when disk is full to have the FortiGate unit send an alert email when the hard disk is almost full.

7Select Apply.

322

Fortinet Inc.

Image 322
Contents Installation and Configuration Guide January 15Trademarks Regulatory ComplianceTable of Contents NAT/Route mode installation High availability Virus and attack definitions updates and registration 117 Network configuration 137 System configuration 169 Users and authentication 223 IPSec VPN 231 Network Intrusion Detection System Nids 269 Email filter 303 Glossary 323 Index 327 Contents Introduction Flexibility demanded by large enterprisesWeb content filtering Antivirus protectionEmail filtering FirewallVLANs and virtual domains NAT/Route modeTransparent mode Network intrusion detectionVPN High availabilitySecure installation, configuration, and management Web-based managerCommand line interface Logging and reportingDocument conventions Fortinet documentationCustomer service and technical support Comments on Fortinet technical documentationCustomer service and technical support Getting started Package contents MountingEnvironmental specifications Powering onPower requirements To power on the FortiGate-800 unitConnecting to the web-based manager To connect to the web-based managerBits per second 9600 Data bits Parity Connecting to the command line interface CLITo connect to the CLI Stop bits Flow controlAccount Factory default FortiGate configuration settingsFactory default NAT/Route mode network configuration Internal interfaceFactory default Transparent mode network configuration Factory default firewall configuration Factory default content profiles Strict content profileStrict content profile Options Scan content profileScan content profile Options Web content profile Options Web content profileUnfiltered content profile Unfiltered content profile OptionsPlanning the FortiGate configuration Example NAT/Route mode network configurationNAT/Route mode with multiple external network connections Example NAT/Route multiple internet connection configurationConfiguration options Setup wizardFortiGate model maximum values matrix Front keypad and LCDNext steps Signatures Antivirus file Block patterns Web filterNAT/Route mode installation Preparing to configure NAT/Route modeAdvanced FortiGate NAT/Route mode settings Advanced NAT/Route mode settingsDhcp server Reconnecting to the web-based manager Using the setup wizardStarting the setup wizard DMZ and user-defined interfacesConfiguring the FortiGate unit to operate in NAT/Route mode Using the front control buttons and LCDUsing the command line interface Configuring NAT/Route mode IP addressesSet system interface external mode static ip 204.23.1.5 Connecting the FortiGate unit to your networks To connect the FortiGate unit running in NAT/Route modeFortiGate-800 External To connect to FortiGate-800 user-defined interfacesConfiguring your networks Example FortiGate-800 user-defined interface connectionsConfiguring interfaces 1 to Completing the configurationConfiguring the DMZ interface Setting the date and timeConfiguring virus and attack definition updates Configuration example Multiple connections to the InternetRegistering your FortiGate unit Configuring ping servers InternalDestination-based routing examples Using the CLIPrimary and backup links to the Internet Go to System Network Routing TableLoad sharing Load sharing and primary and secondary connectionsTo add the routes using the CLI Routing table should have routes arranged as shown in TableRouting a service to an external network Policy routing examplesFirewall policy example Adding a redundant default policyDestination DMZAll Schedule Always Service Adding more firewall policiesRestricting access to a single Internet connection Configuration example Multiple connections to the Internet Transparent mode settings Administrator Password Transparent mode installationPreparing to configure Transparent mode DNS SettingsChanging to Transparent mode using the web-based manager Go to System StatusChanging to Transparent mode using the CLI Operation mode TransparentConfigure the Transparent mode default gateway Configuring the Transparent mode management IP addressEnabling antivirus protection Connecting the FortiGate unit to your networks Transparent mode configuration examples FortiGate-800Default routes and static routes Example default route to an external networkGeneral configuration steps Default route to an external networkExample static route to an external destination Web-based manager example configuration stepsCLI configuration steps Go to System Network ManagementDMZ Example static route to an internal destination FortiGate-800 Set system route number 1 dst 172.16.1.11 255.255.255.0 gw1 Transparent mode configuration examples High availability To configure a FortiGate unit for HA operation Configuring an HA clusterConfiguring FortiGate units for HA operation Go to System Config HAHub Weighted Round RobinNone Least ConnectionConnecting the cluster Example Active-Active HA configurationHA network configuration To connect the clusterAdding a new FortiGate unit to a functioning cluster Managing an HA clusterTo add a new unit to the cluster Configuring cluster interface monitoring Viewing the status of cluster members Monitoring cluster membersTo set the update frequency Example cluster CPU, memory, and hard disk displayViewing cluster sessions Viewing and managing cluster log messagesViewing cluster communication sessions Monitoring cluster units for failoverManaging individual cluster units To manage a cluster unit Changing cluster unit host namesTo set the host name of each cluster member Synchronizing the cluster configuration Keyword DescriptionUpgrading firmware Selecting a FortiGate unit as a permanent primary unit Advanced HA optionsReplacing a FortiGate unit after failover To select a permanent primary unitConfiguring weighted-round-robin weights To set the priority of each FortiGate unit in a clusterActive-Active cluster packet flow Active-active HA packet flowNAT/Route mode packet flow Transparent mode packet flow Active-Active cluster packet flow System status System statusChanging the FortiGate firmware Firmware upgrade procedures Procedure DescriptionChanging the FortiGate host name To change the FortiGate host name Go to System StatusTo upgrade the firmware using the web-based manager Upgrading the firmware using the web-based managerUpgrading the firmware using the CLI To upgrade the firmware using the CLIReverting to a previous firmware version Execute pingReverting to a previous firmware version using the CLI To revert to a previous firmware version using the CLI To install firmware from a system reboot Press any key to enter configuration menu 100Testing a new firmware image before installing it Restoring the previous configuration101 102 To test a new firmware imageInstalling a backup firmware image Installing and using a backup firmware image103 To install a backup firmware image 104To switch to the backup firmware image Switching to the backup firmware image105 To switch back to the default firmware image Manual virus definition updatesSwitching back to the default firmware image To update the antivirus definitions manuallyDisplaying the FortiGate serial number Manual attack definition updatesTo update the attack definitions manually 107Displaying the FortiGate up time Backing up system settingsRestoring system settings Displaying log hard disk statusTo change to Transparent mode Go to System Status Restoring system settings to factory defaultsChanging to Transparent mode 109Restarting the FortiGate unit Changing to NAT/Route modeTo change to NAT/Route mode Go to System Status Shutting down the FortiGate unit111 System statusViewing CPU and memory status To view CPU and memory status Go to System Status MonitorViewing sessions and network status CPU and memory status monitorViewing virus and intrusions status 113Session list To view the session list Go to System Status Session115 Protocol116 Updating antivirus and attack definitions Virus and attack definitions updates and registration117 Version Expiry date Last update attempt Last update status Connecting to the FortiResponse Distribution NetworkGo to System Update To make sure the FortiGate unit can connect to the FDNManually initiating antivirus and attack definitions updates 119Enabling scheduled updates Scheduling updatesConfiguring update logging 120Adding an override server To add an override server Go to System Update121 Enabling scheduled updates through a proxy server Enabling push updates122 To enable push updates Go to System Update Enabling push updatesPush updates when FortiGate IP addresses change 123Example push updates through a NAT device Enabling push updates through a NAT device124 General procedure 125126 Adding a firewall policy for the port forwarding virtual IP To configure the FortiGate NAT deviceSchedule Always Service ANY Action Accept 127Registering FortiGate units 128FortiCare Service Contracts 129Registering the FortiGate unit 130Updating registration information 131Viewing the list of registered FortiGate units Recovering a lost Fortinet support password132 Adding or changing a FortiCare Support Contract number Registering a new FortiGate unit133 Changing your contact information or security question Changing your Fortinet support password134 Downloading virus and attack definitions updates 135Registering a FortiGate unit after an RMA 136Configuring zones Network configuration137 Deleting zones Configuring interfacesAdding zones 138Adding an interface to a zone Changing the administrative status of an interfaceViewing the interface list 139Configuring an interface for Dhcp Configuring an interface with a manual IP address140 Configuring an interface for PPPoE 141Adding a ping server to an interface Adding a secondary IP address to an interface142 Controlling administrative access to an interface 143Changing the MTU size to improve network performance Configuring traffic logging for connections to an interfaceConfiguring the management interface in Transparent mode 144Vlan overview 145Rules for Vlan IP addresses VLANs in NAT/Route modeRules for Vlan IDs 146147 Virtual domains in Transparent modeAdding Vlan subinterfaces To add Vlan subinterfaces Go to System Network Interface148 FortiGate unit with two virtual domainsAdding a virtual domain Configuring a virtual domainVirtual domain properties 149Adding zones to virtual domains Adding Vlan subinterfaces to a virtual domain150 151 To add a zone to a virtual domain Go to System Network Zone152 Adding firewall policies for virtual domainsAdding addresses for virtual domains Go to Firewall AddressDeleting virtual domains Configuring routingAdding DNS server IP addresses 153Adding destination-based routes to the routing table Adding a default routeTo add a default route Go to System Network Routing Table 154Adding routes in Transparent mode 155Policy routing Configuring the routing table156 Policy routing command syntax Configuring Dhcp services157 Adding a Dhcp server to an interface Configuring a Dhcp relay agentConfiguring a Dhcp server Adding scopes to a Dhcp server159 To add a scope to a Dhcp server Go to System Network Dhcp160 Adding a reserve IP to a Dhcp serverViewing a Dhcp server dynamic IP list Selected scopeRIP settings RIP configuration161 Holddown 162Invalid FlushConfiguring RIP for FortiGate interfaces 163Example RIP configuration for an internal interface 164165 Adding RIP filtersAdding a RIP filter list To add a RIP filter list Go to System RIP FilterAssigning a RIP filter list to the incoming filter Assigning a RIP filter list to the neighbors filter166 Assigning a RIP filter list to the outgoing filter 167168 To set the date and time Go to System Config Time System configurationSetting system date and time 169Changing system options To set the system idle timeout Go to System Config OptionsTo set the Auth timeout Go to System Config Options 170Modifying the Dead Gateway Detection settings 171To add an administrator account Go to System Config Admin Adding and editing administrator accountsAdding new administrator accounts 172To edit an administrator account Go to System Config Admin Configuring SnmpEditing administrator accounts 173Configuring Snmp access to an interface Configuring the FortiGate unit for Snmp monitoringConfiguring FortiGate Snmp support Configuring Snmp community settingsSystem Name 175System Location FortiGate MIBs 176System traps FortiGate trapsGeneral FortiGate traps 177Antivirus traps VPN trapsNids traps Logging trapsFortinet MIB fields System configuration and statusFirewall configuration 179180 Logging and reporting configuration Replacement messages181 Customizing replacement messages 182183 Customizing alert emailsAlert email message sections 184 Alert email message sectionsFirewall configuration 185Default firewall configuration 186Zones InterfacesVlan subinterfaces 187Addresses ServicesDefault addresses Interface Address Description Schedules189 Content profilesAdding firewall policies To add a firewall policy Go to Firewall PolicySource Firewall policy options190 Schedule ServiceDestination Action192 VPN TunnelTraffic Shaping Dynamic IP Pool Fixed Port193 AuthenticationAnti-Virus & Web filter Maximum Bandwidth Traffic PriorityComments Log Traffic194 Policy matching in detail Configuring policy lists195 Disabling policies Changing the order of policies in a policy listEnabling and disabling policies Enabling policies197 AddressesAdding addresses To add an address Go to Firewall Address198 Editing addressesTo edit an address Go to Firewall Address 199 Deleting addressesOrganizing addresses into address groups To delete an address Go to Firewall AddressPredefined services Services200 201 GRE202 LdapAdding custom TCP and UDP services 203Grouping services Adding custom Icmp servicesAdding custom IP services 204Schedules 205Creating one-time schedules 206Creating recurring schedules 207208 Virtual IPsAdding schedules to policies To add a schedule to a policy Go to Firewall PolicyTo add a static NAT virtual IP Go to Firewall Virtual IP Adding static NAT virtual IPs209 Virtual IP External Interface examples Description InternalAdding port forwarding virtual IPs 210211 212 Adding policies with virtual IPsTo add a policy with a virtual IP Go to Firewall Policy 213 IP poolsAdding an IP pool To add an IP pool Go to Firewall IP PoolIP pools and dynamic NAT IP/MAC bindingIP Pools for firewall policies that use fixed ports 214215 Go to Firewall IP/MAC Binding Static IP/MACAdding IP/MAC addresses 216Enabling IP/MAC binding Viewing the dynamic IP/MAC list217 Content profiles 218To add a content profile Go to Firewall Content Profile Default content profilesAdding content profiles 219220 Oversized File/Email Pass Fragmented EmailTo add a content profile to a policy Go to Firewall Policy Adding content profiles to policies221 222 Users and authentication 223Adding user names and configuring authentication Setting authentication timeoutAdding user names and configuring authentication To set authentication timeout Go to System Config OptionsDeleting user names from the internal database 225Deleting Radius servers Configuring Radius supportAdding Radius servers 226227 Configuring Ldap supportAdding Ldap servers To add an Ldap server Go to User Ldap228 Deleting Ldap serversTo delete an Ldap server Go to User Ldap 229 Configuring user groupsAdding user groups To add a user group Go to User User Group230 Deleting user groupsTo delete a user group Go to User User Group IPSec VPN 231AutoIKE with pre-shared keys Key managementManual Keys AutoIKE with certificatesAdding a manual key VPN tunnel General configuration steps for a manual key VPNManual key IPSec VPNs 233AES192 234AES128 AES256AutoIKE IPSec VPNs General configuration steps for an AutoIKE VPNAdding a phase 1 configuration for an AutoIKE VPN 235Remote Gateway Static IP Address 236Remote Gateway Dialup User To configure phase 1 advanced options Configuring advanced options237 238 Adding a phase 1 configuration Standard options 239To add a phase 2 configuration Go to VPN Ipsec Phase Adding a phase 2 configuration for an AutoIKE VPN240 Use selectors from policy 241Use wildcard selectors Generating the certificate request Managing digital certificatesObtaining a signed local certificate 242Key Type 243Key Size Importing the signed local certificate Downloading the certificate request244 Importing CA certificates Configuring encrypt policiesObtaining CA certificates 245246 Adding a source addressTo add a source address Go to Firewall Address 247 Adding a destination addressAdding an encrypt policy To add a destination address Go to Firewall Address248 IPSec VPN concentrators 249To create a VPN concentrator configuration VPN concentrator hub general configuration steps250 Adding a VPN concentrator 251To create a VPN spoke configuration VPN spoke general configuration steps252 Redundant IPSec VPNs 253To configure a redundant IPSec VPN Configuring redundant IPSec VPNs254 Viewing VPN tunnel status Monitoring and Troubleshooting VPNsTo view VPN tunnel status Go to VPN Ipsec Phase Viewing dialup VPN connection statusTesting a VPN 256Pptp and L2TP VPN Configuring Pptp257 To add users and user groups Configuring the FortiGate unit as a Pptp gateway258 To add a source addressTo add a destination address 259To add a source address group To add a firewall policyConfiguring a Windows 98 client for Pptp 260261 Configuring a Windows 2000 client for PptpConfiguring a Windows XP client for Pptp To connect to the Pptp VPN262 To configure the VPN connectionSelect Properties Security Configuring the FortiGate unit as an L2TP gateway Configuring L2TP263 264 To add source addressesConfiguring a Windows 2000 client for L2TP 265266 To disable IPSecTo connect to the L2TP VPN Configuring a Windows XP client for L2TP 267268 Detecting attacks Network Intrusion Detection System Nids269 Disabling monitoring interfaces Configuring checksum verificationSelecting the interfaces to monitor 270Viewing attack descriptions Viewing the signature list271 Adding user-defined signatures Disabling Nids attack signatures272 Downloading the user-defined signature list 273Enabling Nids attack prevention To enable Nids attack prevention Go to Nids PreventionPreventing attacks Enabling Nids attack prevention signaturesSetting signature threshold values 275Reducing the number of Nids attack log and email messages Logging attacksLogging attack messages to the attack log Automatic message reductionManual message reduction 277278 Antivirus protection General configuration steps279 280 Antivirus scanningTo scan FortiGate firewall traffic for viruses File blocking 281282 Blocking files in firewall trafficAdding file patterns to block To block files in firewall trafficQuarantining blocked files QuarantineQuarantining infected files 283284 Viewing the quarantine listSorting the quarantine list To view the quarantine list Go to Anti-Virus QuarantineDeleting files from the quarantine list Configuring quarantine optionsFiltering the quarantine list Downloading quarantined filesBlocking oversized files and emails Configuring limits for oversized files and email286 Viewing the virus list To view the virus list Go to Anti-Virus Config Virus ListExempting fragmented email from blocking 287288 Web filtering 289Adding words and phrases to the Banned Word list Content blockingGo to Web Filter Content Block 290Clearing the Banned Word list 291Restoring the Banned Word list Backing up the Banned Word list292 Adding URLs to the Web URL block list Configuring FortiGate Web URL blockingURL blocking 293Clearing the Web URL block list 294295 Downloading the Web URL block listUploading a URL block list To upload a URL block listConfiguring FortiGate Web pattern blocking Configuring Cerberian URL filtering296 About the default group and policy Installing a Cerberian license keyConfiguring Cerberian web filter Adding a Cerberian userEnabling Cerberian URL filtering To configure Cerberian web filtering298 Selecting script filter options Script filteringEnabling script filtering 299300 Exempt URL listAdding URLs to the URL Exempt list Go to Web Filter URLExempt301 Downloading the URL Exempt ListUploading a URL Exempt List Go to Web Filter URL Exempt302 Email filter 303Adding words and phrases to the email banned word list Email banned word list304 Uploading the email banned word list Downloading the email banned word list305 Downloading the email block list Email block listAdding address patterns to the email block list 306307 Email exempt listUploading an email block list To upload the email block listAdding address patterns to the email exempt list To add a subject tag Go to Email Filter ConfigAdding a subject tag 308Recording logs Logging and reporting309 Recording logs on a NetIQ WebTrends server Recording logs on a remote computer310 Overwrite Recording logs on the FortiGate hard disk311 OptionLog message levels Recording logs in system memory312 Filtering log messages To filter log entries Go to Log&Report Log Setting313 Configuring traffic logging 314Enabling traffic logging for a Vlan subinterface Enabling traffic loggingEnabling traffic logging for an interface Enabling traffic logging for a firewall policy316 Configuring traffic filter settingsAdding traffic filter entries Resolve IPViewing logs Destination IP Address Destination Netmask ServiceViewing logs saved to memory 317318 Viewing and managing logs saved to the hard diskSearching logs Keyword319 To view the active or saved logs Go to Log&Report LoggingDeleting a saved log file Downloading a log file to the management computerDeleting all messages from an active log 320Adding alert email addresses Configuring alert emailTesting alert email 321Enabling alert email 322Glossary 323324 325 326 Index 327328 Index329 Dialup Pptp330 Http331 Ldap332 333 Pptp dialup connection334 335 TCP336 Vlan