Fortinet 620B manual Log configuration using the CLI, Viewing logs, ASM-FB4 and ADM-XB2 modules

Page 42

Using the AMC modules

AMC modules

Upload rolled files in Select to compress the log files before uploading. gzipped format

Delete files after Select to remove the log files once the FTP upoad has completed. uploading

Log configuration using the CLI

Configure the FortiGate unit to log to the ASM-S08 using the CLI within the

FortiAnalyzer command config log disk setting enable.

For details on log configuration, see the FortiGate CLI Reference.

Viewing logs

Logs and content logs stored on the ASM-S08 are available for viewing and analysis.

To view the FortiGate logs, go to Log&Report > Log Access.

To view the content logs, go to Log&Report > Content Archive. Select the log type and select Local from the list box.

Note: HA logging is not available with the AMC-S08.

ASM-FB4 and ADM-XB2 modules

AMC (Advanced Mezzanine Card) modules provide additional hardware accelerated network processing for certain eligible traffic types passing through their SFP (small form-factor pluggable) network interfaces. This additional processing resource frees FortiGate units’ main processing resources for other tasks, improving network performance.

FortiGate-ASM-FB4 and ADM-XB2 modules can improve network throughput for:

traffic with small packets, such as VoIP

latency-sensitive traffic, such as streaming multimedia

traffic with long session lifetimes, such as FTP

IPSec VPN traffic

active-active HA load-balanced traffic

P2P traffic

Eligible traffic processing is off-loaded to the module. This fast path processing leverages the additional hardware acceleration resources provided by the AMC modules.

Ineligible traffic processing is processed normally. Normal processing by the FortiGate unit’s main processing resources (CPU, RAM, and FortiASIC content processor) can include some FortiASIC hardware accelerated processing, but does not utilize the additional hardware acceleration resources provided by the modules.

Changing interfaces to operate in SGMII or SerDes mode

SFP transceivers can operate in two modes: SerDes and SGMII (Serial Gigabit Media Independent Interface). SGMII mode is required if you have SGMII transceivers. In SGMII mode the interface can operate at 10, 100, or 1000 Mbps.

 

FortiGate-620B FortiOS 3.0 MR6 Install Guide

42

01-30006-83054-20081015

Image 42
Contents Install G U I D E Trademarks Regulatory complianceContents Advanced configuration AMC modulesTesting new firmware before installing Using the web-based managerInstalling firmware from a system reboot using the CLI FortiGate FirmwarePage Introduction Register your FortiGate unitLacp configuration About the FortiGate-620BAbout this document Typographic conventions Further ReadingDocument conventions Addressipv4FortiGate Administration Guide Fortinet Knowledge CenterCustomer service and technical support Comments on Fortinet technical documentationCustomer service and technical support Installing Environmental specificationsGrounding Rack mount instructionsTo install the FortiGate unit into a rack MountingTo power off the FortiGate unit Connecting to the networkTo power on the FortiGate unit Plugging in the FortiGateConfiguring NAT vs. Transparent modeNAT mode Connecting to the web-based manager Connecting to the FortiGate unitTransparent mode To connect to the web-based managerConnecting to the CLI To connect to the CLIConfigure the interfaces Configuring NAT modeUsing the web-based manager To configure interfaces Go to System Network InterfaceConfigure a DNS server Adding a default route and gatewayTo modify the default gateway Go to Router Static Adding firewall policiesUsing the CLI To set an interface to use a static addressTo set an interface to use Dhcp addressing To configure DNS server settings To set an interface to use PPPoE addressingTo modify the default gateway To add an outgoing traffic firewall policyConfiguring Transparent mode Switching to Transparent modeTo switch to Transparent mode Go to System Status Source Address All Destination Interface To switch to Transparent mode Verify the configuration Backing up the configurationSet the Administrator password Restoring a configurationAdditional configuration Set the time and dateConfigure FortiGuard Updating antivirus and IPS signaturesAdditional configuration Advanced configuration Protection profilesFirewall policies Firewall policiesConfiguring firewall policies Antivirus optionsAntiSpam options Web filtering Logging To install the filler module Installing AMC filler unitsInstalling modules AMC modulesHard disk module Using the AMC modulesRemoving modules To insert a module into a FortiGate chassisFormatting the hard disk Log configuration using the web-based managerTo format the ASM-S08 hard disk enter the following command Execute formatlogdiskFortiAnalyzer command config log disk setting enable Log configuration using the CLIChanging interfaces to operate in Sgmii or SerDes mode Viewing logsConfigure the speed Config system interface edit AMC-SW1/1 Set speed auto EndUsing the AMC modules FortiGate Firmware Downloading firmwareUsing the web-based manager Upgrading the firmwareReverting to a previous version Backup and Restore from a USB key Using the USB Auto-InstallTo revert to a previous firmware version Using the CLI To upgrade the firmware using the CLIExecute ping Execute update-now Execute restore image namestr tftpip4Execute restore image image.out To revert to a previous firmware version using the CLIExecute restore image image28.out Installing firmware from a system reboot using the CLIExecute restore image namestr tftpipv4 Execute restore config namestr tftpip4Press any key to display configuration menu To install firmware from a system rebootExecute reboot Enter Tftp server addressEnter Local Address Restoring the previous configurationTo backup configuration using the CLI Enter File Name image.outAdditional CLI Commands for a USB key To restore configuration using the CLITo configure the USB Auto-Install using the CLI Testing new firmware before installing To test the new firmware imageTesting new firmware before installing Testing new firmware before installing Index Web filtering 37 web-based manager Page Page

620B specifications

The Fortinet 620B is a state-of-the-art security appliance designed to provide comprehensive cybersecurity solutions for medium to large enterprises. As part of Fortinet's FortiGate series, the 620B combines advanced security features with robust performance capabilities, ensuring that organizations can protect their networks against an evolving threat landscape.

One of the standout features of the Fortinet 620B is its exceptional threat protection capabilities. The device utilizes Fortinet's proprietary FortiOS operating system, which integrates multiple security functions, including firewall, intrusion prevention system (IPS), virtual private network (VPN), and antivirus. This unified approach enables organizations to enforce consistent security policies across their network without compromising performance.

The FortiGate 620B is powered by Fortinet's purpose-built security processing unit (SPU) architecture, which significantly accelerates threat detection and mitigation processes. With multi-core processing capabilities, the device can handle high volumes of traffic while maintaining low latency, making it suitable for environments with heavy data flows. This performance is critical for organizations requiring real-time inspection of encrypted traffic, as the 620B offers strong decryption capabilities without sacrificing throughput.

In addition to its security features, the Fortinet 620B includes advanced networking technologies. The device supports software-defined networking (SDN) and integrates with Fortinet’s Security Fabric, allowing for enhanced visibility and control across the entire network ecosystem. This fabric architecture enables seamless communication between multiple devices, streamlining the management of security policies and improving overall network efficiency.

Another key characteristic of the FortiGate 620B is its scalability. Organizations can easily scale their deployment to meet growing demands by utilizing additional Fortinet appliances and services. The device also provides extensive reporting and analytics features, offering insights into network usage and security incidents, empowering security teams to make informed decisions.

Overall, the Fortinet 620B is an exceptional solution for organizations looking to strengthen their network security posture. With its combination of powerful threat protection, high performance, and advanced networking capabilities, it stands out as a reliable choice for safeguarding critical business operations in today's digital landscape. Its comprehensive feature set, combined with Fortinet's commitment to innovation, makes the FortiGate 620B a formidable asset for any cybersecurity strategy.