Fortinet Understanding FortiGate Log Disk Management and Handling Disk Log Size When Log Has Rolled

Page 41

 

 

AMC modules

Using the AMC modules

Note: The FortiGate-3810A supports only one FortiGate-ASM-S08 hard disk module.

Formatting the hard disk

When you first install the ASM-S08 in the FortiGate unit, the hard disk may not be formatted. This will result in an error in the console when starting up the FortiGate unit, indicating that the hard drive could not be mounted.

If you see this message, or cannot access the hard disk using the web-based manager, you will need to format the hard disk using the CLI.

To format the ASM-S08 hard disk enter the following command:

execute formatlogdisk

You are prompted to confirm the formatting. Once the FortiGate unit completes the formatting, the system will reboot.

Log configuration using the web-based manager

Use the web-based manager to configure the FortiGate unit to log to the ASM-S08 hard disk.

For details on the various log configurations, see the FortiGate Administration Guide.

To configure logging to the disk module from the web-based manager

1Go to Log&Report > Log Config > Log Setting.

2Select Disk.

3Select the blue arrow for Disk to expand the options.

4Complete the following settings and select Apply:

Minimum log level Select a log level. The FortiGate unit logs all messages at and above the logging severity level you select. For example, if you select Error, the unit logs Error, Critical, Alert and Emergency level messages.

When log disk is full Select what the FortiGate unit should do when the log disk is full. You can either select to overright the oldest logs, or stop logging until you can remove or backup the stored logs.

Log rolling settings Configure how the FortiGate unit begins new log files. Be defining a specific size or time and date of a new file, they can be better managed and searched.

Log file should not exceed

Log file should be rolled

Set the maximum size of the log file. When the set size is reached, the FortiGate unit begins a new log file.

Select the time and date when the FortiGate unit will roll the log file even if the maximum size has not been reached. This is a useful option if you do not log a lot of traffic and want better control over log time frames. This can also be useful if you want daily log files.

Enable log uploading Select to enable the FortiGate unit to upload rolled log files to a

server or FTP site for backup purposes.

Enter the FTP server IP address and user name and password if required.

Upload

Specify the time to upload the log files. You can configure the

 

FortiGate unit to upload only when the logs are rolled or on a

 

regularly scheduled time, whether the logs have rolled or not.

FortiGate-310B FortiOS 3.0 MR6 Install Guide

 

01-30006-0472-20080815

41

Image 41
Contents Install G U I D E Regulatory compliance TrademarksContents Downloading firmware Configuring Transparent modeProtection profiles Firewall policies Using the CLI Using the web-based managerInstalling firmware from a system reboot using the CLI Testing new firmware before installingPage Register your FortiGate unit IntroductionAbout this document Lacp configurationAbout the FortiGate-310B Document conventions Further ReadingTypographic conventions Addressipv4Fortinet Knowledge Center FortiGate Administration GuideComments on Fortinet technical documentation Customer service and technical supportCustomer service and technical support Environmental specifications InstallingMounting GroundingRack mount instructions Installed mounting brackets To install the FortiGate unit into a rackTo power on the FortiGate unit Connecting to the networkTo power off the FortiGate unit Plugging in the FortiGateNAT mode ConfiguringNAT vs. Transparent mode Transparent mode Connecting to the FortiGate unitConnecting to the web-based manager To connect to the web-based managerTo connect to the CLI Connecting to the CLIBits per second 9600 Data bits Parity Stop bits Flow controlUsing the web-based manager Configuring NAT modeConfigure the interfaces To configure interfaces Go to System Network InterfaceInitial Padt Timeout Configure a DNS serverAdding a default route and gateway Adding firewall policies To modify the default gateway Go to Router StaticSource Interface Source Address AllTo set an interface to use Dhcp addressing Using the CLITo set an interface to use a static address To set an interface to use PPPoE addressing To configure DNS server settingsTo add an outgoing traffic firewall policy To modify the default gatewayTo switch to Transparent mode Go to System Status Configuring Transparent modeSwitching to Transparent mode Source Address All Destination Interface To switch to Transparent mode Backing up the configuration Verify the configurationAdditional configuration Restoring a configurationSet the Administrator password Set the time and dateUpdating antivirus and IPS signatures Configure FortiGuardAdditional configuration Protection profiles Advanced configurationDefault protection profiles Firewall policies Firewall policiesAntivirus options Configuring firewall policiesAntiSpam options Web filtering Logging Installing modules Installing AMC filler unitsTo install the filler module AMC modulesRemoving modules Using the AMC modulesHard disk module To insert a module into a FortiGate chassisTo format the ASM-S08 hard disk enter the following command Log configuration using the web-based managerFormatting the hard disk Execute formatlogdiskChanging interfaces to operate in Sgmii or SerDes mode Log configuration using the CLIViewing logs ASM-FB4 and ADM-XB2 modulesConfig system interface edit AMC-SW1/1 Set speed auto End Configure the speedUsing the AMC modules Downloading firmware FortiGate FirmwareReverting to a previous version Using the web-based managerUpgrading the firmware To revert to a previous firmware version Backup and Restore from a USB keyUsing the USB Auto-Install Execute ping Using the CLITo upgrade the firmware using the CLI Execute restore image image.out Execute restore image namestr tftpip4Execute update-now To revert to a previous firmware version using the CLIExecute restore image namestr tftpipv4 Installing firmware from a system reboot using the CLIExecute restore image image28.out Execute restore config namestr tftpip4Execute reboot To install firmware from a system rebootPress any key to display configuration menu Enter Tftp server addressTo backup configuration using the CLI Restoring the previous configurationEnter Local Address Enter File Name image.outTo configure the USB Auto-Install using the CLI Additional CLI Commands for a USB keyTo restore configuration using the CLI To test the new firmware image Testing new firmware before installingTesting new firmware before installing Testing new firmware before installing Index Web filtering 37 web-based manager Page Page

310B specifications

The Fortinet 310B is a powerful next-generation firewall (NGFW) designed to meet the evolving needs of modern enterprises. As part of Fortinet's Security Fabric, the 310B offers robust security features combined with high performance, enhancing network security while maintaining ease of use.

One of the standout features of the Fortinet 310B is its high throughput capability. With up to 10 Gbps of firewall throughput and an impressive IPS throughput of 3.5 Gbps, the device is optimized for handling heavy network traffic with minimal latency. This makes it suitable for both medium and large-scale environments, where performance and speed are critical.

The Fortinet 310B integrates a comprehensive suite of security technologies. At its core is FortiOS, the operating system that powers Fortinet’s security appliances. FortiOS includes advanced threat protection capabilities such as intrusion prevention system (IPS), deep packet inspection, and antivirus scanning. These features help protect against a wide range of threats, including malware, ransomware, and zero-day attacks, ensuring that networks are resilient against various cyber threats.

Another key characteristic of the Fortinet 310B is its multi-layered security architecture. The device supports a range of technologies such as SSL inspection, web filtering, and application control. By leveraging these functionalities, organizations can enforce granular security policies across different applications and users, improving overall visibility and control over the network environment.

The Fortinet 310B also incorporates FortiGate's unique Security Fabric technology, which enables seamless integration with other Fortinet products and third-party solutions. This interoperability allows for centralized management, simplified security operations, and enhanced threat intelligence sharing, creating a holistic security approach.

In addition to its security capabilities, the Fortinet 310B offers a variety of connectivity options, including multiple Ethernet ports and support for FortiLink, which allows for easy integration with FortiAP access points and FortiSwitches. This flexibility facilitates the deployment of secure network segments and wireless solutions.

The device also supports advanced features such as VPN capabilities for secure remote access, SD-WAN for optimizing network performance, and extensive reporting and logging for compliance and accountability. All these attributes make the Fortinet 310B a formidable choice for organizations looking to bolster their network security posture while maximizing operational efficiency. Overall, the Fortinet 310B stands out as a reliable and versatile solution in the realm of network security appliances.