Fortinet 3016B manual Formatting the hard disk, Log configuration using the web-based manager

Page 41

 

 

AMC modules

Using the AMC modules

Note: The FortiGate-3810A supports only one FortiGate-ASM-S08 hard disk module.

Formatting the hard disk

When you first install the ASM-S08 in the FortiGate unit, the hard disk may not be formatted. This will result in an error in the console when starting up the FortiGate unit, indicating that the hard drive could not be mounted.

If you see this message, or cannot access the hard disk using the web-based manager, you will need to format the hard disk using the CLI.

To format the ASM-S08 hard disk enter the following command:

execute formatlogdisk

You are prompted to confirm the formatting. Once the FortiGate unit completes the formatting, the system will reboot.

Log configuration using the web-based manager

Use the web-based manager to configure the FortiGate unit to log to the ASM-S08 hard disk.

For details on the various log configurations, see the FortiGate Administration Guide.

To configure logging to the disk module from the web-based manager

1Go to Log&Report > Log Config > Log Setting.

2Select Disk.

3Select the blue arrow for Disk to expand the options.

4Complete the following settings and select Apply:

Minimum log level Select a log level. The FortiGate unit logs all messages at and above the logging severity level you select. For example, if you select Error, the unit logs Error, Critical, Alert and Emergency level messages.

When log disk is full Select what the FortiGate unit should do when the log disk is full. You can either select to overright the oldest logs, or stop logging until you can remove or backup the stored logs.

Log rolling settings Configure how the FortiGate unit begins new log files. Be defining a specific size or time and date of a new file, they can be better managed and searched.

Log file should not exceed

Log file should be rolled

Set the maximum size of the log file. When the set size is reached, the FortiGate unit begins a new log file.

Select the time and date when the FortiGate unit will roll the log file even if the maximum size has not been reached. This is a useful option if you do not log a lot of traffic and want better control over log time frames. This can also be useful if you want daily log files.

Enable log uploading Select to enable the FortiGate unit to upload rolled log files to a

server or FTP site for backup purposes.

Enter the FTP server IP address and user name and password if required.

Upload

Specify the time to upload the log files. You can configure the

 

FortiGate unit to upload only when the logs are rolled or on a

 

regularly scheduled time, whether the logs have rolled or not.

FortiGate-3016B FortiOS 3.0 MR6 Install Guide

 

01-30006-0458-20080318

41

Image 41
Contents Install G U I D E Regulatory compliance TrademarksContents AMC modules Advanced configurationInstalling firmware from a system reboot using the CLI Using the web-based managerTesting new firmware before installing FortiGate FirmwarePage Register your FortiGate unit IntroductionDocument conventions About the FortiGate-3016BAbout this document Typographic conventions Further ReadingComments on Fortinet technical documentation Customer service and technical supportFortinet Knowledge Center Environmental specifications InstallingMounting GroundingRack mount instructions Installed mounting brackets To install the FortiGate unit into a rackPlugging in the FortiGate To power on the FortiGate unitTurning off the FortiGate unit Connecting to the networkTo power off the FortiGate unit Turning off the FortiGate unit NAT mode ConfiguringNAT vs. Transparent mode Transparent mode Connecting to the FortiGate unitConnecting to the web-based manager To connect to the web-based managerTo connect to the CLI Connecting to the CLIUsing the web-based manager Configuring NAT modeConfigure the interfaces To configure interfaces Go to System Network InterfaceAdding a default route and gateway Configure a DNS serverAdding firewall policies To modify the default gateway Go to Router StaticTo set an interface to use Dhcp addressing Using the CLITo set an interface to use a static address To set an interface to use PPPoE addressing To configure DNS server settingsTo add an outgoing traffic firewall policy Configuring Transparent modeTo modify the default gateway To switch to Transparent mode Go to System Status Switching to Transparent modeTo switch to Transparent mode To configure DNS server settings Backing up the configuration Verify the configurationAdditional configuration Restoring a configurationSet the Administrator password Set the time and dateUpdating antivirus and IPS signatures Configure FortiGuardAdditional configuration Protection profiles Advanced configurationFirewall policies Firewall policiesAntivirus options Configuring firewall policiesAntiSpam options Web filtering Logging Installing modules Installing AMC filler unitsTo install the filler module AMC modulesRemoving modules Using the AMC modulesHard disk module To insert a module into a FortiGate chassisFormatting the hard disk Log configuration using the web-based managerTo format the ASM-S08 hard disk enter the following command Changing interfaces to operate in Sgmii or SerDes mode Log configuration using the CLIViewing logs ASM-FB4 and ADM-XB2 modulesAMC modules Config system interface edit AMC-SW1/1 Set speed auto End Configure the speedFortiGate Firmware Using the web-based managerDownloading firmware Upgrading the firmwareTo revert to a previous firmware version To upgrade the firmwareReverting to a previous version Using the USB Auto-Install Backup and Restore from a USB keyTo upgrade the firmware using the CLI Using the CLIExecute restore image namestr tftpipv4 To revert to a previous firmware version using the CLITo install firmware from a system reboot Installing firmware from a system reboot using the CLIEnter Tftp server address To restore configuration using the CLI Restoring the previous configurationTo backup configuration using the CLI To configure the USB Auto-Install using the CLI Testing new firmware before installingAdditional CLI Commands for a USB key To test the new firmware image FortiGate Firmware Testing new firmware before installing Index Web filtering 37 web-based manager Page Page
Related manuals
Manual 2 pages 28.98 Kb

3016B specifications

The Fortinet 3016B is a robust firewall solution designed to meet the dynamic security needs of modern enterprises. As part of the FortiGate product line, the 3016B combines advanced security features with high performance, catering to organizations that require reliability and efficiency in managing their network security.

One of the primary features of the Fortinet 3016B is its high throughput capabilities. It supports up to 40 Gbps of firewall throughput and an impressive 7.5 Gbps of intrusion prevention system (IPS) throughput. This ensures that even at peak network loads, the firewall can maintain strong performance without compromising security. This feature is particularly important for businesses that handle large volumes of data and require seamless connectivity for their operational efficiency.

The 3016B leverages Fortinet's proprietary FortiOS operating system, which is known for its user-friendly interface and comprehensive security functionalities. FortiOS includes a variety of tools such as a next-generation firewall (NGFW), antivirus protection, web filtering, and application control, all incorporated into a single platform. This consolidation helps in simplifying management while providing extensive security coverage against a wide array of cyber threats.

Moreover, the Fortinet 3016B incorporates advanced threat intelligence capabilities powered by FortiGuard Labs. This allows the firewall to stay updated with real-time threat feeds, enabling the organization to respond proactively to emerging threats and vulnerabilities. The integration of AI-driven analytics enhances anomaly detection and helps in identifying potential breaches before they can escalate.

Another notable characteristic of the 3016B is its scalability. Designed for medium to large enterprises, it can easily integrate into existing infrastructure and scale as business needs grow. With support for multiple virtual domains (VDOMs), organizations can create isolated environments for different departments or functions, maintaining policy separations while optimizing resource utilization.

In terms of connectivity, the Fortinet 3016B offers various interfaces, including multiple 1G and 10G Ethernet ports, ensuring flexible deployment options. The device also supports high availability (HA) configurations, which provide redundancy and minimize downtime.

Overall, the Fortinet 3016B is an exceptional solution that combines superior security features with high performance and scalability, making it a prime choice for organizations looking to strengthen their network security posture without sacrificing efficiency. With its comprehensive capabilities, it empowers businesses to tackle today’s cybersecurity challenges effectively.