Log & Report

Log Setting options

 

 

To configure log file uploading

1Select the blue arrow to expand Log file upload settings.

2Select Upload When Rolling.

3Enter the IP address of the logging server.

4Enter the port number on the logging server. The default is 21 (FTP).

5Enter the Username and Password required on the logging server.

6Enter the remote directory in which to save the log files.

7Select the types of log files to upload.

8Select Apply.

Memory settings

Level

The FortiGate unit logs all messages at and above the logging severity

 

level you select. For example, if you select Error, the unit logs Error,

 

Critical, Alert and Emergency level messages. See Table 31, “Logging

 

severity levels,” on page 342.

Syslog settings

Name/IP

The domain name or IP address of the syslog server that stores the logs.

Port

The port number for communication with the syslog server.

Level

The FortiGate unit logs all messages at and above the logging severity

 

level you select. For example, if you select Error, the unit logs Error,

 

Critical, Alert and Emergency level messages. See Table 31, “Logging

 

severity levels,” on page 342.

Facility

Facility indicates the source of a log message. By default, FortiGate

 

reports Facility as local7. You might want to change Facility to distinguish

 

log messages from different FortiGate units.

Enable CSV Format

If you enable CSV format, the FortiGate unit produces the log in Comma

 

Separated Value (CSV) format. If you do not enable CSV format the

 

FortiGate unit produces plain text files.

WebTrends settings

Name/IP

The domain name or IP address of the WebTrends server that stores the

 

logs.

Level

The FortiGate unit logs all messages at and above the logging severity

 

level you select. For example, if you select Error, the unit logs Error,

 

Critical, Alert and Emergency level messages. See Table 31, “Logging

 

severity levels,” on page 342.

Note: To record traffic log messages, you must set the logging severity level to Notification when configuring the logging location. Traffic log messages do not generally have a severity level higher than Notification.

Also, you must enable traffic logging for specific interfaces or firewall policies.

FortiGate-100A Administration Guide

01-28007-0068-20041203

343

Page 343
Image 343
Fortinet 100A manual Memory settings, Syslog settings, WebTrends settings, 343, To configure log file uploading

100A specifications

Fortinet 100A is a versatile network security device designed to provide comprehensive protection against various cyber threats while ensuring optimal network performance. As part of the FortiGate series, the 100A combines advanced security features with powerful hardware capabilities, making it suitable for small to medium-sized businesses.

One of the key features of the Fortinet 100A is its deep packet inspection technology. This capability allows the firewall to analyze both the header and payload of packets traversing the network, enabling it to detect and block malicious content effectively. The 100A can identify and mitigate a wide range of threats, including malware, intrusions, and application-layer attacks.

The FortiOS operating system powers the Fortinet 100A, offering a robust and user-friendly interface for configuration and management. With its unified security management console, administrators can efficiently monitor network traffic and enforce security policies across the organization. The system provides centralized logging and reporting features, enabling users to gain valuable insights into their security posture and respond swiftly to incidents.

The 100A supports multiple deployment modes, including transparent, NAT, and route modes. This flexibility allows organizations to integrate the device into their existing network architecture with ease. The firewall's high throughput capabilities ensure that network performance remains unaffected, even under heavy load from multiple users and devices.

Another notable aspect of the Fortinet 100A is its support for various VPN technologies, including IPsec and SSL VPN. This feature facilitates secure remote access for employees, enabling them to connect to the corporate network safely, regardless of their location. As remote work continues to be a norm in many sectors, this capability is critical for maintaining productivity and security.

In addition to these features, the Fortinet 100A provides comprehensive web filtering capabilities, protecting users from harmful websites and inappropriate content. This protection is essential for organizations looking to maintain a secure and productive environment.

With its combination of powerful security features, flexible deployment options, and robust performance, the Fortinet 100A stands out as an ideal solution for organizations seeking to bolster their cybersecurity measures while ensuring seamless connectivity for users. As cyber threats continue to evolve, investing in a capable device like the FortiGate 100A is crucial for maintaining a secure network infrastructure.