注册 FortiGate 设备

病毒和攻击定义升级及注册

 

 

理服务更新

如果您的 FortiGate 设备必须通过一个代理服务器才能连接到互联网,您可以使用 set system autoupdate tunneling 命令使得FortiGate 设备 可以使用这个代理 服务器连接到 (或者通过通道)FDN。您可以使用这个命令来指定代理服务器的 IP 地 址和端口号。如果代理服务器要求认证的话,您最好为自动更新配置添加代理服务器 所须的用户名和密码。启用通过代理服务器的更新的完整的语法是:

set system autouopdate tunneling enable [address < 代理服务器 _IP> [port <代理服务器端口> [username <用户名_字符串> [password <密码_字符

>]]]]

例如,如果代理服务器的 IP 地址是 64.23.6.89,端口是 8080,您需要输入如下命 令:

set system autouopdate tunneling enable address 64.23.6.89 port 8080

关于 set system autoupdate 命令的详细信息,请见第六卷,FortiGate CLI

参考指南

FortiGate 设备使用 HTTP CONNECT 方法连接到代理服务器,这一方法在 RFC2616 中有详细描述。FortiGate 设备将一个 HTTP CONNECT 连接请求发送到代理服务器 (可 选是否附加认证信息),指定请求连接到 FDN 的 IP 地址和端口。代理服务器建立到 FDN 的连接并在 FortiGate 设备和 FDN 之间传输信息。

CONNECT 方法通常被用于 SSL 通讯通道。有些代理服务器不允许 CONNECT 连接到任 意端口;他们将允许连接的端口范围限制在使用 HTTPS 连接众所周知的端口和类似的 服务。因为 FortiGate 自动更新使用 HTTPS 协议和 8890 端口来连接 FDN,所以您所使 用的代理服务器必须被配置为允许连接到这一端口。

如果您已经配置了一个连接到 FDN 的代理服务地址,就无须指定通道。

如果 FortiGate 设备必须通过一个代理服务器连接到互联网,则无法支持推送更 新。

注册 FortiGate 设备

您购买和安装了一个新的 FortiGate 设备之后,可以使用基于 Web 的管理程序进入 系统 > 更新 > 支持注册您的设备,或者使用一个网页浏览器连接到 http://support.fortinet.com 并选择产品注册。

注册内容包括输入您的联系方式和您或者您所在的机构购买的 FortiGate 设备的产 品序列号。注册过程方便快捷。您可以一次注册多个 FortiGate 设备,无须重复输入 您的联系方式。

完成注册之后,Fortinet 会将技术支持用户名和密码发送到您的电子邮箱。您可 以使用这个用户名和密码登录到 Fortinet 技术支持网站以获得如下服务:

·查看您注册的 FortiGate 设备列表

·注册更多的 FortiGate 设备

·添加或修改每个 FortiGate 设备的支持合同号 ·查看和修改注册信息 ·下载病毒和攻击定义更新

104

美国飞塔有限公司

Page 116
Image 116
Fortinet 500 manual 注册 FortiGate 设备, 通过代理服务器定期更新, 104, 例如,如果代理服务器的 IP 地址是 64.23.6.89,端口是 8080,您需要输入如下命 令:

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.