系统配置

配置 SNMP

 

 

 

7

( 可选的)输入受信任主机的的 IP 地址 网络,从而允许这个管理员用来访

 

问基于 Web 的管理程序。

 

如果您希望管理员可以从任何地方访问 FortiGate,就把受信任主机的 IP 地址设置为

 

0.0.0.0,把掩码设置为 255.255.255.255。

 

如果要限制管理员只能从指定的网络访问 FortiGate,只需要把受信任主机的地址设置

 

为该网络的地址,并把掩码设置为该网络的网络掩码。例如,如果要限制管理员只能

 

从内部网络访问 FortiGate,需把受信任主机的地址设置为您的内部网络地址 (例如,

 

192.168.1.0),把掩码设置为 255.255.255.0。

8

如果需要的话,可以更改这个管理员帐号的 权限级别

9

单击 确定

10

如果要删除某个管理员帐号,选中要删除的帐号然后单击 删除

配置 SNMP

为 FortiGate 配置的 SNMP 可以允许运行在 FortiGate 上的 SNMP 代理报告系统信息 和发送陷阱。FortiGate 中的 SNMP 代理支持 SNMP 版本 1 和 SNMP 版本 2c。RFC 支持包 括 RFC1213 和 RFC2665。FortiGateSNMP 实现是只读的。服从 SNMP v1 和 v2c 的 SNMP 管理者可以只读访问 FortiGate 系统信息和接收 FortiGate 陷阱。要监视 FortiGate 系统信息和接收 FortiGate 陷阱,您必须将 Fortinet 特征 MIB 和标准 MIB 编译进 SNMP 管理器。

本节描述了以下内容:

·为 SNMP 监视配置 FortiGate 设备 ·配置 FortiGate 的 SNMP 支持 ·FortiGate 管理信息库 (MIB) ·FortiGate 陷阱

为 SNMP 监视配置 FortiGate 设备

只有将一个或几个网络接口配置为接受 SNMP 连接之后,远程的 SNMP 管理程序才能 连接到您的 FortiGate SNMP 代理。要获得这方面的更多信息,请参阅 第 114 页 控制到接口的管理访问以及相关的网络接口配置章节。

配置 FortiGate 的 SNMP 支持

1 进入 系统 > 配置 > SNMP v1/v2c

2 单击启用 SNMP。

3 配置 SNMP 设置:

系统名

自动设置 FortiGate 主机名称。要修改系统名称,请见 第 76 页

 

修改 FortiGate 主机名

系统

描述了 FortiGate 的物理位置。系统位置描述的长度最长为 31 个字符。

 

可以包含数字 (0-9),大写和小写字母 (A-Z,a-z)以及特殊字符 -

 

和 _。空格符和 \<>[]` $ % & 等符号都不能使用。

联系信息

添加这个 FortiGate 的负责人的联系信息。联系信息的长度最长为 31 个

 

字符。可以包含数字 (0-9),大写和小写字母 (A-Z,a-z)以及特殊

 

字符 - 和 _。空格符和 \<>[]` $ % & 等符号都不能使用。

FortiGate-500 安装和配置指南

137

Page 149
Image 149
Fortinet 500 manual Snmp 监视配置 FortiGate 设备, 配置 FortiGate 的 Snmp 支持, 137, 进入 系统 配置 Snmp v1/v2c。

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.