Friday, June 10, 2011

บันทึกเรื่องราวดีๆเกี่ยวกับ config Fortigate เอาไว้อ่านในภายหลัง

เซ็ตอัพ Fortigate เป็น 2 WAN

To set up load sharing between two active WAN interfaces, where Internal traffic is initiated outbound, you need the following:

There must be a Static default route for both WAN interfaces with equal distance.
Note: The shorter the distance metric will be the preferred the route the FortiGate unit will use to route outbound traffic. Therefore load sharing between two active WAN interfaces must have a default route for each with equal distance. This enables outbound traffic to traverse either WAN interface based on the policy routes and access policies defined.

Set up policy routes to forward traffic through one WAN interface.
Policy routes are necessary to determine which outbound traffic (based on source/destination address, src/dst port or protocol, etc.) will be routed out of the desired WAN interface.

Set Access Policy to forward traffic initiated from the internal interface to a particular WAN interface.
Outbound access policies are needed (in conjunction with policy routes) to allow traffic to pass through the firewall and traverse the selected WAN interface.

Internal -> Wan1
Src = a.b.c.d
Dst=Any

Note: BOTH matching policy routes and correct access policies must be created in order to perform load sharing on the FortiGate unit properly.
-------------------
http://kb.fortinet.com/kb/microsites/microsite.do?cmd=displayKC&docType=kc&externalId=10376&sliceId=1&docTypeID=DT_KCARTICLE_1_1

Wednesday, June 8, 2011

เก็บ log ด้วย FortiAnalyzer 100C

Adding a FortiGate unit

A FortiGate unit must be configured to send log messages to a FortiAnalyzer unit. Thisconfiguration can occur before or after the FortiAnalyzer unit’s configuration to receive those logs.
The steps to add a device vary according to the log settings you want, and to a
FortiAnalyzer unit’s configured response to an initial log connection attempt. For details,
see “Unregistered Device Options” in the FortiAnalyzer Administration Guide.
The following procedure uses the default options and configures a FortiGate unit running
FortiOS 4.0.

To send FortiGate unit logs to a FortiAnalyzer unit

1 On the FortiGate unit, go to Log&Report > Log Config > Log Setting.
2 Select the Expand Arrow for Remote Logging to expand the options.
3 Select a security level to log.
4 Select Static IP Address and enter the IP Address of the FortiAnalyzer unit.
5 Select Apply.

Log configuration


You must also configure the FortiGate unit for the type of data you want the FortiGate tolog and send to the FortiAnalyzer unit. There are two main locations for configuring the log
types:
• configure the event logs by going to Log&Report > Log Config > Event Log.
• enable feature logs by going to Firewall > Protection Profile, and editing a profile.

Twitter Delicious Facebook Digg Stumbleupon Favorites More