FortiAnalyzer Admin Guide
FortiAnalyzer Admin Guide
www.fortinet.com
FortiAnalyzer Administration Guide Version 3.0 MR3 25 September 2006 05-30003-0082-20060925 Copyright 2006 Fortinet, Inc. All rights reserved. No part of this publication including text, examples, diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of Fortinet, Inc. Trademarks ABACAS, APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient, FortiGate, FortiGuard, FortiGuard-Antispam, FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager, Fortinet, FortiOS, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Regulatory compliance FCC Class A Part 15 CSA/CUS
Caution: If you install a battery that is not the correct type, it could explode. Dispose of used batteries according to local regulations.
Contents
Contents
Introduction ...................................................................................... 11
The FortiAnalyzer Unit .................................................................................... 11 FortiAnalyzer-100A/100B ............................................................................ FortiAnalyzer-400 ........................................................................................ FortiAnalyzer-800 ........................................................................................ FortiAnalyzer-2000 ...................................................................................... FortiAnalyzer-4000 ...................................................................................... FortiAnalyzer-4000A ................................................................................... Reporting..................................................................................................... Data mining ................................................................................................. Network analyzer ........................................................................................ Log viewer................................................................................................... Real-time log viewing .................................................................................. Log Aggregation.......................................................................................... Quarantine .................................................................................................. Network Attached Storage .......................................................................... 11 12 12 13 13 13 14 14 14 15 15 15 15 15
FortiAnalyzer features..................................................................................... 14
About this guide .............................................................................................. 15 FortiAnalyzer documentation ......................................................................... 16 Fortinet Tools and Documentation CD ........................................................ 17 Fortinet Knowledge Center ......................................................................... 17 Comments on Fortinet technical documentation ......................................... 17 Customer service and technical support ...................................................... 17
Configuring the FortiAnalyzer unit ................................................................ 21 Using the web-based manager ................................................................... 23 Using the command line interface ............................................................... 24 Using the front panel buttons and LCD ....................................................... 25 Upgrading the FortiAnalyzer firmware .......................................................... 25 Backing up the FortiAnalyzer hard disk ........................................................ 26 Shutting down the FortiAnalyzer unit............................................................ 26
Contents
Network settings.............................................................................................. 36
Administrative domains.................................................................................. 43
Contents
Network sharing............................................................................................... 45 Adding users ............................................................................................... Adding groups ............................................................................................. Configuring Windows shares ...................................................................... Assigning user access ................................................................................ Configuring NFS shares .............................................................................. Setting folder and file privileges .................................................................. Log Settings ................................................................................................ Log Aggregation.......................................................................................... Configuring an aggregation client ......................................................... Configuring an aggregation server ....................................................... IP Aliases .................................................................................................... Importing an IP alias list file .................................................................. IP alias ranges ...................................................................................... RAID............................................................................................................ Configuring RAID on the FortiAnalyzer-400 and FortiAnalyzer-800 ..... Configuring RAID on the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A ................................................................................... 46 46 46 47 48 49 50 51 52 53 53 53 54 54 54 55
Maintenance ..................................................................................................... 57 Backup & Restore ....................................................................................... 57 Update center.............................................................................................. 58 RAID levels ....................................................................................................... 59 Linear .......................................................................................................... RAID 0......................................................................................................... RAID 1......................................................................................................... RAID 5......................................................................................................... RAID 10....................................................................................................... RAID 50....................................................................................................... RAID 5 and RAID 10 with hot spare............................................................ Hot swapping hard disks ............................................................................. Hot swapping in the FortiAnalyzer-400 and FortiAnalyzer-800 ............ Hot swapping the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A. 60 60 60 60 61 61 61 61 61 62
Devices.............................................................................................. 65
Devices List...................................................................................................... 65 Device interaction with a FortiAnalyzer unit ................................................ Maximum allowed devices .......................................................................... Unregistered device options........................................................................ FortiGate units connecting with FortiDiscovery ........................................... Unknown devices connecting to the FortiAnalyzer unit............................... 66 66 67 67 68
Adding a FortiGate unit................................................................................... 68 Defining FortiGate port interfaces ............................................................... 70 Adding an HA cluster .................................................................................. 70 Adding FortiClient installations ..................................................................... 71
FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925
Contents
Adding a FortiManager unit............................................................................ 72 Adding a Syslog server................................................................................... 73 Device Groups ................................................................................................. 74 Blocked Devices .............................................................................................. 74 Viewing blocked devices............................................................................. 75
Logs .................................................................................................. 77
Log Viewer ....................................................................................................... 77 Real-time log viewer ................................................................................... 77 Historical log viewer .................................................................................... 78 Browse.............................................................................................................. 80 Browsing log files ........................................................................................ 81 Importing a log file....................................................................................... 82 Downloading a log file ................................................................................. 82 Customizing the log view ............................................................................... 83 Customizing the log column views .............................................................. 83 Filtering logs................................................................................................ 84 Filtering tip ............................................................................................ 84 Search the logs................................................................................................ 84 Basic search ............................................................................................... Advanced search ........................................................................................ Search tips .................................................................................................. Printing the search results .......................................................................... 85 85 86 86
Content archive................................................................................ 89
Content viewer................................................................................................. 89 Customizing the content log view ................................................................. 90 Customizing the log column views .............................................................. 90 Filtering content logs................................................................................... 91 Filtering tip ............................................................................................ 91 Log rolling ........................................................................................................ 91
Quarantine ........................................................................................ 95
Configuring quarantine settings .................................................................... 95 Viewing the quarantined files list................................................................... 96
Contents
Searching user data ...................................................................................... 100 Saving search results ................................................................................ 100 Local archive ............................................................................................ 101 Forensic Reports ........................................................................................... 101 Configuring reports.................................................................................... Customizing the report properties....................................................... Configuring the report criteria ............................................................. Configuring the time period................................................................. Configuring the report types ............................................................... Configuring the report output .............................................................. Viewing Forensic Reports ......................................................................... 101 102 102 104 104 104 106
Reports............................................................................................ 119
Configuring reports ....................................................................................... 119 Configuring a report profile........................................................................ Customizing the report properties....................................................... Configuring the report devices............................................................ Configuring the report scope .............................................................. Configuring the report types ............................................................... Configuring the report Format............................................................. Configuring the report schedule.......................................................... Configuring the report output .............................................................. 120 121 122 122 124 124 125 125
Contents
Browsing reports........................................................................................... 127 Viewing reports ......................................................................................... Default reports .......................................................................................... Report types.............................................................................................. Roll up report ...................................................................................... Individual reports ................................................................................ Event activity codes............................................................................ 128 128 129 129 129 129
Alerts............................................................................................... 131
Alert Events.................................................................................................... 131 Adding an alert event ................................................................................ 131 Output............................................................................................................. 132 Mail server ................................................................................................ Testing the Mail server configuration.................................................. SNMP access ........................................................................................... Adding an SNMP server ..................................................................... Syslog Servers.......................................................................................... Adding a Syslog server....................................................................... FortiAnalyzer SNMP support .............................................................. FortiAnalyzer traps.................................................................................... FortiGate MIB System Traps .............................................................. FortiGate MIB Logging Traps ............................................................. FortiGate MIB VPN Traps................................................................... Fortinet MIB System fields.................................................................. Fortinet Administrator Accounts ......................................................... Fortinet Options .................................................................................. Fortinet Active IP Sessions................................................................. RFC-1213 (MIB II) .............................................................................. RFC-2665 (Ethernet-like MIB) ............................................................ 133 133 133 134 134 135 135 136 136 136 136 136 136 136 137 137 137
Contents
Search the network traffic logs .................................................................... 146 Basic search.............................................................................................. Advanced search ...................................................................................... Search tips ................................................................................................ Printing the search results......................................................................... 146 146 147 147
Index................................................................................................ 157
Contents
10
Introduction
Introduction
FortiAnalyzer units are network appliances that provides robust reporting, data analysis and integrated log collection tools. Detailed log reports provide historical as well as current analysis of network traffic, such as email, FTP and web browsing activity, to help identify security issues and reduce network misuse and abuse. The FortiAnalyzer unit provides a robust selection of reporting tools from detailed reports that can be scheduled or generated on demand, to basic traffic sniffing and real-time network monitoring. This section introduces you to the FortiAnalyzer appliance and includes the following topics: The FortiAnalyzer Unit About this guide FortiAnalyzer documentation Customer service and technical support
FortiAnalyzer-100A/100B
1 POWER STATUS
Ports Memory Disk Drives Disk Drive Capacity FortiGate Devices Supported
4 10/100 Ethernet ports 256 MB 1 120 GB 10 FortiGate devices or VDOM licenses. Supports FortiGate-50A to FortiGate-100A only. None 100-240V 0.8Amp Max
11
Introduction
FortiAnalyzer-400
Ports Memory Disk Drives Disk Drive Capacity FortiGate Devices Supported
3 10/100 Ethernet ports 256 MB 4 x 120MB hot-swappable (3.0 MR1) 480 GB 200 FortiGate units or VDOM licenses. Supports FortiGate-50A to FortiGate-800 only. 100-240V 4Amp Max
FortiAnalyzer-800
Ports Memory Disk Drives Disk Drive Capacity FortiGate Devices Supported
2 10/100 Ethernet ports 512 MB 4 x 120MB hot-swappable (3.0 MR1) 480 GB 250 FortiGate units or VDOM licenses. Supports FortiGate-50A to FortiGate-800 only. 100-240V 04Amp Max
12
Introduction
FortiAnalyzer-2000
Ports Memory Disk Drives Disk Drive Capacity FortiGate Devices Supported FortiClient installations Supported AC Input Voltage
4 gigabit Ethernet ports 2 GB 6 x 400GB hot-swappable 2.4 TB 500 FortiGate units or VDOM licenses. Supports all FortiGate models. 5000 100-240V 9Amp Max
FortiAnalyzer-4000
FortiAnalyzer-4000A
1 2
Ports Memory Disk Drives Disk Drive Capacity FortiGate Devices Supported FortiClient installations Supported AC Input Voltage Ports Memory Disk Drives Disk Drive Capacity FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925
2 gigabit ethernet ports 1 GB 12 x 250GB - hot-swappable 3 TB 500 FortiGate units or VDOM licenses. Supports all FortiGate models. 5000 100-240V 9Amp Max 2 gigabit ethernet ports 1 GB 12 x 250GB - hot-swappable 3 TB
13
FortiAnalyzer features
Introduction
500 FortiGate units or VDOM licenses. Supports all FortiGate models. 5000 100-240V 9Amp Max
FortiAnalyzer features
The FortiAnalyzer unit receives log files from multiple FortiGate and syslog devices. Using the FortiAnalyzer units robust reporting capabilities, you can monitor the traffic, attacks, and misuses from network users. The FortiAnalyzer unit includes the following features:
Reporting
The FortiAnalyzer reporting includes: Log analysis and reporting Analyze logs submitted from multiple devices and generate a variety of reports that enables you to proactively secure networks as threats arise, avoid network abuses, manage bandwidth requirements, monitor Web site visits, and ensure appropriate usage of the network. Analysis includes by firewall and by user or group of users. Vulnerability reports Vulnerability reports show potential weaknesses to attacks that may exist for a selected device. The FortiAnalyzer unit queries for open ports, and where possible, gathers information about the running services. Known vulnerabilities that exist for a service or version of the service is included in the report.
Note: Vulnerability reports are not available on the FortiAnalyzer-100.
Data mining
The FortiAnalyzer unit provides data mining features that enables you to easily access simple reports to obtain information on the intrusion attempts on your network as well as the types of traffic occurring on your network. Security event summaries provide a snapshot of what unwanted traffic is attempting to breach the firewall and the top traffic producers on the network, while traffic summaries provide a snapshot of the traffic passing through the firewall on your network. These reports can help you identify the high volume users, or attack events that may be slowing down overall network traffic.
Network analyzer
The FortiAnalyzer network analyzer enables you to reach areas of the network where FortiGate firewalls are not employed, or if you do not have a FortiGate unit as a firewall. The FortiAnalyzer network analyzer functions as a sniffer to capture traffic data, save it to the FortiAnalyzer hard disk, and display it or generate reports using the data.
Note: The network analyzer is not available on the FortiAnalyzer-100.
14
Introduction
Log viewer
The log browser, enables you to view the log messages sent to the FortiAnalyzer unit from registered devices. With the log viewer you can view any log file and messages saved on the FortiAnalyzer hard disk. All log files and messages are searchable and can be filtered to drill down and locate specific information.
Log Aggregation
Log aggregation is a method of collating log data from remote FortiAnalyzer units or other third party network devices that support the syslog format to a central FortiAnalyzer unit. For example, a company may have a headquarters and a number of branch offices. Each branch office has a FortiGate unit and a FortiAnalyzer-100A/100B to collect local log information. The headquarters has a FortiAnalyzer-2000 as the central log aggregator.
Quarantine
For FortiGate units that do not have a hard disk, the FortiAnalyzer unit offers the ability to quarantine infected or suspicious files entering your network environment. Use the quarantine browser on the FortiAnalyzer unit to view the files to determine whether they are dangerous or not. Set the option on the FortiGate unit to send the quarantined files to the FortiAnalyzer unit.
15
FortiAnalyzer documentation
Introduction
Devices describes how to add and configure FortiGate, FortiManager units and Syslog servers so that the FortiAnalyzer unit can maintain a connection with the device. Alerts describes how to set up alert messages and configure the FortiAnalyzer unit to send messages via email through a mail server, to a syslog server or using SNMP traps. This chapter also lists the SNMP traps supported by the FortiAnalyzer unit. Traffic summary and security events describes how to configure and view reports on intrusion attempts against your network as well as viewing the types of traffic occurring on your network. Content archive describes how to monitor metadata content for all users using email, FTP, Instant Messages and web browsing. Logs describes how to select and view device and FortiAnalyzer log files. It also describes customizing the log views using filters and columns settings to find information in the logs easier, as well as watch logs in real time. Quarantine describes how to configure the FortiAnalyzer unit to receive quarantined files from a FortiGate unit and view them on the FortiAnalyzer hard disk. Vulnerability scan describes how to set up vulnerability scans and view the generated reports. Reports describes how to create report profiles for running regular reports on the log information collected by the FortiAnalyzer unit. It also describes how to view the generated reports. Network Analyzer describes how to connect the FortiAnalyzer unit to a SPAN or mirror port on a network switch to analyze, or sniff, the network traffic passing through it. Forensic Analysis describes how to view and report on an individuals network habits and activities and generate reports for analysis.
FortiAnalyzer documentation
FortiAnalyzer Administration Guide Describes how to install and configure a FortiAnalyzer unit to collect FortiGate, and Syslog log files, and connect to a FortiManager device for management purposes. It also describes how to view log files, generate and view reports on various network activities, and use the FortiAnalyzer unit as a NAS server. FortiAnalyzer CLI Reference Describes how to use the command line interface of the FortiAnalyzer unit, and describes all the commands available. FortiAnalyzer online help Provides a searchable version of the Administration Guide in HTML format. You can access online help from the web-based manager as you work. FortiAnalyzer QuickStart Guides Explains how to install and set up the FortiAnalyzer unit.
16
Introduction
17
Introduction
18
Internet
19
Environmental specifications
Operating temperature: 41 to 95F (5 to 35C) If you install the FortiAnalyzer unit in a closed or multi-unit rack assembly, the operating ambient temperature of the rack environment may be greater than room ambient temperature. Therefore, make sure to install the equipment in an environment compatible with the manufacturer's maximum rated ambient temperature. Storage temperature: -4 to 176F (-20 to 80C) Humidity: 10 to 90% non-condensing
Note: The FortiAnalyzer unit may overload your supply circuit and impact your surge protection and supply wiring. Use appropriate equipment nameplate ratings to address this concern. Make sure that the FortiAnalyzer unit has reliable grounding. Fortinet recommends direct connections to the branch circuit.
Air flow
For rack installation, make sure that the amount of air flow required for safe operation of the equipment is not compromised. For free-standing installation, make sure that the appliance has at least 1.5 in. (3.75 cm) of clearance on each side to allow for adequate air flow and cooling.
Mechanical loading
You can mount the FortiAnalyzer-800, FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A units in a standard 19-inch rack. The FortiAnalyzer-800 requires 1U of vertical space and the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A requires 2U of vertical space in the rack. For rack installation, ensure an even mechanical loading of the FortiAnalyzer-800, FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A to avoid a hazardous condition.
20
Table 2: FortiAnalyzer-400 factory defaults Administrator account Port 1 User name: Password: IP: Netmask: Management Access: IP: Port 2 Netmask: Management Access: IP: Port 3 Netmask: Management Access: admin (none) 192.168.1.99 255.255.255.0 HTTP, HTTPS, PING, SSH 192.168.2.99 255.255.255.0 HTTP, HTTPS, PING, SSH 192.168.3.99 255.255.255.0 HTTP, HTTPS, PING, SSH
21
Table 3: FortiAnalyzer-800 factory defaults Administrator account Port 1 User name: Password: IP: Netmask: Management Access: IP: Port 2 Netmask: Management Access: admin (none) 192.168.1.99 255.255.255.0 HTTP, HTTPS, PING, SSH 192.168.2.99 255.255.255.0 HTTP, HTTPS, PING, SSH
Table 4: FortiAnalyzer-2000 factory defaults Administrator account Port 1 User name: Password: IP: Netmask: Management Access: IP: Port 2 Netmask: Management Access: IP: Port 3 Netmask: Management Access: IP: Port 4 Netmask: Management Access: admin (none) 192.168.1.99 255.255.255.0 HTTP, HTTPS, PING, SSH 192.168.2.99 255.255.255.0 HTTP, HTTPS, PING, SSH 192.168.3.99 255.255.255.0 HTTP, HTTPS, PING, SSH 192.168.4.99 255.255.255.0 HTTP, HTTPS, PING, SSH
Table 5: FortiAnalyzer-4000/4000A factory defaults Administrator account Port 1 User name: Password: IP: Netmask: Management Access: IP: Port 2 Netmask: Management Access: admin (none) 192.168.1.99 255.255.255.0 HTTP, HTTPS, PING, SSH 192.168.2.99 255.255.255.0 HTTP, HTTPS, PING, SSH
22
You can configure and manage the FortiAnalyzer unit using a secure HTTPS connection from any computer running Internet Explorer 6.0 or other current browser. Configuration changes made using the web-based manager are effective immediately without resetting the firewall or interrupting service.For all FortiAnalyzer models, use the following procedure to connect to the web-based manager for the first time. To connect to the web-based manager, you need: An Ethernet connection between the FortiAnalyzer unit and management computer. Internet Explorer version 6.0 or higher or other current popular web browser on the management computer.
To connect to the web-based manager 1 2 3 4 5 6 Connect the Port1 interface of the FortiAnalyzer unit to the Ethernet port of the management computer. Use a cross-over Ethernet cable to connect the devices directly. Use straight-through Ethernet cables to connect the devices through a hub or switch. Configure the management computer to be on the same subnet as the FortiAnalyzer LAN interface. To do this, change the IP address of the management computer to 192.168.1.2 and the netmask to 255.255.255.0. To access the FortiAnalyzer web-based manager, start your browser and browse to https://192.168.1.99 (remember to include the s in https://). Type admin in the Name field and select Login. After connecting to the Web-based manager, you can configure the FortiAnalyzer unit IP address, DNS server IP address, and default gateway to connect the FortiAnalyzer unit to the network. To configure the FortiAnalyzer unit using the web-based manager 1 2 3 4 In the web-based manager, go to System > Network > Interface. Select Edit for Port1. Enter the IP address and netmask and select OK. If the FortiAnalyzer unit will be connected to the internet: Go to System > Network > DNS.
23
5 6 7 8 9
Enter the, primary DNS server IP address, secondary DNS server IP address (optional). Select Apply. Got to System > Network > Routing. Select Create New and add the default gateway IP address and any other routes as required. Select OK.
At the login: prompt, type admin and press Enter twice. (The login prompt is preceded by the server IP address.) After connecting to the CLI, you can configure the unit IP address, DNS server IP address, and default gateway to connect the FortiAnalyzer unit to the network. To configure the FortiAnalyzer unit using the CLI
Set the IP address and netmask of the LAN interface: config system interface edit port1 set ip <ip_address><netmask> end
24
Set the primary and optionally the secondary DNS server IP address: config system dns set primary <dns-server_ip> set secondary <dns-server_ip> end
Set the default gateway: config system route edit 1 set device port1 set dst <destination_ip><netmask> set gateway <gateway_ip> end
On the FortiAnalyzer-2000, use the up and down arrow buttons to cycle through the options and enter the IP address information, and select Enter to select a menu option or number in the IP address.
25
To backup the log information on the FortiAnalyzer hard disk, use the CLI to enter the following command: execute backup logs <ftp_ip_address> <ftp_username> <ftp_password> <ftp_dir> Once the firmware upgrade or the RAID configuration is complete, you can restore the log information to the FortiAnalyzer hard disk.
Note: Before using the restore CLI command, ensure you add the devices for the logs first. The command will not function without the devices to associate with the logs. For details on adding devices, see the chapter Devices on page 65.
26
Dashboard
Dashboard
The system dashboard provides a view of the current operating status of the FortiAnalyzer unit. All FortiAnalyzer administrators with read access to system configuration can view system status information.
Figure 2: FortiAnalyzer-400 dashboard
Connect to the web-based manager to view the current system status of the FortiAnalyzer unit, and modify the system information. The status information that appears includes the system information, alert messages, system resources, license information and session statistics.
27
Dashboard
System Information
The System Information area of the Dashboard displays the current state of the FortiAnalyzer unit. The System Status area includes the following information:
Serial Number The serial number of the FortiAnalyzer unit. The serial number is unique to the FortiAnalyzer unit and does not change with firmware updates. Use this number when registering your FortiAnalyzer unit with Fortinet. The time in days, hours and minutes since the FortiAnalyzer was started or last rebooted. The current time according to the FortiAnalyzer internal clock. Select Change to change the time or configure the FortiAnalyzer unit to obtain the time from an NTP server. For details see Setting the time on page 32. The name of the FortiAnalyzer unit. For details on changing the name see Changing the host name on page 36. The version of the firmware installed on the FortiAnalyzer unit. Select Update to upload a new version of the firmware. For details on updating the firmware see Changing the firmware on page 35.
System Resources
The system resources displays how the FortiAnalyzer units resources are being used. You can monitor the CPU, memory and hard disk use and quickly see at what capacity the FortiAnalyzer unit is running. System resources includes the following information:
CPU Usage The current CPU status. The web-based manager displays CPU usage for core processes only. CPU usage for management processes (for example, for HTTPS connections to the web-based manager) is excluded. The current memory status. The web-based manager displays memory usage for core processes only. Memory usage for management processes (for example, for HTTPS connections to the web-based manager) is excluded. For the FortiAnalyzer-100 and FortiAnalyzer-100A/100B, the current status of the hard disk. The web-based manager displays the amount of hard disk space used. For the FortiAnalyzer-400, FortiAnalyzer-800, FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A, the current RAID status of the hard disks. Each circle indicates the status of a hard disk. Green indicates the hard disk is functioning normally. If the disk is flashing red and yellow, there is a problem with the hard disk. The hard disks on the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A are hot swappable. For details see Hot swapping the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A on page 62. Select History to view a graphical representation of the last minute of CPU, memory, sessions, and network usage. For more information see Viewing operational history on page 30.
Memory Usage
History icon
28
Dashboard
License Information
Support Contract RVS Engine The support contract number and expiry date. The version of the RVS engine. Select Update to upload a new version of the engine. This feature is not available on the FortiAnalyzer-100. The version of the RVS plug-in. This feature is not available on the FortiAnalyzer-100. A listing of the number of devices connected to the FortiAnalyzer unit. Registered is the number of devices added to the FortiAnalyzer unit. Unregistered is the number of devices attempting to connect to the FortiAnalyzer unit that need configuring. To configure the FortiAnalyzer unit to accept logs from a device see Devices List on page 65.
Statistics
Since Connections The date and time when the statistics were last reset. The number of communication sessions occurring on the FortiAnalyzer unit. Select Details for more information on the connections. For details on the session information, see Viewing Session information on page 30. A display of the log file activity and volume delivered to the FortiAnalyzer unit.
Report Engine
The Report Engine display shows the FortiAnalyzer report generation activity. The report engine activity information includes whether the report engine is active or inactive, what reports are running when active and the percentage completed. Select the Generate report button to create a new report profile.
System Operation
Perform the following operations from the Status page. These options are not available if your access privileges include write permissions.
Reboot ShutDown Restart the FortiAnalyzer unit. Shut down the FortiAnalyzer unit. You can only restart the FortiAnalyzer unit by turning the power off and then on again.
29
Dashboard
Format the FortiAnalyzer hard disk. Selecting this option will delete all log files and reports from the hard disk. Ensure that you back up all information before selecting this option. Formatting the hard disk will also interrupt FortiAnalyzer operations for several minutes. Restart the FortiAnalyzer unit with its original configuration when it was initially powered on. This will delete all configuration changes you have made, but does not changes the firmware version. This also includes resetting the IP address and netmask. You will need to reconnect to the FortiAnalyzer device using the default IP address of 192.168.1.99.
Resolve Service Refresh Time Stop Refresh View per page Page n of n Search
30
Dashboard
The destination port of the connection. The time in seconds remaining before the connection terminates.
Page
Select the page of alerts to view. Use the arrows to move forward and back through the pages or enter a page number and press Enter. Select an alert level to view. The level you select and those alert messages higher than selected will appear in the alert list. Select the number of previous days of alert messages to display. Selecting a number of days lower than what you are currently viewing deletes the older alerts. For example, if you are viewing alerts for seven days, and change the alerts to two days, the FortiAnalyzer unit deletes the other five days of alert messages. Select to view the alert messages in a formatted or raw format. The device where the alert message is originating. Details of the event causing the alert message. The level of the alert message. The date and time of the alert message.
Include...and higher in alerts Keep unacknowledged alerts for Formatted | Raw Device Event Severity Time
31
Dashboard
The number of occurrences of the alert event. Select the check box for alert messages you want to delete and select the delete icon.
Clicking the column headers sorts the information in ascending or descending order for that column.
System Time Refresh Time Zone Set Time Synchronize with NTP Server Server Sync Interval
The current FortiAnalyzer system date and time. Update the display of the current FortiAnalyzer system date and time. Select the current FortiAnalyzer system time zone. Select to set the FortiAnalyzer system date and time to the values you set in the Year, Month, Day, Hour, Minute and Second fields. Select to use an NTP server to automatically set the system date and time. You must specify the server and synchronization interval. Enter the IP address or domain name of an NTP server. To find an NTP server that you can use, see http://www.ntp.org. Specify how often the FortiAnalyzer unit should synchronize its time with the NTP server. For example, a setting of 1440 minutes causes the FortiAnalyzer unit to synchronize its time once a day.
Caution: This procedure deletes all changes you have made to the FortiAnalyzer configuration and reverts the system to its original configuration, including resetting interface addresses.
32
Dashboard
To restore system settings to factory defaults 1 2 3 Go to System > Dashboard. In the System Operations area, select Reset to Factory Default and select Go. Select OK to confirm. The FortiAnalyzer unit restarts with the configuration it had when it was first powered on.
!
1 2 3
Caution: This procedure resets all FortiAnalyzer settings to their default state. This includes the interface IP addresses, as well as HTTP, HTTPS, SSH, and telnet access. See Configuring the FortiAnalyzer unit on page 21.
To upload the firmware image to the FortiAnalyzer unit Make sure the TFTP server is running. Copy the firmware image file to the root directory of the TFTP server. Ensure the file name is image.out. Start the FortiAnalyzer unit. As the FortiAnalyzer unit starts, the following message appears on the LCD: Press any key to begin download..... 4 Immediately press any key to begin the automatic download. The FortiAnalyzer unit connects to the TFTP server and begins downloading the firmware image. Once downloaded, the FortiAnalyzer unit loads the firmware and proceeds with the system startup.
33
Dashboard
Caution: This procedure resets all FortiAnalyzer settings to their default state. This includes the interface IP addresses, as well as HTTP, HTTPS, SSH, and telnet access. See Configuring the FortiAnalyzer unit on page 21.
Note: When connecting the Ethernet cable to the FortiAnalyzer-800, insert the cable into the LAN2 port.
To upload a firmware image to the FortiAnalyzer unit 1 2 3 4 Connect to the CLI using the null-modem cable and FortiAnalyzer console port. Make sure the TFTP server is running. Copy the new firmware image file to the root directory of the TFTP server. To confirm the FortiAnalyzer unit can connect to the TFTP server, use the following command to ping the computer running the TFTP server. For example, if the IP address of the TFTP server is 192.168.1.168, enter: execute ping 192.168.1.168 5 Enter the following command to restart the FortiAnalyzer unit: execute reboot As the FortiAnalyzer units starts, a series of system startup messages is displayed. When one of the following messages appears: Press any key to display configuration menu... Immediately press any key to interrupt the system startup. If you successfully interrupt the startup process, the following messages appears: [G]: [F]: [B]: [Q]: [H]: Get firmware image from TFTP server. Format boot device. Boot with backup firmware and set as default. Quit menu and continue to boot with default firmware. Display this list of options.
Enter G,F,B,Q,or H: 6 Type G to get the new firmware image from the TFTP server. The following message appears: Enter TFTP server address [192.168.1.168]: 7 Type the address of the TFTP server and press Enter. The following message appears: Enter Local Address [192.168.1.188]: 8 Type an IP address that the FortiAnalyzer unit can use to connect to the TFTP server.
34
Dashboard
The IP address can be any IP address that is valid for the network the interface is connected to. Make sure you do not enter the IP address of another device on this network. The following message appears: Enter File Name [image.out]:
10
Enter the firmware image file name and press Enter. The TFTP server uploads the firmware image file to the FortiAnalyzer unit and displays the following message: Save as Default firmware/Backup firmware/Run image without saving:[D/B/R]
11
Type D. The FortiAnalyzer unit installs the new firmware image and restarts.
To change the firmware using the web-based manager 1 2 3 4 5 6 Copy the firmware image file to your management computer. Log on to the web-based manager as the administrative user. Go to System > Dashboard. Select Update in the System Information area. Type the path and file name of the firmware image file, or select Browse and locate the firmware image file. Select OK. If you are reverting to a previous version of the firmware, a message appears informing you the system configuration will be set to default and all the original configuration will be lost. 7 Select OK. If you upgrade the firmware, the FortiAnalyzer unit uploads the firmware image file, upgrades to the new firmware version, restarts, and displays the FortiAnalyzer login. This process takes a few minutes.
35
Network settings
If you revert to a previous firmware version, the FortiAnalyzer unit uploads the firmware image file, reverts to the old firmware version, resets the configuration, restarts, and displays the FortiAnalyzer unit login. This process takes a few minutes.
8 9
Restore your configuration. See Backup & Restore on page 57. Enter the file name or select Browse to locate the signature file and select OK.
Network settings
Use the network settings to configure the FortiAnalyzer unit to operate in your network. Basic network settings include configuring FortiAnalyzer interfaces, DNS settings and static routes.
Interface
Use the interface configuration to set up the ports on your FortiAnalyzer unit. This includes the IP address, administrator access and Maximum Transmission Unit (MTU) settings. To configure the interfaces of the FortiAnalyzer unit, go to System > Network > Interface.
Figure 5: FortiAnalyzer-400 interface list
The name of the physical port on the FortiAnalyzer unit. The IP address and netmask configured for the interface. A list of the administrative access available to the interface. FortiDiscovery protocol indicator. When FortiDiscovery is enabled for a port, a green check appears. The status of the port: a green arrow indicates the port is up. Select Bring Down to close the port. a red arrow indicates the port is down. Select Bring up ot open the port.
Modify
Select Modify to change the interface settings. FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925
36
Network settings
MTU
To improve network performance, you can change the maximum transmission unit (MTU) of the packets that the FortiAnalyzer unit transmits from any physical interface. Ideally, this MTU should be the same as the smallest MTU of all the networks between the FortiAnalyzer unit and the destination of the packets. If the packets that the FortiAnalyzer unit sends are larger, they are broken up or fragmented, which slows down transmission. Experiment by lowering the MTU to find an MTU size for best network performance. To change the MTU, select Override default MTU value (1500) and enter the maximum packet size.
About FortiDiscovery
FortiDiscovery is a method of FortiGate units running FortiOS 3.0 establishing a connection to a FortiAnalyzer unit. When a FortiGate administrator selects Automatic Discovery, the FortiGate unit uses HELLO packets to locate any FortiAnalyzer units on the network within the same subnet. Once the FortiGate unit discovers the FortiAnalyzer unit, the fortigate unit automatically enables logging to the FortiAnalyzer and begins sending log data. The FortiGate unit will only find the FortiAnalyzer unit when the FortiDiscovery is enabled on a port on the FortiAnalyzer unit.
37
Network settings
DNS
Configure the primary and secondary DNS settings. To configure network settings, go to System > Network > DNS.
Primary DNS Server Enter the primary DNS server IP address that the FortiAnalyzer unit can connect to. Several of the FortiAnalyzer functions use DNS. Enter a secondary DNS server IP address.
Routing
The Route list displays information that the FortiAnalyzer unit compares to packets headers in order to route packets, and enables you to add static routes to the FortiAnalyzer unit. To view the routing list, go to System > Network > Routing.
Figure 6: FortiAnalyzer routing list
The destination IP address and netmask of packets that the FortiAnalyzer unit wants to send to. The IP addresses of a router where the FortiAnalyzer unit forwards the packet. The names of the FortiAnalyzer interfaces through which intercepted packets are received and sent. Select to change the route configuration settings. Add a route to the route list.
Adding a route
A static route provides the FortiAnalyzer unit with the information it needs to forward a packet to a particular destination other than the default gateway. To add a static route 1 2 3 Go to System > Network > Routing. Select Create New. Set the following options and select OK:
Destination IP Mask Gateway Interface Enter the destination IP address network mask of packets that the FortiAnalyzer unit has to intercept. Enter a netmask to associate with the IP address. Enter the IP address of the gateway where the FortiAnalyzer unit will forward intercepted packets. Select a port from the list of available ports.
38
Administrator settings
Administrator settings
Use the Admin option to configure and maintain FortiAnalyzer administrators, administrator domains (ADOMs), set a users administrative access and maintain passwords. When the FortiAnalyzer unit is initially installed, it is configured with a single master administrator account with the user name of admin. From this account, you can add and edit administrator accounts, control the access level of each administrator account and control the IP address for connecting to the FortiAnalyzer unit. This account is permanent, and cannot be deleted from the FortiAnalyzer unit.
Edit Change Password Name Trusted Hosts The assigned name for the administrator. The IP address where the administrator can log into the FortiAnalyzer unit. Using an IP address and netmask of 0.0.0.0 enables the administrator to access the FortiAnalyzer unit from any address. The access profile assigned to the administrator. Type can be either local, as a configured administrator on the FortiAnalyzer unit or Radius if you are using a Radius server on your network. Select to remove the administrator entry. You cannot delete the admin account. Select to modify the Administration information. Select to change the administrator password. For more information, see Changing the administrator password on page 40.
Delete
Profile Type
To add a new administrator 1 2 3 Go to System > Admin > Administrators. Select Create New. Configure the following options and select OK
Administrator Remote Auth Password Confirm Password FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925 Enter the administrator name. Select if you are using a Radius server group on your network. Enter a password. For security reasons, a password should be a mixture of letters and numbers and is longer than six characters. Re-enter the password.
39
Administrator settings
Enter the administrator name, email and other contact information. Enter the IP address where the administrator can log into the FortiAnalyzer unit. If you want the administrator to be able to access the FortiAnalyzer unit from any address, use the IP address 0.0.0.0 and netmask 0.0.0.0. To limit the administrator to only access the FortiAnalyzer unit from a specific network, enter that networks IP and netmask. Select an access profile from the list. You define the administrative access permissions and save them as access profiles. For more information, see Access Profile on page 40.
Access Profile
Access Profile
An Access Profile is the group of access rights assigned to an administrator. You can create any number of access profiles that you assign to administrators. For each profile, you can define what access privileges are granted. For example, you can have a profile where the administrator only has read and write access to the reports, or assign read-only access to the content archive logs. Only one access profile can by assigned to any given administrator.
40
Administrator settings
Only the admin administrator has access to the Global Configuration of a FortiAnalyzer unit. Every other administrator must be assigned an access profile. To create an access profile 1 2 3 4 Go to System > Admin > Access Profile. Select Create New. Enter a name for the profile. Select a filter for each option:
None Read Only Read-Write The administrator has no access to the function. The administrator can view pages, menus and information, but cannot modify any settings. The administrator can view pages, menus and information as well as change configurations.
Auth Groups
The Auth Groups page enables you to group RADIUS servers in to logical arrangements. To add a group you must first have at least one RADIUS server configured. To add a group 1 2 3 4 Go to System > Admin > Auth Groups. Select Create New. Select the servers to add to the group and select the right arrow. Select OK.
41
Administrator settings
RADIUS Server
Add RADIUS servers to the FortiAnalyzer unit for administrator authorization. To add a RADIUS server 1 2 3 Go to System > Admin > RADIUS Servers. Select Create New. Configure the following and select OK:
Name Server IP/Name Shared Secret Enter a name to identify the server. Enter the IP address for the server. Enter the password for the server.
Administrator Settings
Administrator settings enable you to configure the idle time when the FortiAnalyzer unit logs out an administrator, the language for the web-based manager and to enable administrative domains. To configure administrators, go to System > Admin.
Note: Only the admin user can add or change administrator account information. Figure 9: Administrators settings
Idle Timeout
Set the idle timeout to control the amount of inactive time before the administrator must log in again. To improve security keep the idle timeout to a low value, for example five minutes. Set the language for the web-based manager. Select to enable administrative domains (ADOMs). For more information on ADOMs, see Administrative domains on page 43. If you want to disable the ADOM feature, you must first delete all ADOM entries from the FortiAnalyzer unit. Until you do this, the Admin Domain Configuration option will not appear in this window. Note that the Admin Domain Configuration option is not available on the FortiAnalyzer-100 or FortiAnalyzer-100A/100B.
Monitor
The Monitor page enables the admin account to view other administrators currently logged in to the FortiAnalyzer unit. The admin account can disconnect other administrators, should the need arise. To monitor current administrators go to System > Admin > Monitor.
42
Administrative domains
To disconnect an administrator, select a check box next to the administrator name and selecting Disconnect.
Administrative domains
Administrative Domains (ADOMs) enable the FortiAnalyzer administrator to create and manage access for multiple domains, and can comprise multiple devices on a single device. The admin administrator can configure administrative profiles to grant administrators access to specific log data, reports, alerts, and options and menus in the web-based manager. Each ADOM is independent of other domains in the system. When the FortiAnalyzer administrator assigns customers separate and unique ADOMs, administrators or users on each ADOM will not be aware of other devices or ADOMs on the FortiAnalyzer unit. Similar to the web-based manager, users who access the CLI for their ADOM are not able to see data or configuration settings for other ADOMs.
Note: Administrative Domains are not available on the FortiAnalyzer-100 or FortiAnalyzer-100A/100B.
43
Administrative domains
Global Configuration The admin administrator can access the global configuration. Select Main Menu to return to the Admin Domain Configuration page. Create New Delete Selection Name Create a new ADOM. Delete the selected ADOM. Enable to select the ADOM for deletion. The name of the ADOM. Select the name to configure the ADOM. Select Main Menu item to return to the Admin Domain Configuration page.
After enabling the Admin Domain Configuration, the web-based manager and CLI display the following changes: Global and ADOM configurations are separated Only the admin administrator has access to the Global Configuration The admin account can configure all ADOM configurations Administrators can see and configure only options defined in their administrative profiles
44
Network sharing
Network sharing
Users can save, store and access information on the FortiAnalyzer hard disk as an alternate means of storing important files and work. Users can also access the reports and logs saved on the FortiAnalyzer hard disk. Use network sharing to configure users and user access to the FortiAnalyzer folders and files on its hard disk and set file properties. When users connect to the FortiAnalyzer unit, consider the following: Microsoft Windows users connect to the FortiAnalyzer hard disk by mapping a drive letter to a network folder. For Macintosh users, enable the FortiAnalyzer Windows networking selection. Macintosh users can use the SMB sharing protocol to connect to the FortiAnalyzer unit. UNIX or Linux users: mount the FortiAnalyzer hard disk as smbfs if you are using Windows Networking. mount the FortiAnalyzer hard disk as nfs if you select Network File System.
Before a user can access files on the FortiAnalyzer hard disk, create user and group accounts and set their access permissions.
45
Network sharing
Adding users
Create user accounts to give users access to the log, reports and hard disk storage of the FortiAnalyzer unit. Users added will not have administrative access to the FortiAnalyzer hard disk or FortiAnalyzer unit. To add administrative users see Administrator settings on page 39. To add a user account 1 2 3 Go to System > Network Sharing > User. Select Create New. Enter the following information for the user account and select OK:
User name Enter a user name. For example, twhite. The name cannot include spaces.
UID (NFS only) Enter a user ID. Use this field only if you are using the NFS protocol. The NFS protocol uses the UID to determine the permissions on files and folders. Password Description Enter a password for the user. Enter a description of the user. For example, the users name or a position such as IT Manager.
Adding groups
Create user groups to maintain directory access to a large number of users at once. To add a user group 1 2 3 Go to System > Network Sharing > Group. Select Create New. Enter the following information for the group account:
Group Enter a user name. For example, Finance. The name cannot include spaces.
GID (NFS only) Enter a Group ID. Use this field if you are using Network File System.
Select the users from the Available Users area and select the Right arrow to add them to the group. To remove a user, select a user from the Members area and select the Left arrow. Select OK.
46
Network sharing
Edit Delete Local Path Share as User/Group Permissions Modify The path the user has permission to connect to. The name of the shared folder or file. A list of users or groups that have access to the folder or files. Permissions for the user or groups. This can be either Read Only or Read Write. Select Edit to change any of the options for file sharing. Select Delete to remove the file sharing permissions.
To configure windows shares 1 2 3 4 Go to System > Network Sharing > Windows Share. Select Enable Windows Network Sharing. Enter a Workgroup name. Select Apply.
47
Network sharing
To add a new Windows share configuration 1 2 3 Go to System > Network Sharing > Windows Share. Select Create New. Select the Local Path button to select the folder for the users or groups to access.
Note: The default permissions for files and folders is read and execute privileges. The owner of the document also has write privileges. To enable write permissions for users and groups, you must select the write permission for the folder and for the user and the group. For details see Setting folder and file privileges on page 49.
4 5 6 7
Select OK. Enter the Share Name to describe the shared folder. Select user and group names from the Available Users & Groups box. Hold the Ctrl key to select multiple users or groups. Select the type of access rights the users and groups will have and select the appropriate right arrow to move the user or group name to the Read-Only Access or Read-Write Access boxes. Select Ok.
Edit Delete Local Path Remote Clients Permissions Modify The path the user has permission to connect to. A list of users that have access to the folder or files. Permissions for the user. This can be either Read Only or Read Write. Select Edit to change any of the options for file sharing. Select Delete to remove the file sharing permissions.
To add a new NFS share configuration 1 2 3 Go to System > Network Sharing > NFS Export. Select Enable NFS Exports and select Apply. Select Create New.
48
Select the Local Path button to select the folder for the users or groups to access.
Note: The default permissions for files and folders is read and execute privileges. The owner of the document also has write privileges. To enable write permissions for users and groups, you must select the write permission for the folder and for the user and the group. For details see Setting folder and file privileges on page 49.
5 6 7 8
Select OK. Enter the IP address of the remote system or user ID. Select the type of access rights required and select Add. Select OK.
Note: When sharing a file or folder using NFS, and the user attempts to mount the FortiAnalyzer hard disk on UNIX, the mount operation may fail. If this occurs, rebooting the UNIX system corrects this, and the system can mount the FortiAnalyzer hard disk.
49
Log Settings
The FortiAnalyzer unit creates its own system log messages to provide information on system events occurring on the unit, such as system activity, administration events and IPSec negotiations for secure transfers of log message packets. To configure where the FortiAnalyzer unit saves its own log messages, go to System > Config > Log Setting.
Figure 15: System settings
Select this option to save the FortiAnalyzer log messages on the FortiAnalyzer hard disk. Select the severity level for the log messages recorded to the FortiAnalyzer hard disk. The FortiAnalyzer unit logs all levels of severity down to, but not lower than, the level you select. For example, if you want to record emergency, critical, and error messages, select Error. Select to configure the events the FortiAnalyzer unit records to the log. The maximum size of the FortiAnalyzer log file that the FortiAnalyzer unit saves to the hard disk. When the log file reaches the specified maximum size, the FortiAnalyzer unit saves current network traffic log file with an incremental number and starts a new active log file.
Log options when The policy to follow for saving the current log and starting a new active log when the FortiAnalyzer disk is full. log disk is full Select Overwrite oldest logs to delete the oldest log entry when the disk is full. Select Do not log to stop logging messages when the disk is full.
50
Select to use configured options for device logs settings. See Log rolling on page 86.
Log file should not The maximum size of the current log file that the FortiAnalyzer unit saves to the disk. When the log file reaches the specified maximum exceed size, the FortiAnalyzer unit saves the current log file and starts a new active log file. When a log file reaches its maximum size, the FortiAnalyzer unit saves the log files with an incremental number, and starts a new log file with the same name. Log file should be Set the frequency of when the FortiAnalyzer unit saves the current log file and starts a new active log file. Select this option if you want to rolled start new log files even if the maximum log file size has not been reached. For example, you want to roll a daily log on a FortiAnalyzer unit that does not see a lot of activity. Log to Host IP Port Log Level Select to send FortiAnalyzer log messages to a Syslog server. Enter the IP address of the Syslog server. Enter the Syslog port. The default port is 514. Select the severity level for the log messages recorded to the Syslog server. The FortiAnalyzer unit logs all levels of severity down to, but not lower than, the level you select. For example, if you want to record emergency, critical, and error messages, select Error. Enable CSV format to record log messages in comma-separated value (CSV) formatted files. Log message fields are separated by commas. Select to configure the events the FortiAnalyzer unit records to the log. Select the age unit for the specific log or report files. Select from hours, weeks, days or months, and enter the value for the age unit.
CSV format
Log Aggregation
Log aggregation is a method of collating log data from remote FortiAnalyzer units to a central FortiAnalyzer unit. For example, a company may have a headquarters and a number of branch offices. Each branch office has a FortiGate unit and a FortiAnalyzer-100A/100B to collect local log information. The headquarters has a FortiAnalyzer-2000 as the central log aggregator. You can also use the FortiAnalyzer unit to aggregate logs for third party network devices or server/work stations that supports syslog log messaging.
51
Log aggregation enables the branch office FortiAnalyzer units to send or upload their logs at regular intervals to the headquarter FortiAnalyzer unit. This provides a central storage location as well as a method of running reports that include data from all branch offices in a single report. Log aggregation involves an aggregation client (branch office) and an aggregation server (headquarters). The aggregation client sends all log information for the registered devices using SSH on port 22. This does not include quarantined files. It does include the active log to the point of aggregation (tlog.log for example) and all rolled logs available on the client hard disk (tlog.1.log, tlog.2.log, etc.). Subsequent log uploads will only include the most recent updates. The FortiAnalyzer unit will not resend all logs again. On the aggregation server, additional devices will appear in the devices list. You can easily identify these devices as the Rx and Tx icons are empty.
52
IP Aliases
Use IP Aliases to assign a meaningful name to IP addresses. When configuring reports, and viewing logs and content archives, select Resolve Host Name to view the alias name rather than the IP address. To define IP aliases 1 2 3 4 Go to System > Config > IP Aliases. Select Create New. Enter a name for the IP address in the Alias box. Enter the IP address and select OK.
53
To import the alias file 1 2 3 4 Go to System > Config > IP Aliases. Select Import. Enter the path and file name or select Browse to locate the file. Select OK.
IP alias ranges
When adding an IP alias you can include an IP address range as well as individual addresses. The range can include an address range and wild cards. For example: 10.10.10.1 - 10.10.10.50 10.10.10.1 - 10.10.20.100 10.10.10.*
Caution: Note that if you change RAID levels, the FortiAnalyzer unit reformats the hard disks to support the new setting. It is extremely important that you back up all information before changing the RAID level.
To set the RAID level, go to System > Config > RAID. For details on the different RAID levels, see RAID levels on page 59.
Figure 17: FortiAnalyzer-400 RAID settings
54
Select a RAID level and select Apply. The amount of free disk space. The amount of disk space available within the RAID array. This value will change depending on the RAID type selected. The setting for the unit. When employing a RAID level that includes a hot spare, the hard disk assigned as a hot spare appears as a separate unit. The status of the RAID. For example, when starting a RAID array, Initializing appears. When the RAID disk is functioning normally, OK appears. The total size of the unit for the RAID level or the size of the spare hard disk. The hard disk number. Indicates if the hard disk is a part of the RAID array. The current state of the hard disk. The size of the hard disk. Action icons appear when the FortiAnalyzer unit detects a faulty hard disk. To change a failed hard disk, select Remove to inform the FortiAnalyzer unit that the hard disk will be removed. After removing, the selection will become Add. Once the hard disk is replaced, select Add. For details on swapping hard disks, see Hot swapping in the FortiAnalyzer-400 and FortiAnalyzer-800 on page 61.
Status
Caution: It is important to note that if you change RAID levels, the FortiAnalyzer unit reformats the hard disks to support the new setting. It is extremely important that you back up all information before changing the RAID level.
55
Enable RAID
Select to enable RAID 5. To enable other RAID levels, use the command line interface. For command details see the FortiAnalyzer CLI Reference. Select to enable the use of a hot spare with the RAID array. Additional RAID levels are set in the CLI. The amount of disk space available within the RAID array. Select after removing or adding a hard disk to the unit. This enables the FortiAnalyzer unit to update the status of the hard disk configurations. The hard disk grouping. The setting for the unit. When employing a RAID level that includes a hot spare, the hard disk assigned as a hot spare appears as a separate unit. The status of the unit. For example, when starting a RAID array, Initializing appears. When the hard disk if functioning normally, OK appears. The total size of the unit for the RAID level or the size of the spare hard disk. The hard disk number. Indicates if the hard disk is a part of the RAID array. The current state of the hard disk. The size of the hard disk. To change a failed hard disk, select Remove to inform the FortiAnalyzer unit that the hard disk will be removed. After removing, the selection will become Add. Once the hard disk is replaced, select Add. For details on hot swapping hard disks, see Hot swapping the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A on page 62.
Enable Hot Spare Total Disk Space Click to start controller rescan Unit Type
Status
56
Maintenance
Maintenance
The maintenance page enables you to backup and restore configuration files and maintain and review FortiGuard information for the FortiAnalyzer unit.
The date and time of the last backup to local PC Back up the current configuration. Select to encrypt the backup file. Enter a password in the Password field and enter it again in the Confirm field. You will need this password to restore the file. You must encrypt the backup file if you are using a secure connection to a FortiGate or FortiManager device. Select to back up the configuration. Restore the configuration from a file. Currently the only option is to restore from a PC. Enter the configuration file name or use the Browse button if you are restoring the configuration from a file on the management. computer. Enter the password if the backup file is encrypted. Select to restore the configuration from the selected file. A partition can contain one version of the firmware and the system configuration.
Backup configuration to: Currently, the only option is to back up to your local PC.
57
Maintenance
A green check mark indicates which partition contains the firmware and configuration currently in use. The date and time of the last update to this partition. The version and build number of the FortiAnalyzer firmware. On the backup partition, you can: Select Upload to replace with firmware from the management computer. Select Upload and Reboot to replace the firmware.
Update center
You can configure the FortiAnalyzer unit to connect to the FortiProtect Distribution Network (FDN) to update the IPS attack definitions for the vulnerability scanner. The FDN is a world-wide network of FortiProtect Distribution Servers (FDSs). When the FortiAnalyzer unit connects to the FDN it connects to the nearest FDS. To do this, all FortiAnalyzer units are programmed with a list of FDS addresses sorted by nearest time zone according to the time zone configured for the FortiAnalyzer unit. The FortiAnalyzer unit supports the following definition update features: User-initiated updates from the FDN, Hourly, daily, or weekly scheduled antivirus and attack definition updates from the FDN, Update status including version numbers, expiry dates, and update dates and times,
To receive scheduled updates and push updates, you must register the FortiAnalyzer unit on the Fortinet support web page.
Figure 20: Update center
58
RAID levels
The status of the connection to the FortiProtect Distribution Network (FDN). A green indicator means that the FortiAnalyzer unit can connect to the FDN. You can configure the FortiAnalyzer unit for scheduled updates. A red-yellow flashing indicator means that the FortiAnalyzer unit cannot connect to the FDN. Check your configuration. For example, you may need to add routes to the FortiAnalyzer routing table. To set the routing see Routing on page 38. Select Refresh, to test the FortiAnalyzer unit connection to the FDN. The test results are displayed at the top of the System Update page.
Refresh
Use override If you cannot connect to the FDN or if your organization provides attack server address updates using their own FortiProtect server, you can configure an override server. Select the Use override server address check box and enter the IP address of a FortiProtect server. If after applying the override server address, the FortiProtect Distribution Network setting changes to available, the FortiAnalyzer unit has successfully connected to the override server. If the FortiProtect Distribution Network stays set to not available, the FortiAnalyzer unit cannot connect to the override server. Check the FortiAnalyzer configuration and the network configuration to make sure you can connect to the override FortiProtect server from the FortiAnalyzer unit. Update Version Expiry date Last update attempt Last update status The RVS engine and plug-in definitions for which update information is displayed. The version numbers of the files currently installed on the FortiAnalyzer unit. The expiry date of your license for RVS engine updates. The date and time on which the FortiAnalyzer unit last attempted to download the updates. The result of the last update attempt. No updates means the last update attempt was successful but no new updates were available. Update succeeded or similar messages mean the last update attempt was successful and new updates were installed. Other messages can indicate that the FortiAnalyzer was not able to connect to the FDN and other error conditions. Select this check box to enable scheduled updates. Attempt to update once every 1 to 23 hours. Select the number of hours between each update request. Attempt to update once a day. You can specify the hour of the day to check for updates. The update attempt occurs at a randomly determined time within the selected hour. Attempt to update once a week. You can specify the day of the week and the hour of the day to check for updates. The update attempt occurs at a randomly determined time within the selected hour. Select Update Now to manually initiate an update. Select Apply to save update settings.
Weekly
RAID levels
FortiAnalyzer units containing multiple hard disks can store log data using a RAID array to provide redundant storage, data protection, faster hard disk access or a larger storage capacity.
59
RAID levels
The FortiAnalyzer unit support standard RAID levels linear, 0, 1 and 5. The FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A supports additional RAID level 10 (1+0), and 50 (5+0), as well as 5 +hot spare and 10 + hot spare.
Linear
A linear RAID level combines all hard disks into one large virtual disk. It is also known as concatenation or JBOD (Just a Bunch of Disks). The total space available in this option is the capacity of all disks used. There is very little performance changes when using this RAID format, including any redundancy available at this level. If any of the drives fails, the entire set of drives is unusable until the faulty drive is replaced. All data will be lost.
Note: This RAID level is not available on the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A.
RAID 0
A RAID 0 array is also referred to as striping. The FortiAnalyzer unit writes information evenly across all hard disks. The total space available is that of all the disks in the RAID array. There is no redundancy available. If any of the drives fail, the data cannot be recovered. This RAID level is beneficial because it provides better performance, since the FortiAnalyzer unit can distribute disk writing across multiple disks.
RAID 1
A RAID 1 array is also referred to as mirroring. The FortiAnalyzer unit writes information to one hard disk, and writes a copy (a mirror image) of all information to all other hard disks. The total disk space available is that of only one hard disk, as the others are solely used for mirroring. This provides redundant data storage with no single point of failure. Should any of the hard disks fail, there are several backup hard disks available. With a FortiAnalyzer-400 for example, if one disk fails, there are still three other hard disks the FortiAnalyzer unit can access and continue functioning.
RAID 5
A RAID 5 array employs striping with a parity check. The FortiAnalyzer unit writes information evenly across all drives. Additional parity blocks are written on the same stripes. The parity block is staggered for each stripe. The total disk space is the total number of disks in the array, minus one disk for parity storage. For example, on a FortiAnalyzer-400 with four hard disks, the total capacity available is actually the total for three hard disks. RAID 5 performance is typically better with reading than writing, although performance is degraded when one disk has failed or is missing. RAID 5 also ensures no data loss. If a drive fails, it can be replaced and the FortiAnalyzer unit will restore the data on the new disk using reference information from the parity volume.
60
RAID levels
RAID 10
RAID 10 is only available on the FortiAnalyzer-2000. RAID 10 (or 1+0), includes nested RAID levels 1 and 0, or a stripe (RAID 0) of mirrors (RAID 1). The total disk space available is the total number of disks in the array (a minimum of 4) divided by 2. Any drive from a RAID 1 array can fail without loss of data. However, should the other drive in the RAID 1 array fail, all data will be lost. In this situation, it is important to replace a failed drive as quickly as possible.
RAID 50
RAID 50 is only available on the FortiAnalyzer-2000. RAID 50 (or 5+0) includes nested RAID levels 5 and 0, or a stripe (RAID 0) and stripe with parity (RAID 5). RAID 50 provides increased performance and also ensures no data loss for the same reasons as RAID 5. Data can be recovered even when up to four drives fail.
The FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A also supports the hot swapping of hard disks during operation. For details see Hot swapping the FortiAnalyzer-2000 and FortiAnalyzer-4000/4000A on page 62.
61
RAID levels
You can use any brand of hard disk to replace a failed hard disk. However, you must ensure that the hard disk size is the same size as the remaining working drives. Using a smaller drive will affect the RAID setup. The FortiAnalyzer unit will reconfigure the RAID to the smaller drive, potentially causing data loss.
Note: Only perform a hot swap with a RAID setting of either 1 or 5. Hot swapping on any other RAID settings will result in data loss. Table 6: FortiAnalyzer-400 disk drive configuration. Drive 1 (p1) Drive 2 (p2) Drive 3 (p3) Drive 4 (p4) Table 7: FortiAnalyzer-800 disk drive configuration. Drive 1 Drive 2 Drive 3 Drive 4
To swap a FortiAnalyzer-400 or FortiAnalyzer-800 hard disk 1 Go to System > Config > RAID. The web-based manager displays which hard disk has failed. A trash can icon appears next to the failed disk drive. 2 3 Select Remove for the failed hard disk. A message displays indicating it is safe to remove the disk from the drive. Remove the hard disk from the drive bay on the FortiAnalyzer unit 4 5 On the FortiAnalyzer-400, open the faceplate, remove the screws for the drive and pull out the drive. On the FortiAnalyzer-800, pull open the face place, unlock the drive and pull out the drive.
Insert the new hard disk into the empty drive bay on the FortiAnalyzer unit, reversing the steps above. Select Return from the web-based manager. The FortiAnalyzer disk controller will scan the available hard disks and update its information with the new hard disk.
Select Add to add the hard disk to the RAID array. The FortiAnalyzer unit rebuilds the RAID array with the new hard disk.
62
RAID levels
Table 8: FortiAnalyzer-2000 disk drive configuration Drive 1 (p1) Drive 2 (p2) Drive 3 (p3) Drive 4 (p4) Drive 5 (p5) Drive 6 (p6)
Table 9: FortiAnalyzer-4000/4000A disk drive configuration Drive 1 (p1) Drive 2 (p2) Drive 3 (p3) Drive 4 (p4) Drive 5 (p5) Drive 6 (p6) Drive 7 (p7) Drive 8 (p8) Drive 9 (p9) Drive 10 (p10) Drive 11 (p11) Drive 12 (p12)
To swap a FortiAnalyzer-2000 or FortiAnalyzer-4000 hard disk 1 2 3 Go to System > Config > RAID. The web-based manager displays which hard disk has failed. Select Remove for the failed hard disk. Remove the hard disk from the drive bay on the FortiAnalyzer unit On the FortiAnalyzer-2000, press in the tab and pull the drive handle to remove the dive. On the FortiAnalyzer-4000/4000A, using a screw driver, turn the handle lock so it is horizontal. Push the blue latch right and pull the drive handle to remove the drive.
Select Click to start controller rescan. The FortiAnalyzer disk controller scans the available hard disks and updates the RAID array for the remaining hard disks. The RAID array status will be Degraded.
5 6
Insert the new hard disk into the empty drive bay on the FortiAnalyzer unit. Select Click to start controller rescan. The FortiAnalyzer disk controller will scan the available hard disks and update its information with the new hard disk.
Select Add to add the hard disk to the RAID array. The FortiAnalyzer unit rebuilds the RAID array with the new hard disk. The options available here will depend on the RAID level selected. For most RAID levels, you can only add the new hard disk back into the RAID array. If you are running a RAID level with hot spare, you can also add the new hard disk as the hot spare.
63
RAID levels
64
Devices
Devices List
Devices
The power of the FortiAnalyzer centers on reporting, data and network analysis capability. The FortiAnalyzer unit collects log messages from multiple FortiGate devices and Syslog servers, which it then uses for generating many different report types. This section describes how to add and configure FortiGate, FortiManager units and Syslog servers so they can communicate with the FortiAnalyzer unit This section includes the following topics Devices List Adding a FortiGate unit Adding a FortiManager unit Adding a Syslog server Device Groups Blocked Devices
Devices List
The devices list displays a listing of devices configured to connect and send log packets, or messages, to the FortiAnalyzer unit.
Note: The device administrator must also configure the device to send log messages and other logging information to the FortiAnalyzer unit. Figure 21: Devices list
Edit Delete Page Show Enter a page number press Enter when you have multiple pages of devices. Select the type of devices to display in the list. You can select devices by type or by group.
Unregistered Device Set the options to instruct the FortiAnalyzer unit what to do when encountering an unregistered device attempting to connect to the Options unit. For details see Unregistered device options on page 67. Add Device Select to add and configure a new device to the list.
65
Devices List
Devices
The name of the device. The model of the device. For example, FortiGate-300A appears as FGT300A. The IP address of the device. The ADOM configured for the device. Displays the permissions that each device has for sending and viewing logs and reports when connected to the FortiAnalyzer unit. Tx indicates the device is configured to transmit log packets to the FortiAnalyzer unit. Rx indicates the device is allowed to view reports and logs stored on the FortiAnalyzer unit directly from the device. This feature is only available on FortiGate units running FortiOS 3.0. This permission will appear red (unavailable) for Syslog devices by default. For a FortiManager unit, Tx indicates full access for all devices managed by the FortiManager unit; Rx indicates that the FortiManager unit can configure the FortiAnalyzer unit. Indicates there is an IPSec tunnel connection between the device and the FortiAnalyzer unit for the transmission of logs, content and quarantined files. For details on creating a secure connection, see Adding a FortiGate unit on page 68. Displays the amount of the FortiAnalyzer disk space is allocated for the device and how much of that space is used. Select Edit to edit the device configuration. Select Delete to remove a device from the list. Select to add register an unregistered device so the FortiAnalyzer unit can begin receiving the devices log messages. For an unregistered device, select Block to stop the device from attempting to connect to the FortiAnalyzer unit to send log messages. For details on blocking a device see Blocked Devices on page 74.
Secure Connection
66
Devices
Devices List
FortiAnalyzer-800 FortiAnalyzer-2000
1 1 1
The maximums indicate a combined total of added and unregistered devices. If there are more than the maximum allowed, the FortiAnalyzer unit will not allow you to add more devices. You must either remove or block some devices. When new devices attempt to connect to a FortiAnalyzer unit at its maximum allowed devices, the FortiAnalyzer unit will reject the attempt by the device to connect and automatically add the device to the list of blocked devices. For details on blocked devices see Blocked Devices on page 74.
Allow connection, add to unregistered Add the device to the list of unregistered device list but do not store log data. table, but ignore the data Allow connection, register Add the device to the registered devices list, automatically, and store up to N MB of and save the log packets to the hard disk, using the defined amount of disk space. data FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925
67
Devices
Add unknown unregistered device Add the device to the unregistered devices list for to unregistered table, but ignore future configuration and addition to the FortiAnalyzer unit, but do not save the incoming log packets to the data hard disk. Add unknown unregistered Add the device to the unregistered devices list for devices to unregistered table, and future configuration and addition to the FortiAnalyzer unit, and save the log packets to the hard disk, but store up to N MB of data only to a defined amount of disk space.
68
Devices
Device ID
When selecting a FortiGate unit from the unregistered list, the FortiAnalyzer unit automatically adds the FortiGate units serial number. If you are adding a new FortiGate unit that is not already in the unregistered list, enter the FortiGate units serial number. The FortiGate units serial number is available on the System menu in the Web-based GUI. Select the mode of the FortiGate unit. Leave the selection as Standalone when adding a single unit. If you are adding an HA cluster, select HA. For more details on adding an HA cluster see Adding an HA cluster on page 70. Enter additional information for the FortiGate unit up to 128 characters long. Description information appears when you hover the mouse over the FortiGate units name in the devices list. Select the administrative domain (ADOM) that the device will be associated with. This selection is visible when using the ADOM feature. For more information on ADOMs, see Administrator settings on page 39. Select this option to set up a secure connection between the FortiAnalyzer unit and the FortiGate unit. To ensure a correct secure connection, the Device Name entered above and the Local ID setting on the FortiGate unit must match exactly. You set this in the FortiGate CLI in config system fortianalyzer. You must also enter a pre-shared key that matches the pre-shared key entered on the FortiGate unit. Enter a pre-shared key for the secure connection when you select Secure Connection. You must select the Secure Connection check box to enable this option. The key you enter must match the key set on the FortiGate unit to ensure the logs and files are sent over a secure connection.
Mode
Description
By Key
Allocated Disk Space Set the allocated amount of the FortiAnalyzer hard disk to log and content messages for the device. The amount allocated will also (MB) include disk space set aside for quarantined files. For details on quarantine file disk allocation, see Configuring quarantine settings on page 95. A disk space setting of zero is unlimited. When Allocated Disk Select what the FortiAnalyzer unit should do when the allocated disk space has been reached. Select either overwriting older files Space is All Used or stop logging.
4 5
Expand the Devices Privileges settings. Set the privileges the FortiGate unit has when sending and viewing log files, archived content and quarantined files.
Note: Accessing logs, content logs and quarantined files is available on FortiGate units running firmware version 3.0 or later.
6 7
Expand the Group Membership settings. Select the group where you want to include the FortiGate unit, and select the right arrow button to add the FortiGate unit to the group. A FortiGate unit can belong to multiple groups. You can also add the FortiGate unit to a group later or change the group you assigned. For details see Device Groups on page 74.
69
Devices
Define the port interface options using the arrow buttons. For details on port interface settings see Defining FortiGate port interfaces on page 70. If you want to add a VLAN or other interface, type the name of the interface and select Add.
10
Select OK.
The table below illustrates how the source and destination interface types are represented in the log report as traffic direction.
Table 11: Log report traffic direction identification Source None All types WAN WAN LAN, DMZ LAN, DMZ Destination All types None LAN, DMZ WAN LAN, DMZ WAN Traffic Direction Unclassified Unclassified Incoming External Internal Outgoing
Adding an HA cluster
Adding an High Availability (HA) cluster enables you to enable an HA cluster to send log packets to the FortiAnalyzer unit. The log messages sent are maintained as a cluster rather than a number of individual log files for each unit in the cluster. This also enables you to view the cluster traffic and run reports on the cluster. When adding an HA cluster, add the primary device.
70
Devices
To add an HA cluster 1 2 Go to Device > All Select Unregistered from the Show list, and select Add from the Action column. or Select Add Device. 3 Configure the same settings as indicated in the section Adding a FortiGate unit on page 68, using the information for the primary unit, with the following exceptions: Set the Mode to HA. Enter the device IDs (serial numbers) for each subordinate unit in the cluster and select Add.
Allocated Disk Space Set the allocated amount of the FortiAnalyzer hard disk to log and content messages for the device. The amount allocated will also (MB) include disk space set aside for quarantined files. For details on quarantine file disk allocation, see Configuring quarantine settings on page 95. A disk space setting of zero is unlimited. When Allocated Disk Select what the FortiAnalyzer unit should do when the allocated disk space has been reached. Select either overwriting older files Space is All Used or stop logging.
Unlike other devices, a FortiClient connection can only send log messages to the FortiAnalyzer unit. You cannot configure it so that a user can view their log messages or specific reports.
71
Devices
Description
By Key
Allocated Disk Space Set the amount of the FortiAnalyzer hard disk is allocated to log and content files for the device. A disk space setting of zero is (MB) unlimited. When Allocated Disk Select what the FortiAnalyzer unit should do once the allocated disk space has been reached. Select from overwriting older files or Space is All Used stop logging.
72
Devices
4 5
Expand the Devices Privileges settings. Set the privileges the FortiManager unit has to the FortiAnalyzer unit. Select Allow all devices managed by FortiManager to have full access to the FortiAnalyzer unit and to Allow the FortiManager to configure the FortiAnalyzer unit.
6 7 8
Expand the Group Membership settings. Select the group or groups where you want to include the FortiManager unit, and select the right arrow button to add the FortiManager unit to the group. Select OK.
Description
Administrative Domain
Allocated Disk Space Set the amount of the FortiAnalyzer hard disk is allocated to log and content files for the device. A disk space setting of zero is (MB) unlimited. When Allocated Disk Select what the FortiAnalyzer unit should do once the allocated disk space has been reached. Select from overwriting older files or Space is All Used stop logging.
73
Device Groups
Devices
4 5 6
Expand the Group Membership settings. Select the group or groups where you want to include the Syslog server, and select the right arrow button to add the Syslog servers to the group. Select OK.
Device Groups
When you have multiple devices belonging to a department or section of the company, you can create groups to keep the devices together for easier monitoring. A device can belong to multiple groups. Once you create a group you can add or remove devices as required.
Note: You can delete groups without removing devices from the group. When adding a device to a group, it is like a Windows shortcut. Removing a group will not remove the device configuration from the FortiAnalyzer unit.
To add a device group and add devices 1 2 3 4 5 Go to Device > Groups. Select Create New. Enter a name for the group. Select the devices to include in the group from the list of Available Devices and select the right-pointing arrow. Select OK.
Blocked Devices
Blocking devices are a way to control the number of device licenses available on the FortiAnalyzer unit. The FortiAnalyzer unit supports a maximum number of devices. To free up license spots, you can block devices that you do not want in the FortiAnalyzer devices lists. To block a device 1 2 3 Go to Device > All. Select Unregistered from the Show list. Select Block from the Action column.
74
Devices
Blocked Devices
The name or serial number of the blocked device. The type of device, for example FortiGate, FortiManager or Syslog server. The IP Address of the blocked device. Select Delete to remove access from the device from the FortiAnalyzer unit. Select Unblock to add the device to the FortiAnalyzer unit.
75
Blocked Devices
Devices
76
Logs
Log Viewer
Logs
The FortiAnalyzer unit collects log message packets from FortiGate, FortiManager, FortiClient and Syslog devices. Using the log browser, you can view device and FortiAnalyzer log files and log messages. The FortiAnalyzer unit can also view device logs in real-time, enabling you to see events and traffic occurring on a device as it happens. This section includes the following topics: Log Viewer Browse Customizing the log view Search the logs Log rolling
Log Viewer
The log viewer enables you to view logs from registered devices. The Log Viewer has two types of log viewing options: Real-time logs display log message updates as the log message packets are sent to the FortiAnalyzer unit. The display refreshes every 10 seconds to display the most current entries. Historical logs provides a method of viewing log messages by focusing on specific log types and time frames.
77
Log Viewer
Logs
The log type you are viewing and the device where it is originating from. Select to change the log type to view or the device. Select to stop the FortiAnalyzer unit from refreshing the log view. Select to change the columns to view and the order they appear on the page. For details see Customizing the log column views on page 83. Select a view of the log file. Selecting Formatted (the default) displays the log files in columnar format. Selecting Raw, displays the log information as it actually appears in the log file. Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names see IP Aliases on page 53. Select to display the network service names rather than the port numbers. For example, HTTP rather than port 80. This option does not appear when the logs do not have service information to display. For example, the event log.
Formatted | Raw
Resolve Service
For information about log messages, see the FortiGate Log Message Reference.
78
Logs
Log Viewer
Select OK.
Figure 24: Viewing historical log data Column Settings
The type of log you are viewing and the device where it originated. Select to change the log, time frame or a different device. Select a view of the log file. Selecting Formatted (the default) displays the log files in columnar format. Selecting Raw, displays the log information as it actually appears in the log file. Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names see IP Aliases on page 53. Select to display the network service names rather than the port numbers. For example, HTTP rather than port 80. This option does not appear when the logs do not have service information to display. For example, the event log. Select the number of rows of log entries to display per page. Enter a page number to jump to in the log information. Press Enter to jump to the page. Select to change the columns to view and the order they appear on the page. For details see Customizing the log column views on page 83.
Resolve Service
79
Browse
Logs
Search
Enter a keyword to perform a simple search on the log information available. Select Go to begin the search. The number of matches appears above the Search field. The FortiAnalyzer unit will search the entire log file for the keyword you enter. Select to generate a report that captures the current log messages. The web browser prompts you to save the report file for viewing or printing. The report saved is in HTML format. Note that large log messages can take a long time to load. The printable version takes all filter settings into account when generating a printable version.
Printable Version
For information about log messages, see the FortiGate Log Message Reference.
Note: Searches using characters will not include results from the Traffic logs. Traffic logs include information for source and destination IP addresses and ports which is strictly numerical information. For example, if you are searching on User1, you may get results for User1, however, none of the results will include entries from the Traffic log. To get results from the traffic log, you must search on the IP address of User1. For example, 10.10.10.1.
Browse
The log browser enables you to see all stored log files for all devices and FortiAnalyzer logs. In this window, you can view the log information, download log files to your hard disk or delete unneeded files. To browse the log files, go to Log > Browse.
Figure 25: Browsing log files
Delete Download Display Device Type Import Log files Select a device category to view its related log files. Select to import older log files to view and run log reports. For details on importing log files see Importing a log file on page 82. A list of available log files. Any device groups you create also appear here. Select the group name to expand the list of devices within the group. The current, or active, log file appears as well as rolled log files. Rolled log files include a number in the file name. For example, alog.2.log. If you configure the FortiAnalyzer unit to upload rolled logs to an FTP site, only the current log will appear in the log browser. The number of devices in a group, and the number of logs for a device.
80
Logs
Browse
The last time the log was updated from the device. The size of the log file. Select Delete to remove the log file from the FortiAnalyzer hard disk. Select Download to save the log file to your local hard disk. Select Display to view the contents of the log file.
When a log file reaches its maximum size, the FortiAnalyzer unit saves the log files with an incremental number, and starts a new log file with the same name. For example, the current attack log is alog.log. Any subsequent saved logs appear as alog.n.log, where n is the number of rolled logs. For details on setting the maximum file size and log rolling options, see Log rolling on page 86.
The type of log you are viewing and the device where it originated. Select to view a different log file. Select a view of the log file. Selecting Formatted (the default) displays the log files in columnar format. Selecting Raw, displays the log information as it actually appears in the log file. Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names see IP Aliases on page 53. Select to display the network service names rather than the port numbers. For example, HTTP rather than port 80. This option does not appear when the logs do not have service information to display. For example, the event log. Select the number of rows of log entries to display per page. Enter a page number to jump to in the log information. Press Enter to jump to the page.
Resolve Service
81
Browse
Logs
Column Settings
Select to change the columns to view and the order they appear on the page. For details see Customizing the log column views on page 83. Enter a keyword to perform a simple search on the log information available. Select Go to begin the search. The number of matches appears above the Search field. The FortiAnalyzer unit will search the entire log file for the keyword you enter. Select to generate a report that captures the current log messages. The web browser prompts you to save the report file for viewing or printing. The report saved is in HTML format. Note that large log messages can take a long time to load. The printable version takes all filter settings into account when generating a printable version.
Search
Printable Version
For information about log messages, see the FortiGate Log Message Reference.
Note: Searches using characters will not include results from the Traffic logs. Traffic logs include information for source and destination IP addresses and ports which is strictly numerical information. For example, if you are searching on User1, you may get results for User1, however, none of the results will include entries from the Traffic log. To get results from the traffic log, you must search on the IP address of User1. For example, 10.10.10.1.
82
Logs
The web browser prompts you for a location to save the file.
To add or remove columns 1 2 When viewing a log file, select Column Settings. A list of columns available for the log type appears. In the Available Fields area, select a column name and select the right arrow to move the column name into the Display Fields area. To change the positioning of the columns 1 2 3 When viewing a log file, select Column Settings. A list of columns available for the log type appears. Select a column name. Select the up and down arrows to change the position of the column in the list.
83
Logs
Filtering logs
When viewing log files both real-time and historical, you can filter the contents to find specific content. Log filters appear when you are viewing real-time and historical data in the Log Viewer or when browsing log files on the FortiAnalyzer hard disk.
Note: You must be viewing the log contents in the formatted view to use the filters. Figure 28: Filter icons for logs
Filter icon
Filter in use
Each column of data includes a gray filter icon. Select the icon to filter the contents of the column. When applying a column filter, the filter icon appears green. To turn off the filter, select the filter icon for the column, and select Reset Filter.
Note: When viewing real-time logs, you cannot filter the time column because the time will always be the current time.
Filtering tip
When filtering by source or destination IP, you can use the following in the filtering criteria: a single address (2.2.2.2) an address range using a wild card (1.2.2.*) an address range (1.2.2.1-1.2.2.100) 1.1.1.1 or 2.2.2.2 1.1.1.1 or 2.2.2.* 1.1.1.1 or 2.2.2.1-2.2.2.10
You can also use the boolean operator "or" to indicate multiple choices:
84
Logs
Basic search
The basic search performs a simple search of all log files on the FortiAnalyzer unit. The FortiAnalyzer unit maintains a search history for reference should you need to use the search keywords again. The FortiAnalyzer searches all log files and data for matches. To perform a search, go to Log > Search. Enter the keywords for the search. Separate multiple keywords with a space. Search results appear below the search entry fields.
Note: Searches using characters will not include results from the Traffic logs. Traffic logs include information for source and destination IP addresses and ports which is strictly numerical information. For example, if you are searching on User1, you may get results for User1, however, none of the results will include entries from the Traffic log. To get results from the traffic log, you must search on the IP address of User1. For example, 10.10.10.1.
Advanced search
The advanced search provides more options to narrow your search criteria. To perform an advanced search, go to Log > Search, and select Advanced search.
Figure 29: FortiAnalyzer advanced search
Search Basic search Find results with all of the words Find results with at least one of the words Find results without the words Log types Devices Dated within
Select to begin searching the logs. Select to perform a basic search. Enter all the keywords you want to use in your search. The FortiAnalyzer search engine will return all log entries that contain all keywords entered. Separate keywords with a space. Enter all the keywords you want to use in your search. The FortiAnalyzer search engine will return all log entries that contain one or more of the keywords. Separate keywords with a space. Enter the keywords that you do not want included in your search results. If a log entry contains the keywords you are searching on and includes a keyword from this field, the log entry will not be included in the search results. Select the log types that you want to search. Hold the CTRL or SHIFT keys to select multiple log types. Select the devices logs to search. Hold the CTRL or SHIFT keys to select multiple devices. Select a time frame of the log entries to search within.
85
Log rolling
Logs
Note: Searches using characters will not include results from the Traffic logs. Traffic logs include information for source and destination IP addresses and ports which is strictly numerical information. For example, if you are searching on User1, you may get results for User1, however, none of the results will include entries from the Traffic log. To get results from the traffic log, you must search on the IP address of User1. For example, 10.10.10.1.
Search tips
The FortiAnalyzer search feature includes a robust search index that enables you to find any information by including specific information in your search criteria. Consider the following when searching the logs: The search is case-insensitive. Use the * character as a wild card. For any partial term or IP address, enter as much as you can and use the * to search all terms related to what you entered. To find how often an IP address is attacked, enter the IP and the attack type. For example 10.10.10.1 slammer. Or, to see how often a user logs into the FortiGate unit, enter 10.10.10.1 login. You can search for IP ranges, including subnets. For example: 172.20.110.0-255 matches all IP addresses in the 172.20.110.0/255.255.255.0 or 172.20.110.0/24 subnet 172.20.110.0-140.255 matches all IP addresses from 172.20.110.0 to 172.20.140.255 172.16.0.0-20.255.255 matches all IP addresses from 172.16.0.0 to 172.20.255.255)
Log rolling
Log rolling is a way to control the log file size and manage the FortiAnalyzer. You can configure the frequency of the log rolling and what to do with the log file when rolled. When a log file reaches its maximum size, the FortiAnalyzer unit saves the log files with an incremental number, and starts a new log file with the same name. For example, the current attack log is alog.log. Any subsequent saved logs appear as alog.n.log, where n is the number of rolled logs. To enable log rolling, go to Log > Config.
86
Logs
Log rolling
The maximum size of a log file that the FortiAnalyzer unit saves to the hard disk. When the log file reaches the specified maximum size, the FortiAnalyzer unit saves the current log file with an incremental number and starts a new active log file. Set the time of day, when the FortiAnalyzer unit saves the current log file and starts a new active log file. Select either Daily or Weekly. If you only want the FortiAnalyzer unit to roll log files when the file size is reached, select Optional. Select the type of uploading server. Select from: File Transfer Protocol (FTP) Secure File Transfer Protocol (SFTP) Secure Copy Protocol (SCP)
Enable log uploading Select to upload log files to an FTP server when a log file rolls. Server type
Server IP address Username Password Confirm Password Directory Upload Log files
Enter the IP address of the FTP server. Enter the user name to connect to the FTP server. The user name has a default of anonymous. Enter the password required to connect to the FTP server. Re-enter the password to ensure it is entered correctly. Enter a specific directory on the FTP server to save the log file. Select when the FortiAnalyzer unit uploads files to the FTP server. Select When rolled to upload as soon as the FortiAnalyzer unit rolls the log file, based on the settings above. Select a specific time of the day when the FortiAnalyzer unit rolls the log file. The FortiAnalyzer unit will upload at the configured time no matter what the size of the log file is or when it may be configured to roll to a new file.
Upload rolled files in Select to compress the content log files in gzipped format before uploading to the FTP server. gzipped format Delete files after uploading Select to remove the log file from the FortiAnalyzer hard disk once the FortiAnalyzer unit completes the upload.
87
Log rolling
Logs
88
Content archive
Content viewer
Content archive
A FortiGate unit can monitor and log metadata content for all users using email, FTP and Instant Messages. The metadata content includes information such as the senders and recipients of email and instant messages and the content of those messages. Using standard data filtering, you can track and locate specific email or messaging communications occurring on your network. For details on how to configure the FortiGate unit to send content archive information to the FortiAnalyzer unit, see the FortiGate Administration Guide. This section includes the following topics: Content viewer Customizing the content log view Log rolling
Content viewer
The content viewer displays metadata from devices connected to the FortiAnalyzer unit. Metadata includes where the information is coming from and going to. The content viewer enables you to view and filter on three content types: email FTP Instant Messaging conversations
To view content archive log information, go to the Content Archive menu, select the content to view. Each log type has a similar viewing controls.
Figure 31: Viewing file transfer logs Column Settings
Show Timeframe
Select the FortiGate device from the list. Select the time span for the log data you want to view.
89
Content archive
Select to view the client IP address as a real name. You must configure the IP aliases on the FortiAnalyzer for this setting to be effective. For details see IP Aliases on page 53. Note this option is not available when viewing the email content archive. Select a view of the content log file. Selecting Formatted (the default) displays the content log files in columnar format. Selecting Raw, displays the content log information as it actually appears in the content log file. Select the number of rows of log entries to display per page. Enter a page number to jump to in the log information. Press Enter to jump to the page. Select to change the columns to view and the order they appear on the page. For details see Customizing the log column views on page 90. Enter a keyword to perform a simple search on the available log information. Select Go to begin the search. The number of matches appears above the Search field.
Formatted | Raw
Search
To add or remove columns 1 2 When viewing a historical content log file, select Column Settings. A list of available columns for the log type appears. In the Show column, select or clear the check boxes for your column selections. To change the positioning of the columns 1 When viewing a historical content log file, select Column Settings. A list of available columns for the log type appears.
90
Content archive
Log rolling
2 3
Select a column name. Select the up and down arrows to change the position of the column in the list.
Filter icon
Filter in use
Each column of data includes a gray filter icon. Select the icon to filter the contents of the column. Enter the information you are looking for in the field provided and select OK.When a filter is applied to a column, the filter icon appears green. To turn off the filter, select the filter icon and select Reset Filter. When viewing real-time logs, you cannot filter on the time column because the time will always be the current time.
Filtering tip
When filtering by source or destination IP, you can use the following in the filtering criteria: a single address (2.2.2.2) an address range using a wild card (1.2.2.*) an address range (1.2.2.1-1.2.2.100) 1.1.1.1 or 2.2.2.2 1.1.1.1 or 2.2.2.* 1.1.1.1 or 2.2.2.1-2.2.2.10
You can also use the boolean operator "or" to indicate multiple choices:
Log rolling
Log rolling is a way to control the content log file size and space used on the FortiAnalyzer hard disk. You can configure the frequency of the log rolling and what to do with the content log file when rolled. As the FortiAnalyzer unit receives log messages, it performs the following tasks: verifies whether the log file has exceeded its file size limit if the file size is not exceeded, checks to see if it is time to roll the log file
91
Log rolling
Content archive
When a content log file reaches its maximum size, or reaches the scheduled log rolling time, the FortiAnalyzer unit saves the content log files with an incremental number, and starts a new content log file with the same name. For example, the current content log is clog.log. Any subsequent saved content logs appear as clog.n.log, where n is the number of rolled logs. For example, clog.4.log. To enable log rolling, go to Content Archive > Config.
Figure 34: Log rolling settings
Reuse Settings from Select to use the same settings that you set for standard log files, set in Log > Config. Standard Logs Log file should not exceed The maximum size of a content log file that the FortiAnalyzer unit saves to the hard disk. When the content log file reaches the specified maximum size, the FortiAnalyzer unit saves current content log file with an incremental number and starts a new active log file. Set the time of day, when the FortiAnalyzer unit saves the current content log file and starts a new active log file. Select Optional if you do not want to use this option.
Enable log uploading Select to upload content log files to an FTP server whenever a content log file rolls. Server type Select the type of uploading server. Select from: File Transfer Protocol (FTP) Server IP address Username Secure File Transfer Protocol (SFTP) Secure Copy Protocol (SCP)
Enter the IP address of the FTP server. Enter the user name required to connect to the FTP server. The user name has a default of anonymous. Click the field to enter a different user name. Enter the password required to connect to the FTP server. Re-enter the password to ensure it is entered correctly. Enter a specific directory on the FTP server to save the log file.
92
Content archive
Log rolling
Select when the FortiAnalyzer unit should upload files to the FTP server. Select When rolled to upload as soon as the FortiAnalyzer unit rolls the content log file, based on the settings above. Select a specific time of the day when the FortiAnalyzer unit rolls the content log file. The FortiAnalyzer unit will upload at the configured time no matter what the size of the log file is or when it may be configured to roll to a new file.
Upload rolled files in Select to compress the content log files in gzipped format before uploading to the FTP server. gzipped format Delete files after uploading Select to remove the content log file from the FortiAnalyzer hard disk once the FortiAnalyzer unit completes the upload.
93
Log rolling
Content archive
94
Quarantine
Quarantine
The FortiAnalyzer unit provides a repository for files quarantined by a FortiGate unit. These files are considered a threat to the network, suspicious or of a questionable nature. You can use the FortiAnalyzer quarantine support as a central management location for all suspicious files under quarantine.The communication between the two units is the same IPSec tunnel a FortiGate unit uses when sending log files.
Note: Sending quarantine files to the FortiAnalyzer unit is only available on FortiGate units running FortiOS 3.0.
This section describes how to configure the FortiAnalyzer unit to receive these quarantined files and view them on the FortiAnalyzer hard disk. For details on configuring the FortiGate unit to send quarantined files to the FortiAnalyzer unit, see the FortiGate Administration Guide. This section includes the following topics: Configuring quarantine settings Viewing the quarantined files list
95
Quarantine
Select a device from the list of available devices to display the list of quarantined files for a specific device, and select Go. Select a span of time when quarantined files were sent to the FortiAnalyzer unit and select Go. Select how often the quarantine page automatically updates. Select Refresh Now to update the status page immediately. Select a file from the list by selecting the check box next to the name and select Delete to remove the quarantined file from the FortiAnalyzer hard disk. Select a page number x from the list of pages y and press Enter to see the page. Select the number of quarantined files to view on a single page. The name of the device where the quarantined file originated. The processed file name of the quarantined file. The date and time the FortiGate quarantined the file, in the format yyyy/mm/dd hh:mm:ss. The time and date indicates the time that the first file was quarantined, if duplicate files are quarantined. The service where the file was quarantined (HTTP, FTP, IMAP, POP3, SMTP). A 32-bit checksum the FortiGate unit performed on the file. A short description of the reason why the FortiGate unit quarantined the file. Duplicate count. A count of how many duplicates of the same file were quarantined. A rapidly increasing number can indicate a virus outbreak. The file size of the quarantined file. Select Delete to remove the quarantined file from the FortiAnalyzer hard disk. Select Download to save the file to another location when it is deemed safe for the recipient to collect. Select Detail to view more information about the file including the date and time of the quarantine and the sender and intended recipient of the file.
Page n of n View..per page From Device File Name Date & Time
96
Forensic Analysis
Forensic Analysis
Forensic analysis provides a method of monitoring and reporting on individuals or groups of individuals on their internet traffic, email and Instant Messaging (IM) patterns within an organization. While the Reports and other log data also provide this information, the forensic analysis enables the administrator to narrow the information to specific individuals or groups of individuals. This section describes how to set up users and groups, search logs for user activity and how to generate and view analysis reports.
Note: The forensic analysis feature is not available on the FortiAnalyzer-100.
This section includes the following topics: Users and groups Searching user data Forensic Reports
Adding users
Add users to the FortiAnalyzer analysis list for tracking. When adding a user, you include their username, IP address, email address and IM names (if applicable). If you only know part of the information you want to add, use Lookup to find additional user information. For details on finding additional user information, see Lookup on page 98. To add a user to the forensic analysis list 1 2 3 Go to Forensic Analysis > Lookup > User. Select Create New. Enter the following information and select OK:
Name Username (in Logs) IP Address Email Address(es) Enter the name of the user. The name cannot include spaces. Enter the username as it will appear in the logs. Enter the IP address of the user. Enter the email address for the user and select Add. For completeness of the reports, add all known email addresses for the user. Enter the instant message name for the user if applicable and select Add. For completeness of the reports, add all known IM names.
IM Name(s)
97
Forensic Analysis
Creating groups
Create user groups to obtain analysis information for a selection of users, rather than running reports for a number of individuals. You must add individual users before you can add them to a group. To add a forensic analysis group 1 2 3 4 Go to Forensic Analysis > Lookup > Group. Select Create New. Enter the name of the group. Select the users from the Available Users list, and select the right arrow to add them to the group. To remove a member, select a user from the Members list on the right and select the left arrow. 5 Select OK.
Lookup
The Lookup provides a method of finding additional user information. For example, if you know the users email address, you can use the lookup to find the IP address or instant message user names. The User Lookup enables you to have a complete user information base for forensic analysis reports. To perform a user lookup, go to Forensic Analysis > Lookup > Lookup. The following table describes what information you can find when you have partial information.
Table 12: User lookup matrix Lookup IP address Username Email address IM name Using Username IP address IP address IP address Result Returns all IP addresses where defined username logged on. Returns all user names that logged on at the defined address. Returns all email originating from a defined address. Returns all IM names that logged on at a defined IP address.
98
Forensic Analysis
Lookup Username / IP Address Time frame All xx logged on yy within the last zz User Create User / Add to user
Select the information to look for in the log data. Depending on the Lookup selection, enter either the username or IP address to find the associated information. Select the time range in the logs that the FortiAnalyzer unit searches. A visual indication of what you have selected and its relationship to each other. Below this statement a list of available data will appear. Select the check box beside each entry to add the data to the user information. Select to add any of the results to an existing user in the forensic analysis user table. This button selection depends on whether you select a user from the list. Select Add to User when you select a user from the User list. The FortiAnalyzer unit adds the information selected from the results to the selected user information. Select Create User to use the information entered above and selected from the results, to create a new forensic analysis user entry.
99
Forensic Analysis
To enable these log types on the FortiGate unit 1 2 3 4 Go to Firewall > Protection Profile Select a protection profile. Select Logging. Select the activities to log and select OK.
After selecting Search, the FortiAnalyzer unit scans the content log data (data from the Content Archive from a FortiGate unit) on its hard disk for all information based on the criteria entered, and displays the number if results for each criteria.
Figure 37: Search results
Select View for the log information you want to view in detail. The search results open in a new browser window. Select download to save a specific log result to your local hard disk.
100
Forensic Analysis
Forensic Reports
To save the results 1 2 3 4 Select Save Archive. Enter a name for the search results. The name cannot include spaces. Enter a Description to identify what was included in the search results. Select Save.
Local archive
The local archive provides easy access to the forensic analysis searches that are saved on the FortiAnalyzer unit. To view the saved searches, go to Forensic Analysis > Search > Local Archive. Select the Archive file name to view the search results. Select Edit to change the archive name or description. Select Delete to remove the search archive from the FortiAnalyzer hard disk.
Forensic Reports
The FortiAnalyzer unit collates information collected from device log files and enables you to run reports for specific users or groups of user in tabular and graphical reports, similar to the network reporting functionality. The reports provide detailed information on a users website access, blocked web access, email and FTP and IM usage during a specific period on your network.
Configuring reports
Create a report configuration profile that defines what information appears on a report. Select the type of report, devices to include in the report, time frames to provide specialized reports. To configure a forensic analysis report profile 1 2 3 4 5 Go to Forensic Analysis > Report > Config. Select Create New. Enter a Report Name. The report name cannot include spaces. Enter a title and a description of what the report includes. Select the blue arrow next to the options you need to configure:
Properties Report Criteria Time Period Forensic Report Type(s) Output Select to add logos, headers, footers and company information to customize the report. Select the information you want to include in the report. Select the filtering information and time range for the reporting period. Select the reports to include. Select the file format for the reports.
Select OK.
101
Forensic Reports
Forensic Analysis
Enter the name of your company, department or branch. Enter a title or information to include in the header of the report. Select the information to include in the footer of the report: Select Report Title to use the title of the report entered in the first step of creating a new report profile. Select Custom to add your own information. Add a company logo to the title page of the report. Select Custom to locate the logo and select Upload to save it to the FortiAnalyzer hard disk for use in the report. Add a smaller company logo to the headers of the report. Select Custom to locate the logo and select Upload to save it to the FortiAnalyzer hard disk for use in the report.
Header Logo
When adding a logo to the report, consider the following table to ensure you select the correct logo format for the report created. If you select a logo that is not supported for a report format, the logo will not appear in the report.
Table 13: Report formats and supported logo formats PDF Reports RTF Reports HTML Reports PNG JPG, PNG, GIF and WMF All formats supported.
102
Forensic Analysis
Forensic Reports
Report Profile
Select to save the report profile for future reports or On Demand to use the report profile once. Once the FortiAnalyzer unit runs the report, the profile created is removed from the system. Select the type of analysis to include in the report, either user or device. Select a user from the list. Alternatively, select Specify and select an option from the Specify list. This setting is available when using the User Analysis Report Category. Select to generate a report based on a specific user name or IP address. This option becomes available when selecting Specify from the User selection. This setting is available when using the User Analysis Report Category. Depending on the selection from the Specify list, enter the appropriate information. This setting is available when using the User Analysis Report Category. Select to generate a report on a specific user group. This setting is available when using the User Analysis Report Category.
Specify
Group
Group Name (in logs) Enter a specific group name. This option becomes available when selecting Specify from the Group selection. This setting is available when using the User Analysis Report Category. Report Granularity Select the number of results for the report. This setting is available when using the User Analysis and Device Analysis Report Categories. Select a device or device group. This setting is available when using the User Analysis and Device Analysis Report Categories. Enter a virtual domain name for the report. This setting is available when using the Device Analysis Report Category.
Device(s)
Virtual Domains
Resolve Host Names Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names, see IP Aliases on page 53. Resolve Service Names FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925 Select to display network service names rather than port numbers. For example, HTTP rather than port 80.
103
Forensic Reports
Forensic Analysis
Select to include a roll up of the report contents. Select to include a table of contents for the report.
Select a time range the report will be focused on. Select the beginning date and time for the report. Select the ending date and time for the report.
104
Forensic Analysis
Forensic Reports
File output
Select the file format for the generated reports that are saved to the FortiAnalyzer hard disk. To access the reports on the hard disk, see Viewing Forensic Reports on page 106. Select from the following: HTML Adobe PDF MS Word format (RTF) ASCII Text Multi purpose Internet Mail Extension HTML format (MHT)
Email output
Select the file formats for the generated reports that the FortiAnalyzer unit sends as an email attachment. Select from the following: HTML Adobe PDF MS Word format (RTF)
ASCII Text Multi purpose Internet Mail Extension HTML format (MHT) Email subject Enter a subject to the email FortiAnalyzer sends. When not selected, the subject line is the name of the report. To select the Customize subject check box, you must select a file format from the Email output list. Enter the name for the report files included in the email. When you select multiple reports for the report profile, the FortiAnalyzer unit compresses all reports into a zip file. This option enables you to select the name for the zip file. Enter the text to include in the body of the email message. Enter an email address for the FortiAnalyzer unit or administrator requesting the report.
105
Forensic Reports
Forensic Analysis
Select the email server to use when the FortiAnalyzer unit sends the reports as an email attachment. Enter the email addresses of the recipients of the report. Add multiple recipients by pressing Enter after each email address. Addresses appear in the Email List.
Upload Report to FTP Select to upload completed report files to an FTP server. Server Server type Select the type of uploading server. Select from: File Transfer Protocol (FTP) IP address Username Password Directory Upload report(s) in gzipped format Delete file(s) after uploading Secure File Transfer Protocol (SFTP) Secure Copy Protocol (SCP)
Enter the IP address of the FTP server. Enter the user name to log onto the FTP server. Enter the password to log onto the FTP server. Enter the directory on the FTP server where the FortiAnalyzer unit saves the report files. Select to compress the report files as gzip files before uploading to the FTP server. Select to delete the report files from the FortiAnalyzer hard disk once the FortiAnalyzer unit completes the upload to the FTP server.
Rename Delete Delete Page n of n Report Files Start Time End Time Select to remove multiple reports. Before selecting Delete, select the check boxes for the reports you want to remove. Enter a page number to jump to. Press Enter to jump to the page. Displays the generated reports.Select the report name to view a the report in HTML format. indicates the date and time when the FortiAnalyzer unit generated the report. Indicates the date and time when the FortiAnalyzer unit completed the report. If the FortiAnalyzer unit is in the process of generating a report, a progress bar will appear in this column. The file size of the report. By default, the FortiAnalyzer unit create the report in HTML format. If you selected other formats when creating the report profile, they appear in this column. Select Delete to remove the report from the FortiAnalyzer hard disk. Select Rename to change the name of the report from the default created by the FortiAnalyzer unit.
Action
106
Traffic Summaries
Traffic Summaries
Traffic summaries are pre-defined reports that provide a snapshot of the traffic passing through the firewall on your network. The reports can help you identify who the high volume users and FortiGate units are that may be affecting overall network traffic. Hourly reports are updated every ten minutes, weekly, daily and monthly reports are updated every hour. These reports can help you in determining traffic flow issues and provide a basis for configuring traffic shaping on a FortiGate unit to better control traffic flow throughout the day. For details on traffic shaping, see the FortiGate Administration Guide. This section includes the following topics: Top Users Device Summary Traffic Report
Top Users
Top users enables you to view the users that create the most traffic for each service including web, email, FTP and IM/P2P. The tabular data presented shows the user, which firewall they are using and the amount of data traffic created.
107
Traffic Summaries
Select a time frame for viewing the web traffic. Select a device or group of devices.
Total Web activity for An overview of the amount of data, in megabytes, transferred via the web. the period View per page Page n of n Search Resolve Host Name Select the number of log messages displayed on each page. Enter the page number you want to display and press Enter. Enter a search criteria and select Go. Log entries with the search results appear in the list. Select to view a real name for the Host column rather than an IP address. For this feature to work correctly, you must set the IP aliases. For details see IP Aliases on page 53. The name of the FortiGate unit. The IP address of the FortiGate unit. The amount of data transferred through HTTP and HTTPS within the period. The date and time of the last email message. The number of downloads that occurred within the period. The number of uploads that occurred within the period.
Clicking the column headers sorts the information in ascending or descending order for that column.
Email activity within the last View View per page Page n of n Search Resolve Host Name
Select a time frame for viewing the web traffic. Select a device or group of devices. Select the number of log messages displayed on each page. Enter the page number you want to display and press Enter. Enter a search criteria and select Go. Log entries with the search results appear in the list. Select to view a real name for the Host column rather than an IP address. For this feature to work correctly, you must set the IP aliases. For details see IP Aliases on page 53. An overview of the amount of data, in megabytes, sent and received through email. The name of the FortiGate unit. The IP address of the FortiGate unit.
108
Traffic Summaries
The amount of data transferred through sent and received within the period. The date and time of the last email message. The number of outgoing email messages that occurred within the period. The number of incoming email messages that occurred within the period.
Clicking the column headers sorts the information in ascending or descending order for that column.
FTP activity within the last View View per page Page Search Resolve Host Name
Select a time frame for viewing the FTP traffic. Select a device or group of devices. Select the number of log messages displayed on each page. Enter the page number you want to display and press Enter. Enter a search criteria and select Go. Log entries with the search results appear in the list. Select to view a real name for the Host column rather than an IP address. For this feature to work correctly, you must set the IP aliases. For details see IP Aliases on page 53.
Total FTP activity for An overview of the amount of data, in megabytes, transferred. the period Firewall Host (Source) Traffic (MB) Last Activity Uploads Downloads The name of the firewall. The IP address of the firewall. The amount of data transferred within the period. The date and time of the last FTP transfer. The number of uploads that occurred within the period. The number of downloads that occurred within the period.
Clicking the column headers sorts the information in ascending or descending order for that column.
109
Traffic Summaries
IM activity within the Select a time frame for viewing the IM traffic. last View View per page Page Search Resolve Host Name Select a device or group of devices. Select the number of log messages displayed on each page. Enter the page number you want to display and press Enter. Enter a search criteria and select Go. Log entries with the search results appear in the list. Select to view a real name for the Host column rather than an IP address. For this feature to work correctly, you must set the IP aliases. For details see IP Aliases on page 53. An overview of the amount of data, in megabytes, transferred by IM. This includes messages and file transfers. The name of the firewall. The IP address of the firewall. The amount of data transferred with IM within the period. The date and time of the last instant message. The number of messages that were sent and received within the period. The number of file transfers that occurred within the period.
Total IM activity for the period Firewall Host (Source) Traffic (MB) Last Activity Messages File Transfers
Clicking the column headers sorts the information in ascending or descending order for that column.
Filter icon
Filter in use
Each column of data includes a gray filter icon. Select the icon to filter the contents of the column. Enter the information you are looking for in the field provided and select OK. When a filter is applied to a column, the filter icon appears green. To turn off the filter, select the filter icon and select Reset Filter.
110
Traffic Summaries
When viewing real-time logs, you cannot filter on the time column because the time will always be the current time.
Filtering tip
When filtering by source or destination IP, you can use the following in the filtering criteria: a single address (2.2.2.2) an address range using a wild card (1.2.2.*) an address range (1.2.2.1-1.2.2.100) 1.1.1.1 or 2.2.2.2 1.1.1.1 or 2.2.2.* 1.1.1.1 or 2.2.2.1-2.2.2.10
You can also use the boolean operator "or" to indicate multiple choices:
Device Summary
The device summary provides a graphical analysis of the network traffic by FortiGate unit. The summary provides graphical details in real-time for all FortiGate units, by group or individually. All FortiGate units appearing must be properly registered with the FortiAnalyzer unit. The device summaries include: Protocol distribution - the overall protocol traffic and breakdown by upload and download traffic. Web and FTP - traffic by host, top FTP and web server and volume. Email - top SMTP, POP3 and IMAP servers and top email sender activity. Multimedia - top RTSP and MMS server activity.
To view the device summary graphs, go to Network Summary > Device Summary.
Figure 48: Viewing protocol distribution
111
Traffic Summaries
Select a device or device group. Select the time span to display on the graphs.
Traffic Report
The traffic report enables you to generate a report to aggregate all the traffic summary information rather than viewing the pages in Realtime Analysis > Top Users individually. Similar to the log reports and forensic analysis, the FortiAnalyzer unit generates a report and saves it on the FortiAnalyzer hard disk for viewing and distribution.
Displays the generated reports. indicates the date and time when the FortiAnalyzer unit generated the report. Indicates the date and time when the FortiAnalyzer unit completed the report. If the FortiAnalyzer unit is in the process of generating a report, a progress bar will appear in this column. Displays the report formats available, based on the selection from the report configuration. Select the format to view the report. Select Delete to remove the report from the FortiAnalyzer hard disk.
Formats Action
112
Engine Type Ignore hosts that have less than n incidents Ignore hosts whose traffic is less than n MB
113
Delete Edit Run report View report Report Engine Frequency Devices/Groups Threshold The name of the report. The FortiAnalyzer unit includes three default report engines for Virus, Intrusion and Suspicious. The time when the FortiAnalyzer unit runs a report. The device or group of device logs the FortiAnalyzer unit uses when generating the report. Indicates the maximum number of times a host has attempted to attack or infect users on the network before it is included in the report. For a virus event, it also indicates the amount of traffic in megabytes that is acceptable from a single source before it is considered a virus event. The Traffic threshold is only available on Suspicious event reports. Select Delete to remove the report name. Note that the Virus, Intrusion and Suspicious reports are included by default. You cannot delete these reports from the FortiAnalyzer unit. Select Edit to modify the configuration of the report. Select Go to run the report immediately. Select View to view the report results. Select to add a new event correlation report.
Action
Create New
Details Acknowledge
114
Virus activity within the last View Firewall Host (Source) Virus Last Activity Count Action
Select the time frame to view the virus activity. Select a device or group of devices. The name of the firewall. The source IP address of the firewall. The name of the virus. The date and time of the last incident of the virus. The number of incidents made by the virus on the network. Select Details to display additional information for the entry. The details window displays further details of the virus incidents including time and date, target and protocol attempt. Select Acknowledge to reset the attack count to zero for the virus. This enables you to verify if the firewall has new virus incidents, as well as watch the number of incidents occurring.
Details Acknowledge Intrusion activity within the last View Firewall Host (Source) Attack Name Select the time frame to view the virus activity. Select a device or group of devices. The name of the firewall. The source IP address of the firewall. The name of the intrusion event The attack name is a link to the FortiGuard Center. Selecting the link opens the FortiGuard web site and displays information on the attack from the FortiGuard database. The date and time of the last intrusion incident.
Last Activity
115
Count Action
The number of intrusion incidents on the network. Select Details to display any additional information for the entry. The details window displays further details of the virus incidents including time and date, target and protocol attempt. Select Acknowledge to reset the attack count to zero for the intrusion counter. This enables you to verify if the firewall has new intrusion incidents as well as watch the number of incidents occurring.
The FortiAnalyzer unit reviews the Traffic and Session information of the selected FortiGate units to see the average traffic pattern. The top 30 IP addresses with traffic that is above average will be considered under suspicion of being viral, and are included in the report. This can include a high number of sessions to a device, or the sending of unusually high quantity of email traffic. The report provides you with easy access to the state of the traffic usage on the network. For details on configuring the suspicious activity correlation, see Adding a security event report on page 113. To view intrusion activity, go to Network Summary> Suspicious Activities.
Figure 53: Viewing Suspicious activity
Details Acknowledge Intrusion activity within the last View Traffic Usage Total traffic Firewall Host (Source) Usage (MB) Select the time frame to view the virus activity. Select a device or group of devices. Enter the top number of firewall devices to include in the traffic usage report. The FortiAnalyzer will report on up to 30 addresses. The total amount of data travelling through all firewalls listed. The name of the firewall. The source IP address of the firewall. The amount of data in megabytes travelling through the firewall.
116
Last Activity Action Session Usage Firewall Host (Source) Last Activity Action
The date and time of the last incident of the virus. Select Acknowledge to reset the session count to zero. Select Details to display the traffic generated by the IP address. Enter the top number of firewall devices to include in the session usage report. The FortiAnalyzer will report on up to 30 addresses. The name of the firewall. The source IP address of the firewall. The date and time of the last high session activity. Select Acknowledge to reset the session count to zero. Select Details to display further details regarding the IP address use.
Number of Sessions The number of incidents made by the virus on the network.
Number of Sessions The number of incidents made by the virus on the network.
Details Acknowledge Select the time frame to view the administrative activity. Administrative activity within the last View Firewall User Last Action Last Activity Count Action Select a device or group of devices. The name or serial number of the FortiGate unit. The user name of the last administrative user to perform an administrative task on the unit. The administrative function performed by the user. The date and time when the user performed the administrative action. The number of administrative activities logged for the FortiGate unit. Select Details to display any additional information for the entry. The details window displays further details of the administrative events. Select Acknowledge to reset the attack count to zero for the administrative activities. This enables you to monitor events on a regular basis if required.
117
118
Reports
Configuring reports
Reports
The FortiAnalyzer unit collates information collected from device log files and presents the information in tabular and graphical reports. The reports provide detailed information on the type of traffic, attacks and preventative actions that occurred during a specific period on your network. Using reports you can: manage your network more effectively and to make informed decisions view network usage and patterns discover and address vulnerabilities across dispersed device installations minimize the effort required to monitor and maintain acceptable user policies, identify attack patterns and prevent attacks monitor Internet surfing patterns for compliance with company policy identify visitors to your web site for potential customers Configuring reports Browsing reports
Configuring reports
Create a report configuration profile that defines what information appears on a report. Select the type of report, devices to include in the report and time frames to provide specialized reports. To configure a report profile, go to Report > Config.
119
Configuring reports
Reports
Delete Edit Clone Run Report Create New # Report Device(s) Schedule Action Select to create a new report profile and configure its settings and schedule. The number of report profiles on the FortiAnalyzer unit. The name of the report profile. The device or device group included in the configured report profile. The scheduled frequency when the FortiAnalyzer unit generates the report. Select Delete to remove the configured report. Select Edit to modify the report configuration. Select Clone to create a duplicate of a report to use as a starting point for a new report profile. Select Go to run a report profile at any time (on demand). Select Go when you do not have a scheduled time for the FortiAnalyzer unit to run a report.
120
Reports
Configuring reports
Select to run the report immediately after configuration (on demand) or run the report at configured intervals. When selecting an on demand report, the FortiAnalyzer unit does not save the report profile after the generating the report.
5 6
Enter a Report Title and Description. Select the blue arrow next to the options you need to configure:
Properties Devices Report Scope FortiGate Report Type(s) Report Format Schedule Output Select to add logos, headers, footers and company information to customize the report. Select the devices or groups of devices to include in the report. Select the filtering information and time range for the reporting period. Select the reports to include. Select how the report information is displayed in the report, by device or for all devices. Configure when the FortiAnalyzer unit runs the report, for example, weekly, or monthly. Select the file format for the reports.
Select OK.
Enter the name of your company, department or branch. Enter a title or information to include in the header of the report. Select the information to include in the footer of the report: Select Report Title to use the title of the report entered in the first step of creating a new report profile. Select Custom to add your own information. Add a company logo to the title page of the report. Select Custom to locate the logo and select Upload to save it to the FortiAnalyzer hard disk for use in the report. Add a smaller company logo to the headers of the report. Select Custom to locate the logo and select Upload to save it to the FortiAnalyzer hard disk for use in the report.
Header Logo
When adding a logo to the report, consider the following table to ensure you select the correct logo format for the report created. If you select a logo that is not supported for a report format, the logo will not appear in the report.
121
Configuring reports
Reports
Table 14: Report formats and supported logo formats PDF Reports RTF Reports HTML Reports PNG JPG, PNG, GIF and WMF All formats supported.
Select a time range the report will be focused on. Select the beginning date and time for the report. Select the ending date and time for the report.
Select the blue arrow to expand the Data Filter options. Filtering enables you to view or remove information from a report to provide a more concise report. For example, you only want reports on specific error messages, or you do not want include certain IP address destinations.
122
Reports
Configuring reports
Filter logs
Select None to not apply a filter to the logs in the report. Select Include logs that match of the following criteria to customize the filtering. Select the matching criteria for the filter. Select all to include logs in the report that match all filter settings. If information within a log does not match all the criteria, the FortiAnalyzer unit will not include the log in the report. Select any to include logs in the report that match any of the filter settings. If any of the filter content, even one filter setting, matches information in a log file, the FortiAnalyzer unit includes the log in the report. Select the check box to enable the priority level filter options. Set the priority level to look for in the logs and set whether the information should be less than, greater than or equal to the priority level. Enter the source IP address for the matching criteria. Use the Alias list to select sources by name. For details on adding IP Aliases, see IP Aliases on page 53. Use a comma to separate multiple sources. Select Not to exclude the source IP address from the report. For example, do not include any information from a specific source IP address in the log report. Enter the destination IP address for the matching criteria. Use the Alias list to select sources by name. For details on adding IP Aliases, see IP Aliases on page 53. Use a comma to separate multiple sources. Select Not to exclude the destination IP address from the report. For example, do not include any information from a specific destination IP address in the log report. You can filter on IP ranges, including subnets to report on groups within the company. For example: 172.20.110.0-255 filters all IP addresses in the 172.20.110.0/255.255.255.0 or 172.20.110.0/24 subnet 172.20.110.0-140.255 filters all IP addresses from 172.20.110.0 to 172.20.140.255 172.16.0.0-20.255.255 filters all IP addresses from 172.16.0.0 to 172.20.255.255)
Priority
Source(s)
Destination(s)
Interface(s)
Enter the FortiGate interface you want to include in the report. Separate multiple interface names with a comma. Select Not to exclude the interface information from the report. For example, do not include any information from a specific interface in the log report. Enter the user names to include in the report. Separate multiple user names with a comma. Enter the user groups to include in the report. Separate multiple groups with a comma. User groups are configured on the FortiGate unit. Enter the virtual domains (VDOM) to include in the report. Separate multiple VDOMs with a comma. Select Not to exclude the VDOM from the report. For example, do not include any information from a specific VDOM in the log report. Enter the firewall policy ID numbers to include in the report. The report will include the traffic information from the FortiGate firewall policies in the logs. Separate multiple policy IDs with a comma.
User(s) Group(s)
Virtual Domain(s)
Policy ID(s)
123
Configuring reports
Reports
Service(s)
Enter specific services to include in the report. Separate multiple services with a comma. Select Not to exclude the service from the report. For example, do not include any information from a specific service in the log report. Enter specific email messages you want the report to include from the email reports. Separate multiple messages with a comma. Select the days of the week that the information is pulled from the log files to include in the report.
Report Results
Select how the data for the report will be presented. Select to have the data appear collectively for all devices or for each device separately. If no selection is made, the FortiAnalyzer will generate reports for all devices by default.
Resolve Host Names Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names, see IP Aliases on page 53. Resolve Service Names Include Summary Information Include Table of Contents Select to display network service names rather than port numbers. For example, HTTP rather than port 80. Select to include a roll up of the report contents. Select to include a table of contents for the report.
124
Reports
Configuring reports
For some report types, you can set the top ranked items for the report. These reports have Top in their name, and will always display only the top n entries. For example, report on the most active mail clients within the organization rather than all mail clients. Reports that do not include Top in their name will always display all information. Changing the values for top field will not affect these reports.
Select to not generate a daily report. Use this setting when you only want to run the reports as needed. Select to generate the report every day at the same time. Select specific days of the week to generate the report. Select specific days of the month to generate the report. For example, to generate the report on the first and fifteenth of every month, enter 1,15. Select the time of the day when the FortiAnalyzer generates the report.
Time
125
Configuring reports
Reports
File output
Select the file format for the generated reports that are saved to the FortiAnalyzer hard disk. To access the reports on the hard disk, see Viewing reports on page 128. Select from the following: HTML Adobe PDF MS Word format (RTF) ASCII Text Multi purpose Internet Mail Extension HTML format (MHT)
Email output
Select the file formats for the generated reports that the FortiAnalyzer unit sends as an email attachment. Select from the following: HTML Adobe PDF MS Word format (RTF) ASCII Text Multi purpose Internet Mail Extension HTML format (MHT)
Email subject
Enter a subject to the email FortiAnalyzer sends. When not selected, the subject line is the name of the report. To select the Customize subject check box, you must select a file format from the Email output list. Enter the name for the report files included in the email. When you select multiple reports for the report profile, the FortiAnalyzer unit compresses all reports into a zip file. This option enables you to select the name for the zip file. Enter the text to include in the body of the email message.
126
Reports
Browsing reports
Enter an email address for the FortiAnalyzer unit or administrator requesting the report. Select the email server to use when the FortiAnalyzer unit sends the reports as an email attachment. Enter the email addresses of the recipients of the report. Add multiple recipients by pressing Enter after each email address. The addresses appear in the Email list box.
Upload Report to FTP Select to upload completed report files to an FTP server. Server Server type Select the type of uploading server. Select from: File Transfer Protocol (FTP) IP address Username Password Directory Upload report(s) in gzipped format Delete file(s) after uploading Secure File Transfer Protocol (SFTP) Secure Copy Protocol (SCP)
Enter the IP address of the FTP server. Enter the user name to log onto the FTP server. Enter the password to log onto the FTP server. Enter the directory on the FTP server where the FortiAnalyzer unit saves the report files. Select to compress the report files as gzip files before uploading to the FTP server. Select to delete the report files from the FortiAnalyzer hard disk once the FortiAnalyzer unit completes the upload to the FTP server.
Browsing reports
Use the FortiAnalyzer web-based manager to view a list of the generated reports. To view generated reports, go to Report > Browse.
Figure 62: Browse generated reports
Refresh
Select to refresh the list. If the FortiAnalyzer unit is in the process of generating a report, use Refresh to update the status of the report generation. Select the reports from the listing by selecting the check box next to the report name. Select the reports based on the type of device included in the report.
127
Browsing reports
Reports
Page Navigation
Enter a page number to display reports when a report list spans multiple pages. Select Go to move to the page. Use the page forward and page back arrows to navigate through individual pages. Select to view an example of a report generated by the FortiAnalyzer unit. Displays the generated reports. Select the report name to view a roll up of all reports in HTML format. The report appears in the reports list with the report name, date and time the report was generated. For example, a report name of Report 1-2006-03-31-2112, is a report called Report 1, generated on March 31, 2006 at 9:12pm. Select the blue arrow to expand the report to view the individual reports in HTML format. Indicates the date and time when the FortiAnalyzer unit generated the report. Indicates the date and time when the FortiAnalyzer unit completed the report. If the FortiAnalyzer unit is in the process of generating a report, a progress bar will appear in this column. The file size of the report in HTML format. The generated reports are available in HTML, PDF, RTF and ASCII text formats, depending on the output configuration. For details on setting output options, see Configuring the report output on page 125. Select a file format to view the generated report. Select Edit to rename the roll up report. Select Delete to remove the report from the FortiAnalyzer hard disk.
Started Finished
Size (bytes)
Viewing reports
To view a generated report 1 2 Go to Report > Browse. In the Report files column, select a report group from the list and do one of the following: Select the report name to view a roll up report of all individual reports. Select the blue triangle to expand the individual report list, and select to view an individual report. In the Other Formats column, select a file format for a report from the list.
Default reports
When registering a FortiGate unit that is running firmware version 3.0 or higher, a default report profile will automatically be created. This version of the firmware enables the FortiGate administrator to view all reports created by the FortiAnalyzer unit for the FortiGate unit, as well as modify and update the default report profile. The default profile uses the naming convention of Default_<FortiGate Serial Number>. You cannot delete the default report profiles. You are also unable to modify the default report profile. Only the FortiGate administrator can modify this type of report profile. The FortiGate administrator has limited capabilities when a updating report profile. For example, they cannot customize the header and footer information, or add logos to the reports.
128
Reports
Browsing reports
For details on report customization within the FortiGate unit, see the Log&Report chapter in the FortiGate Administrators Guide.
Report types
There are two types of the report that you can browse and view: Roll up report Individual reports
Roll up report
The roll up report contains all reports that you selected for the FortiAnalyzer unit to generate and presents it as a roll up report with all individual reports included. To view a roll up report 1 2 Go to Report > Browse and select a report name. Select a report category to expand the list of report sub-categories. Selecting a report name in the left frame displays the report in the right frame. Roll up reports are only available in HTML format.
Individual reports
Individual reports have the same look and functionality as the roll up reports when viewing the HTML file format. When you view the report in one of the alternate formats, only the right frame with the report information is included. To view individual reports 1 2 3 Go to Report > Browse. Select the blue arrow for a report name to view the individual reports. Select the report you want to view in HTML format, or select a file format in the Other Formats column.
129
Browsing reports
Reports
06 07 30
auth Firewall authentication event pattern Pattern update event chassis FortiGate-4000 and FortiGate-5000 series chassis event
Table 16: FortiGate 3.0 log subtypes Subtype number 00 01 02 03 04 05 06 07 23 29 32 33 34 Subtype system System activity event ipsec IPSec negotiation event dhcp DHCP service event ppp L2TP/PPTP/PPPoE service event admin admin event ha HA activity event auth Firewall authentication event pattern Pattern update event alert email Alert email notifications chassis FortiGate-4000 and FortiGate-5000 series chassis event sslvpn user - ssl vpn user event sslvpn admin - ssl vpn administrator event sslvpn session - ssl vpn session event
130
Alerts
Alert Events
Alerts
Alerts provide a method of informing you of issues arising on a FortiGate unit on your network or the FortiAnalyzer unit itself, such as system failures or network attacks, enabling you to react in a timely manner to the event. You configure the FortiAnalyzer unit alert conditions, instructing the FortiAnalyzer unit what devices and what log messages to monitor, and what to do in the event a log message appears meeting the alert conditions.
Alert Events
Alert events are the definitions the FortiAnalyzer unit monitors for when receiving log message packets from registered devices. Configure the alert events that the FortiAnalyzer unit monitors for and what it should do when encountering the alert. To view configured alert events, go to Alert > Alert Event.
Figure 63: Alert events list
Delete Edit Create New Delete Name Devices Triggers Destination Select to add a new alert event. Select to remove multiple alert events from the table. To do this, select the check box next to the alert events and select Delete. The name given to the alert event. The devices the FortiAnalyzer unit is monitoring for the alert event. The log message packets the FortiAnalyzer unit is monitoring for the alert event. The location where the FortiAnalyzer unit sends the alert message. This can be an email address, SNMP Trap or syslog server. Select Delete to remove the alert event. Select Edit to change the alert event configuration.
Action
131
Output
Alerts
Trigger(s)
Select to add a standard text response for the alert notification. Set the threshold or log message level frequency that the FortiAnalyzer unit monitors for before sending an alert message. For example, set the FortiAnalyzer unit to send an alert only after it receives five emergency messages in an hour. Select where the FortiAnalyzer unit sends the alert message. Select an email address, SNMP trap or Syslog server from the list. You must configure the SNMP traps or Syslog server, before you can select them from the list. For the FortiAnalyzer unit to send an email message, you must configure a DNS server and mail server account. For details see Mail server on page 133. For details on configuring SNMP traps, see SNMP access on page 133. For details on configuring Syslog servers, see Syslog Servers on page 134.
From Email Address When configuring the FortiAnalyzer unit to send an email address, enter an originator email address. To Email Address Add Delete When configuring the FortiAnalyzer unit to send an email alert message, enter the recipients of the email message. Select Add to add the destination for the alert message. Add as many recipients as required. Select a recipient from the Destination list and select Delete to remove a recipient.
Include Alert Severity Select the alert severity value to include in the outgoing alert message information.
Output
When the FortiAnalyzer unit receives a log messages meeting the alert event conditions, it sends an alert message as an email, syslog message or SNMP Trap, informing an administrator of the issue and where it is occurring. The FortiAnalyzer unit enables you to configure where it sends the alert message. The FortiAnalyzer unit can send an alert message to an email address via SMTP, a Syslog server or as an SNMP Trap.
132
Alerts
Output
Mail server
When configuring the FortiAnalyzer unit to send email alert messages, you need to configure a DNS server and an SMTP server. The FortiAnalyzer unit uses the SMTP server name to connect to the mail server, and must look up this name on your DNS server. To configure a DNS server, see DNS on page 38.
Note: When smtp send mail fails, the FortiAnalyzer unit will attempt to send a message every ten seconds and never stop until it succeeds in sending the message or the administrator reboots the unit. Figure 64: Mail server list
To configure mail server 1 2 3 Go to Alert > Output > Mail Server. Select Create New. Set the following options and select Apply.
Enable Authentication SMTP Server Email Account Select the Authentication Enable check box to enable SMTP authentication. When set, you must enter a email user name and password for the FortiAnalyzer to send an email with the account. The name/address of the SMTP email server. Enter the user name for logging on to the SMTP server to send alert mails. You only need to do this if you have enabled the SMTP authentication. The account name must be in the form of an email address. For example, [email protected]. Enter the password for logging on to the SMTP server to send alert email. You only need to do this if you selected SMTP authentication.
Password
SNMP access
Configure the SNMP server where the FortiAnalyzer unit sends SNMP traps when encountering an alert. You must add the SNMP server before you can select it as a way for the FortiAnalyzer unit to communicate an alert. For a list of supported MIBs and traps see FortiAnalyzer traps on page 136. To view the SNMP servers, go to Alert > Output > SNMP Access List.
133
Output
Alerts
Delete Edit Test Create New Name Community Name IP or FQDN Select to add a new SNMP server. The name given to the SNMP server. The community name for the SNMP server. The IP address or fully qualified domain name for the SNMP server. Select Delete to remove the SNMP server configuration. Select Edit to change the SNMP server configuration. Select Test to verify the SNMP server configuration.
Send system traps to Select an inputted trap from SNMP server from the list. Action
Use the Access List to identify where the SNMP server is located and the administrator for the server.
IP address (or FQDN) Enter the IP address or fully qualified domain name for the SNMP server.
Syslog Servers
Configure the syslog servers where the FortiAnalyzer unit sends log messages.You must add the syslog server before you can select it as a way for the FortiAnalyzer unit to communicate an alert. To view the SNMP servers, go to Alert > Output > Syslog Server.
134
Alerts
Output
Delete Edit Test Create New Name IP or FQDN: Port Action Select to add a new Syslog server. The name given to the Syslog server. The IP address or fully qualified domain name for the SNMP server, and port number. Select Delete to remove the Syslog server configuration. Select Edit to change the Syslog server configuration. Select Test to verify the Syslog server configuration.
135
Output
Alerts
Your SNMP manager might already include standard and private MIBs in a compiled database that is ready to use. You must add the Fortinet proprietary MIB to this database. If the standard MIBs used by the Fortinet SNMP agent are already compiled into your SNMP manager you do not have to compile them again.
FortiAnalyzer traps
The FortiAnalyzer unit can send traps to SNMP managers that you have added to SNMP communities. To receive traps, you must load and compile the Fortinet 3.0 MIB into the SNMP manager. The FortiAnalyzer unit supports the following MIBs and traps:
Fortinet Options
fnOptIdleTimeout fnOptLanguage
FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925
136
Alerts
Output
137
Output
Alerts
138
Network Analyzer
Network Analyzer
The FortiAnalyzer unit extends its log and report functionality with a network traffic sniffer that captures activity occurring on your network, using a dedicated port on the FortiAnalyzer unit. The FortiAnalyzer network analyzer enables you to reach areas of the network where FortiGate firewalls are not employed, or if you do not have a FortiGate unit as a firewall. The FortiAnalyzer network analyzer functions as a sniffer to capture traffic data, save it to the FortiAnalyzer hard disk and display it or generate reports using the data. This section describes how to enable and view network activity in real time as well as view historical logs of network traffic activity. It also describes log storage configuration options.
Note: The network analyzer feature is not available on the FortiAnalyzer-100. The network analyzer feature requires a dedicated port to connect to the span or mirror port of a network switch.
This section includes the following topics: Connecting the FortiAnalyzer for analyzing network traffic Traffic viewer Browsing network traffic logs Customizing the traffic analyzer log view Search the network traffic logs Log rolling
2 3 4 5
139
Traffic viewer
Network Analyzer
Traffic viewer
The traffic viewer provides a real-time and historical display of network activity when connected to a network switch. The Traffic Viewer has two types of viewing options: Real-time view displays traffic packets as the traffic packets are sent through the switch. The display refreshes every 10 seconds to display the most current activity. Historical view provides a way to view network traffic logs by focusing on specific time frames.
Select to stop the traffic sniffing. When selected, Stop changes to Start. Select Start to continue the real-time traffic viewing. Select to change the columns to view and the order they appear on the page. For details see Customizing the log column views on page 145. Select a view of the network traffic log file. Selecting Formatted (the default) displays the network traffic log files in columnar format. Selecting Raw, displays the network traffic log information as it actually appears in the log file.
Formatted | Raw
Resolve Host Names Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names see IP Aliases on page 53. Resolve Service Names Log Time Source Destination Destination Port Protocol Message Select to display network service names rather than port numbers. For example, HTTP rather than port 80. The date and time the packet was transmitted. The IP address of the sender of the packet. The IP address of the recipient of the packet. The port a UDP or TCP packet was being sent to. The protocol used when sending the packet. Information on the packet sent through the switch.
140
Network Analyzer
Traffic viewer
The type of log you are viewing. Select to change the log time frame. Select a view of the network traffic log file. Selecting Formatted (the default) displays the network traffic log files in columnar format. Selecting Raw, displays the network traffic log information as it actually appears in the log file.
Resolve Host Names Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names see IP Aliases on page 53. Resolve Service Names View per page Page n of n Column Settings Select to display network service names rather than port numbers. For example, HTTP rather than port 80. Select the number of rows of log entries to display per page. Enter a page number to jump to in the log information. Select Go to jump to the page. Select to change the columns to view and the order they appear on the page. For details see Customizing the log column views on page 145. Enter a keyword to perform a simple search on the log information available. Select Go to begin the search. The number of matches appears above the Search field.
Search
141
Network Analyzer
Printable Version
Select to generate a report that captures the current log messages. The web browser prompts you to save the report file for viewing or printing. The report saved is in HTML format. Note that large log messages can take a long time to load. The printable version takes all filter settings into account when generating a printable version. The date and time the packet transmitted. The IP address of the sender of the packet. The IP address of the recipient of the packet. The destination port for the packet. The protocol used when sending the packet. Information on the packet sent through the switch.
Select OK.
142
Network Analyzer
Delete Download Display Log files Last Modified Size (bytes) Action A list of log files on the FortiAnalyzer unit. The last time the log was updated from the device. The size of the log file. Select Delete to remove the log file from the FortiAnalyzer hard disk. Select Download to save the log file to your local hard disk. Select Display to view the contents of the log file.
The type of log you are viewing. Select to view a different log. Select a view of the network traffic log file. Selecting Formatted (the default) displays the network traffic log files in columnar format. Selecting Raw, displays the network traffic log information as it actually appears in the log file.
143
Network Analyzer
Resolve Host Names Select to display host names by a recognizable name rather than IP addresses. For details on configuring IP address host names, see IP Aliases on page 53. Resolve Service Names Previous/Next icons View per page Page n of n Column Settings Select to display network service names rather than port numbers. For example, HTTP rather than port 80. Select to move to the next or previous displayed page in the log information. Select the number of rows of log entries to display per page. Enter a page number to jump to in the log information. Select Go to jump to the page. Select to change the columns to view and the order they appear on the page. For details, see Customizing the log column views on page 145. Enter a keyword to perform a simple search on the log information available. Select Go to begin the search. The number of matches appears above the Search field. Select to generate a report that captures the current log messages. The web browser prompts you to save the report file for viewing or printing. The report saved is in HTML format. Note that large log messages can take a long time to load. The printable version takes all filter settings into account when generating a printable version. The date and time the packet was transmitted. The port number where the packet originated. The IP address of the recipient of the packet. The destination port for the packet. The protocol used when sending the packet. Information on the packet sent through the switch.
Search
Printable Version
The web browser prompts you for a location to save the file.
144
Network Analyzer
Filter icon
Each column of data includes a gray filter icon. Select the icon to filter the contents of the column. Enter the information you are looking for in the field provided and select OK. When a filter is applied to a column, the filter icon appears green. To turn off the filter, select the filter icon and select Reset Filter. When viewing real-time logs, you cannot filter on the time column because the time will always be the current time.
145
Network Analyzer
Filtering tip
When filtering by source or destination IP, you can use the following in the filtering criteria: a single address (2.2.2.2) an address range using a wild card (1.2.2.*) an address range (1.2.2.1-1.2.2.100) 1.1.1.1 or 2.2.2.2 1.1.1.1 or 2.2.2.* 1.1.1.1 or 2.2.2.1-2.2.2.10
You can also use the boolean operator "or" to indicate multiple choices:
Basic search
The basic search performs a simple search of the network traffic log files on the FortiAnalyzer unit. The FortiAnalyzer unit maintains a search history for reference should you need to use the search keywords again. To perform a search, go to Tools > Network Analyzer > Search. Enter the keywords for the search and select Search. Separate multiple keywords with a space. For example:
Search for IP address Search for Information 10.10.10.1 arp who-has 10.10.10.1
Advanced search
The advanced search provides a more robust search facility, with more options to narrow your search criteria. To perform an advanced search, go to Tools > Network Analyzer > Search, and select Advanced search. The search is case-insensitive. Use the * character as a wild card.
Figure 72: FortiAnalyzer advanced search
146
Network Analyzer
Log rolling
Search Basic search Find results with all of the words Find results with at least one of the words Find results without the words Return log entries dated within
Select to begin searching the logs Select to return to the basic search. Enter the keywords you want to use in your search. The FortiAnalyzer search engine will return all network traffic log entries that contain all keywords entered. Separate keywords with a space. Enter all the keywords you want to use in your search. The FortiAnalyzer search engine will return all network traffic log entries that contain one or more of the keywords. Separate keywords with a space. Enter the keywords that you do not want included in your search results. If a network traffic log entry contains the keywords you are searching on and includes a keyword from this field, the log entry will not be included in the search results. Select a time frame of the log entries to search within.
Search tips
The FortiAnalyzer search feature includes a robust search index that enables you to find any information by including specific information in your search criteria. Consider the following when searching the logs: The search is case-insensitive, that is, case is not considered. Use the * character as a wild card. For any partial term or IP address, enter as much as you can and use the * to search on all terms related to what you entered. You can search for IP ranges, including subnets. For example: 172.20.110.0-255 matches all IP addresses in the 172.20.110.0/255.255.255.0 or 172.20.110.0/24 subnet 172.20.110.0-140.255 matches all IP addresses from 172.20.110.0 to 172.20.140.255 172.16.0.0-20.255.255 matches all IP addresses from 172.16.0.0 to 172.20.255.255)
Log rolling
Log rolling is a way to control the network traffic log file size and space used on the FortiAnalyzer hard disk. You can configure the frequency of the log rolling and what to do with the network traffic log file when rolled.
147
Log rolling
Network Analyzer
As the FortiAnalyzer unit receives network log records, it performs the following tasks: verifies whether the log file has exceeded its file size limit if the file size is not exceeded, checks to see if it is time to roll the log file. You configure the time to be either a daily or weekly occurrence, and when the roll occurs.
When a network traffic log file reaches its maximum size, or reaches the scheduled log rolling time, the FortiAnalyzer unit saves the network traffic log files with an incremental number, and starts a new log file with the same name. For example, the current network traffic log is xlog.log. Any subsequent saved network traffic logs appear as xlog.n.log, where n is the number of rolled logs. For example, xlog.4.log To enable log rolling, go to Tools > Network Analyzer > Config.
Figure 73: Log rolling settings
Select the port on the FortiAnalyzer unit to use for monitoring network traffic.
Allocated Disk Space Enter the amount of disk space reserved for network traffic logs. The dialog also displays the amount used of the allocated space. (MB) When Allocated Disk Select what the FortiAnalyzer unit does when the allocated disk space is filled up. Select to either overwrite the older log file or Space is All Used stop logging until you can clear some room. To avoid completely filling the hard disk space, use the log rolling and uploading options. Reuse settings from standard logs Log rolling settings Select to use the same settings that you set for standard logs files configured in Logs > Config. Use this area to define when the FortiAnalyzer unit should roll its network traffic log files.
148
Network Analyzer
Log rolling
The maximum size of a network traffic log file that the FortiAnalyzer unit saves to the hard disk. When the network traffic log file reaches the specified maximum size, the FortiAnalyzer unit saves current network traffic log file with an incremental number and starts a new active log file. Set the time of day, when the FortiAnalyzer unit saves the current network traffic log file and starts a new active log file. Select Optional if you do not want to use this option.
Enable log uploading Select to upload network traffic log files to an FTP server whenever a content log file rolls. Server type Select the type of uploading server. Select from: File Transfer Protocol (FTP) Server IP address Username Secure File Transfer Protocol (SFTP) Secure Copy Protocol (SCP)
Enter the IP address of the FTP server. Enter the user name required to connect to the FTP server. The user name has a default of anonymous. Click the field to enter a different user name. Enter the password required to connect to the FTP server. Re-enter the password to ensure it is entered correctly. Enter a specific directory on the FTP server to save the log file. Select when the FortiAnalyzer unit should upload files to the FTP server. Select When rolled to upload as soon as the FortiAnalyzer unit rolls the network traffic log file, based on the settings above. Select a specific time of the day when the FortiAnalyzer unit rolls the network traffic log file. The FortiAnalyzer unit will upload at the configured time no matter what the size of the log file is or when it may be configured to roll to a new file.
Upload rolled files in Select to compress the log files in gzipped format before uploading to the FTP server. gzipped format Delete files after uploading Select to remove the log file from the FortiAnalyzer hard disk once the FortiAnalyzer unit completes the upload.
149
Log rolling
Network Analyzer
150
Vulnerability scan
Modules
Vulnerability scan
Vulnerability reports enable you to scan vulnerabilities on a device, such as a mail server, FTP server or other UNIX or Windows host. The FortiAnalyzer unit uses predefined vulnerability modules to query for open ports and where possible gathers information about the services running for those ports. This section describes how to set up vulnerability scans and view the reports generated by the FortiAnalyzer unit.
Note: Vulnerability scan is not available on the FortiAnalyzer-100.
Modules
The Modules page provides a reference to the types of vulnerability scans the FortiAnalyzer unit can perform on a host or device. Use the module list to determine what type of vulnerability scanning you want the FortiAnalyzer unit to perform, including level of severity. To view supported vulnerability scan modules, go to Tools > Vulnerability Scan > Module. Select a blue arrow to expand a module list.
151
Jobs
Vulnerability scan
Select the severity level and a condition for the level of the severity. Select from the following: <= less than and equal to >= greater than and equal to == equal to Select to view the severity selections. The name of the severity grouping. Select the blue arrow to expand the list of modules based on the severity option selection. The severity level of the module. A brief explanation of the vulnerability. Select for more information on the vulnerability.
Jobs
Create a vulnerability scan report job. Select the type of scan, devices to include in the report, and when the FortiAnalyzer unit will run the report. To view the list of staged jobs, go to Tools > Vulnerability Scan > Jobs.
Figure 75: List of staged vulnerability scan jobs
152
Vulnerability scan
Jobs
Select to add a job to the queue. The name of the job you configure. The IP addresses of the device or host that the FortiAnalyzer unit will scan. The current status of the job in the queue. This can include the current activity, such as running or waiting to start or it can be the date the job is set to run in the future. Select Delete to remove the job from the list. Select Edit to modify the job. You cannot modify a job if it is currently running. Select Run Now to initiate a report.
Action
4 5
Select the blue arrow for Scan options to expand the list. Complete the following:
Remote Authentication User Name Password Quick Scan Select when the FortiAnalyzer unit needs to log into a remote system to perform the vulnerability scan. Enter the user name for a remote scan. This option is only available when selecting Remote Authentication. Enter the password for the above user name. This option is only available when selecting Remote Authentication. Select to run a scan in quick mode. The FortiAnalyzer scans a list of known ports but will not scan every port ID for every host. It will only check a list of known ports. Select to enable the FortiAnalyzer unit to scan specific ports based on specific severity levels. Select the condition level and the severity level. For details on what the FortiAnalyzer scans at any given level, see Modules on page 151. Enter the port numbers, or port ranges, the FortiAnalyzer scans. Separate each port number or range of numbers with a comma. Select to run a port scan on UDP ports. Enter the port numbers, or port ranges, the FortiAnalyzer scans. Separate each port number or range of numbers with a comma.
153
Jobs
Vulnerability scan
Select when you want the FortiAnalyzer unit to run the vulnerability scan. Run now starts the scan immediately after you select OK. Run later enables you to select a date or time when the FortiAnalyzer unit runs the scan. For example, this can be at night when more cycles are available due to less logging activity.
8 9
Select the blue arrow to expand the Output options. Complete the following
File output Select the file format for the generated reports that are saved to the FortiAnalyzer hard disk. To access the reports on the hard disk, see Reports on page 155. Select from the following: HTML Email output Adobe PDF MS Word format (RTF)
Select the file formats for the generated reports that the FortiAnalyzer unit sends as an email attachment. Select from the following: HTML Adobe PDF MS Word format (RTF)
Email subject
Enter a subject to the email FortiAnalyzer sends. When not selected, the subject line is the name of the report. To select the Customize subject check box, you must select a file format from the Email output list. Enter the name for the report files included in the email. When you select multiple reports for the report profile, the FortiAnalyzer unit compresses all reports into a zip file. This option enables you to select the name for the zip file. Enter the text to include in the body of the email message. Enter an email address for the FortiAnalyzer unit or administrator requesting the report. Select the email server to use when the FortiAnalyzer unit sends the reports as an email attachment. Enter the email addresses of the recipients of the report. Add multiple recipients by pressing Enter after each email address. The addresses appear in the Email list box.
Email Attachment name Email Body Email from Email server Email to
154
Vulnerability scan
Reports
Reports
Use the FortiAnalyzer web-based manager to view a list of the generated vulnerability scan reports. To view generated reports, go to Tools > Vulnerability Scan > Reports.
Figure 76: Browse generated Vulnerability Scan reports
The name of the vulnerability scan job entered when setting up the job. The time the scan started. The time when the scan completed. Select Delete to remove the report. Select the format of the report to view. Select between PDF and MS Word (RTF) formats.
155
Reports
Vulnerability scan
156
Index
Index
A
access management 39 accounts administrator 39 users 46 acknowledge alerts 31 admin idle timeout 42 administrative access 37, 39 alert 131 display on dashboard 29 events 131 mail server 133 sending 132 SNMP traps 133 syslog server 134 threshold 132 triggers 131, 132 alert messages 31 acknowledge 31 alias range 54 allocate disk space 69, 71 attack name 115 auto locate 37 content archive 89 content logs delete after upload 93 filter 91 gzip format 93 roll settings 91 correlation report 113 CPU status 28
D
DC (duplicate count) 96 defaults 21 define device port interfaces 70 delete after upload content log 93 forensic analysis 106 logs 87 network traffic log 149 report 127 delete old logs 50 device alerts 131 groups 74 device ID FortiGate unit 69 FortiManager 72 devices add 68 blocked 74 license 29, 66 maximum allowed 66 unregistered 67 disk controller 61 disk formatting 33 disk space FortiGate unit 69, 71 FortiManager 72 quarantine 95 syslog server 73 DNS 38, 133 download logs 82 network traffic logs 144
B
backup 26 blocked devices 74 browse forensic analysis reports 106 logs 80 network traffic 142 reports 112, 127
C
changing firmware 35 CLI 23 column view content logs 90 logs 83 network traffic 145 command line interface 23, 24 company name 102, 121 config policy 50 configure the FortiGate unit 68 connecting for analyzing network traffic 139 the FortiAnalyzer unit 20 to the web-based manager 23 connection sessions 29
E
email alert 132 view traffic 108 email subject 105, 126, 154 enable quick scan 153 environmental specifications 20
157
Index
G
gateway 38 groups 74 FortiGate unit 69 FortiManager 73 syslog server 74 user groups 46
F
factory default 21, 30 FDN FortiProtect Distribution Network 58 FDS FortiProtect Distribution Server 58 file properties 49 filter content logs 91 for reports 122 logs 84 network traffic 145 user traffic 110 firmware update 35 upgrade 25 version 28 footer comment 102, 121 forensic analysis browse 106 delete after upload 106 footer 102 gzip 106 header 102 logo 102 output 104 report types 104 resolve host names 103 resolve service names 103 time 104 upload to FTP 106 format disk 33 format hard disk 30 FortiAnalyzer family 11 hot swap 61 restore 33 shut down 26 specs 20 FortiAnalyzer MIB 135 FortiAnalyzer traps 136 FortiDiscovery 37 FortiGate unit groups 69 ID 69 port interfaces 70 pre-shared key 69 FortiManager 72 device ID 72 disk space 72 groups 73 secure connection 72 FortiProtect Distribution Network 58 FortiProtect Distribution Server 58 FortiScan 29 FTP usage 109
H
hard disk usage 28 header comment 102, 121 HELO packet 37 historical viewer logs 78 network traffic 141 host name 28 hot swap 61 HTTP 37 HTTP usage 107 HTTPS 37
I
idle timeout 42 IM use 109 import IP alias file 53 log files 82 individual report 129 installation planning 19 instant message usage 109 interface administrator access 37 configuration 36 status 36 intrusion activity report 115 IP alias 53 importing from file 53 ipsec tunnel 66
L
language option 42 LCD panel 25 license information 29 log level 51 logo formats 102, 122 logos 102, 121 logs auto delete 50 backup 26 browse 80 column view 83 delete after upload 87 download 82 filter 84 gzip format 87 FortiAnalyzer Version 3.0 MR3 Administration Guide 05-30003-0082-20060925
158
Index
historical viewer 78 import 82 real-time viewer 77 resolve host names 78, 79, 81 restore 26 roll settings 86 search 84 settings 50
Q
quarantine disk space 95 duplicate count 96 ticket number 96
M
mail server 133 maximum allowed devices 66 transmission units 37 memory status 28 MIB 135 models, FortiAnalyzer 20 modules 151 MTU 37
R
RAID status 28 ranges 54 read & write access level administrator account 57 real-time viewer logs 77 network traffic 140 reboot 29 report 129 browse 112, 127 customize 102, 121 delete after upload 127 footer 121 gzip 127 header 121 individual 129 logo 121 output 125 results 124 roll up 129 schedule 125 time period 122 types 104, 124 upload to FTP 127 reports filter for 122 profile 101, 112, 119 resolve host names 124 resolve service names 124 vulnerability 155 reset factory defaults 30 resolve host names 53 forensic analysis 103 logs 78, 79, 81 network traffic 140, 141, 144 reports 124 resolve service names forensic analysis 103 network traffic 140, 141, 144 reports 124 restart 29 restore 26 defaults 32 the FortiAnalyzer unit 33 RFC 1213 135 RFC 2665 135 roll settings content logs 91 logs 86 network traffic logs 147
N
network attached server 45 file system 45 performance 37 time protocol 32 network traffic browse 142 column view 145 delete after download 149 download logs 144 filter 145 gzip 149 historical viewer 141 log roll settings 147 real-time viewer 140 resolve host names 140, 141, 144 resolve service names 140, 141, 144 search logs 146 NTP 32 null modem 24
O
output for forensic analysis 104 output for report 125 overwrite older files 69, 71
P
password 39 PDF document 104, 125 PING 37 port 514 66 interfaces 70 power down 29 power off 26 pre-shared key FortiGate unit 69 profile, reports 101, 112, 119
159
Index
T
TELNET 37 test mail server 133 SNMP server 134 TFTP server 33 threshold 114, 132 ticket number 96 time NTP server 32 period for report 122 settings 32 sync interval 32 traffic flow on a FortiGate unit 70 information 116 summaries 107 transmission options 66 traps SNMP 136 trusted host 39, 40 TXT document 104, 125
S
scan report 152 target 153 schedule a report 125 search logs 84 network traffic logs 146 secure connection 66, 69 FortiManager 72 security event report 113 summaries 113 security reports 113 selecting devices 122 serial number 28 session information 116 settings log 50 shut down 26, 29 SMTP 133 sniffer 139 SNMP traps 136 SNMP manager 135 SNMP server, test 134 SNMP traps 133 SNMP, MIB 135 SNMP, traps 136 SPAN port 139 specifications environmental 20 FortiAnalyzer 20 SSH 37 stop logging 69, 71 subject 105, 126, 154 suspicious activity report 116 events 29 sync interval 32 syslog protocol 66 syslog server 73, 134 disk space 73 groups 74 system settings 50 restore default 30, 32 system time 28
U
unregistered device 65, 67 upgrade firmware 25 uptime 28 user accounts 46 groups 46 user traffic filter 110
V
virtual domains (VDOM) 123 virus activity report 114 vulnerability enable quick scan 153 jobs 152 modules 151 reports 155 scan target 153
W
warning 29, 131 web traffic 107 web-based manager 23 connecting 23 windows shares 45
160
www.fortinet.com
www.fortinet.com