12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Switch (<strong>FortiGate</strong>-224B only)<br />

Configuring port monitoring<br />

MTU<br />

Log<br />

IGMP snooping<br />

This field is available only on physical interfaces. To<br />

improve network performance, you can change the<br />

maximum transmission unit (MTU) of the packets that<br />

the <strong>FortiGate</strong> unit transmits. Ideally, the MTU should be<br />

the same as the smallest MTU of all the networks<br />

between the <strong>FortiGate</strong> unit and the destination of the<br />

packets. If the packets that the <strong>FortiGate</strong> unit sends are<br />

larger, they are broken up or fragmented, which slows<br />

down transmission. Experiment by lowering the MTU to<br />

find an MTU size for best network performance.<br />

To change the MTU, select Override default MTU value<br />

(1500) and enter the maximum packet size. The MTU<br />

size range is 68 to 1500 bytes for manual mode, 576 to<br />

1500 bytes for DHCP mode, and 576 to 1492 bytes for<br />

PPPoE mode.<br />

Select Log to record logs for any traffic to or from the<br />

interface. To record logs you must also enable traffic log<br />

for a logging location and set the logging severity level<br />

to Notification or lower. Go to Log & Report ><br />

Log Config to configure logging locations and types.<br />

Enable to limit flooding of multicast packets to those<br />

ports where clients have joined the relevant groups.<br />

Configuring port monitoring<br />

Switch Port Analysis (SPAN) enables you to analyze network traffic passing<br />

through switch ports by sending a copy of the traffic to a port connected to remote<br />

monitoring equipment.<br />

<strong>FortiGate</strong>-224B supports two Span sessions: Ingress (traffic to the port) and<br />

Egress (traffic from the port). You configure ports to receive the Ingress and<br />

Egress SPAN session data. You can use one port for both sessions or use two<br />

different ports. For the remaining ports, you choose whether to monitor them in<br />

the Ingress or Egress session or both, or not to monitor them at all.<br />

Note: Egress traffic is stripped of its VLAN ID tag if the Egress port has a different VLAN ID<br />

than the monitored traffic.<br />

Go to Switch > Port > SPAN to configure port monitoring.<br />

Figure 121:Monitoring ports<br />

Monitoring Ports<br />

Ingress Destination<br />

Egress Destination<br />

For each port select None or one of the other ports.<br />

Select None or one of fe01-fe24, ge25, ge26.<br />

Select None or one of fe01-fe24, ge25, ge26.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 213

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!