12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Log&Report<br />

Log types<br />

Page<br />

Navigation<br />

Report Files<br />

Started<br />

Finished<br />

Size (bytes)<br />

Other Formats<br />

Action<br />

Select from the various arrows to go to the next page, previous<br />

page, last or first page. You can also enter a number to view that<br />

page of log messages. For example, entering the number 5<br />

displays the fifth page.<br />

Displays the generated reports. Select the report name to view a<br />

roll up of all reports in HTML format.<br />

The report appears in the reports list with the report name, date<br />

and time the report was generated.<br />

Select the blue arrow to expand the report to view the individual<br />

reports in HTML format.<br />

Indicates the date and time when the FortiGuard Analysis server<br />

generated the report.<br />

Indicates the date and time when the FortiGuard Analysis server<br />

<strong>com</strong>pleted the report. If the FortiGuard Analysis server is in the<br />

process of generating a report, a progress bar will appear in this<br />

column.<br />

The file size of the report in HTML format. The generated reports<br />

are available in HTML, PDF, RTF and ASCII text formats,<br />

depending on the output configuration.<br />

Select a file format to view the generated report.<br />

Select Edit to rename the report.<br />

Select Delete to remove the report from the FortiGuard Analysis<br />

server.<br />

You can also view sample reports to see how log data is displayed in a report by<br />

selecting Sample Reports on the Report Browse page.<br />

Log types<br />

The <strong>FortiGate</strong> unit provides a wide range of <strong>FortiGate</strong> features to log, enabling<br />

you to better monitor activity that is occurring on your network. For example, you<br />

can enable logging IM/P2P. These log messages provide detailed information on<br />

the activity occurring on your network of IM/P2P programs and their users.<br />

This topic also provides details on each log type and how to enable logging of the<br />

log type.<br />

Before enabling <strong>FortiGate</strong> features, you need to configure what type of logging<br />

device will store the logs. See “Storing Logs” on page 472 for more information.<br />

Traffic log<br />

The Traffic Log records all the traffic to and through the <strong>FortiGate</strong> interfaces. You<br />

can configure logging of traffic controlled by firewall policies and for traffic<br />

between any source and destination addresses. You can apply the following<br />

filters:<br />

Allowed traffic<br />

Violation traffic<br />

The <strong>FortiGate</strong> unit logs all traffic that is allowed according to the<br />

firewall policy settings.<br />

The <strong>FortiGate</strong> unit logs all traffic that violates the firewall policy<br />

settings.<br />

Note: You need to set the logging severity level to Notification when configuring a logging<br />

location to record traffic log messages. Traffic log messages generally have a severity level<br />

no higher than Notification. If VDOMs are enabled, make sure the VDOM you are currently<br />

in allows access for enabling traffic logs.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 481

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!