12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Log types<br />

Log&Report<br />

Attack log<br />

The Attack Log records attacks detected and prevented by the <strong>FortiGate</strong> unit. The<br />

<strong>FortiGate</strong> unit logs the following:<br />

Attack Signature<br />

Attack Anomaly<br />

The <strong>FortiGate</strong> unit logs all detected and prevented attacks based on<br />

the attack signature, and the action taken by the <strong>FortiGate</strong> unit.<br />

The <strong>FortiGate</strong> unit logs all detected and prevented attacks based on<br />

unknown or suspicious traffic patterns, and the action taken by the<br />

<strong>FortiGate</strong> unit.<br />

Spam filter log<br />

IM and P2P log<br />

To enable the attack logs<br />

1 Go to Firewall > Protection Profile.<br />

2 Select edit for a protection profile.<br />

3 Select the blue arrow to expand the Logging options.<br />

4 Select Log Intrusions<br />

5 Select OK.<br />

Note: Make sure attack signature and attack anomaly settings are enabled to log the<br />

attack. The logging options for the signatures included with the <strong>FortiGate</strong> unit are set by<br />

default. Ensure any custom signatures also have the logging option enabled. For details,<br />

see “Intrusion Protection” on page 411.<br />

The Spam Filter Log records blocking of email address patterns and content in<br />

SMTP, IMAP and POP3 traffic.<br />

To enable the Spam log<br />

1 Go to Firewall > Protection Profile.<br />

2 Select edit for a protection profile.<br />

3 Select the blue arrow to expand the Logging options.<br />

4 Select the Log Spam.<br />

5 Select OK.<br />

The Instant Message (IM) and Peer-to-Peer (P2P) log records instant message<br />

text, audio <strong>com</strong>munications, and file transfers attempted by users. This type of log<br />

file also records the time a transmission was attempted, the type of IM application<br />

used, and the content of the transmission.<br />

To enable IM and P2P logs<br />

1 Go to Firewall > Protection Profile.<br />

2 Select the Edit icon for a protection profile.<br />

3 Select the blue arrow to expand the Logging options.<br />

4 Select Log IM Activity<br />

5 Select Log P2P Activity<br />

6 Select OK.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

484 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!