EasyManua.ls Logo

Fortinet Gate 60D - Page 19

Fortinet Gate 60D
706 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
FortiGate Version 4.0 Administration Guide
01-400-89802-20090424 19
http://docs.fortinet.com/Feedback
WAN optimization with FortiClient ............................................................................ 630
Configuring WAN optimization storage.................................................................... 631
Example WAN optimization iSCSI configuration .................................................... 632
About partition labels .............................................................................................. 633
WAN optimization and HA.......................................................................................... 634
Configuring peers ....................................................................................................... 634
Configuring authentication groups........................................................................... 635
Details about WAN optimization peer authentication.............................................. 636
Monitoring WAN optimization.................................................................................... 637
Changing web cache settings.................................................................................... 638
Endpoint control .................................................................................. 641
Configuring endpoint control .................................................................................... 641
Viewing FortiClient required version information .................................................... 642
Configuring FortiClient required version and installer download ............................ 642
Viewing and configuring the software detection list................................................ 643
Monitoring endpoints ................................................................................................. 644
Log&Report .......................................................................................... 647
FortiGate logging ........................................................................................................ 647
FortiGuard Analysis and Management Service........................................................ 648
FortiGuard Analysis and Management Service portal web site.............................. 649
Log severity levels...................................................................................................... 649
High Availability cluster logging ............................................................................... 650
Storing logs ................................................................................................................. 650
Logging to a FortiAnalyzer unit............................................................................... 650
Connecting to FortiAnalyzer using Automatic Discovery........................................ 651
Testing the FortiAnalyzer configuration .................................................................. 652
Logging to a FortiGuard Analysis server ................................................................ 653
Logging to memory................................................................................................. 654
Logging to a Syslog server ..................................................................................... 654
Logging to WebTrends ........................................................................................... 655
Log types ..................................................................................................................... 657
Traffic log................................................................................................................ 657
Example configuration: logging all FortiGate traffic ................................................ 658
Event log................................................................................................................. 659
Data Leak Prevention log ....................................................................................... 660
Application Control log............................................................................................ 660
Antivirus log ............................................................................................................ 660
Web filter log........................................................................................................... 661
Spam filter log......................................................................................................... 661
Attack log (IPS)....................................................................................................... 661

Table of Contents