Contents
FortiGate Version 4.0 Administration Guide
01-400-89802-20090424 19
http://docs.fortinet.com/ • Feedback
WAN optimization with FortiClient ............................................................................ 630
Configuring WAN optimization storage.................................................................... 631
Example WAN optimization iSCSI configuration .................................................... 632
About partition labels .............................................................................................. 633
WAN optimization and HA.......................................................................................... 634
Configuring peers ....................................................................................................... 634
Configuring authentication groups........................................................................... 635
Details about WAN optimization peer authentication.............................................. 636
Monitoring WAN optimization.................................................................................... 637
Changing web cache settings.................................................................................... 638
Endpoint control .................................................................................. 641
Configuring endpoint control .................................................................................... 641
Viewing FortiClient required version information .................................................... 642
Configuring FortiClient required version and installer download ............................ 642
Viewing and configuring the software detection list................................................ 643
Monitoring endpoints ................................................................................................. 644
Log&Report .......................................................................................... 647
FortiGate logging ........................................................................................................ 647
FortiGuard Analysis and Management Service........................................................ 648
FortiGuard Analysis and Management Service portal web site.............................. 649
Log severity levels...................................................................................................... 649
High Availability cluster logging ............................................................................... 650
Storing logs ................................................................................................................. 650
Logging to a FortiAnalyzer unit............................................................................... 650
Connecting to FortiAnalyzer using Automatic Discovery........................................ 651
Testing the FortiAnalyzer configuration .................................................................. 652
Logging to a FortiGuard Analysis server ................................................................ 653
Logging to memory................................................................................................. 654
Logging to a Syslog server ..................................................................................... 654
Logging to WebTrends ........................................................................................... 655
Log types ..................................................................................................................... 657
Traffic log................................................................................................................ 657
Example configuration: logging all FortiGate traffic ................................................ 658
Event log................................................................................................................. 659
Data Leak Prevention log ....................................................................................... 660
Application Control log............................................................................................ 660
Antivirus log ............................................................................................................ 660
Web filter log........................................................................................................... 661
Spam filter log......................................................................................................... 661
Attack log (IPS)....................................................................................................... 661