Configure the FortiAnalyzer unit
Network settings
FortiAnalyzer Version 3.0 MR3 Administration Guide
05-30003-0082-20060925
37
Changing the interface settings
To change the interface settings
1
Go to
System
>
Network
>
Interface
.
2
Select Modify for the port.
3
Set the following options and select OK:
About FortiDiscovery
FortiDiscovery is a method of FortiGate units running FortiOS 3.0 establishing a
connection to a FortiAnalyzer unit. When a FortiGate administrator selects
Automatic Discovery, the FortiGate unit uses HELLO packets to locate any
FortiAnalyzer units on the network within the same subnet. Once the FortiGate
unit discovers the FortiAnalyzer unit, the fortigate unit automatically enables
logging to the FortiAnalyzer and begins sending log data.
The FortiGate unit will only find the FortiAnalyzer unit when the FortiDiscovery is
enabled on a port on the FortiAnalyzer unit.
Interface name
The interface name is hard coded and cannot be changed.
FortiDiscovery
Protocol
Select Enable to use the FortiDiscovery Protocol for the port to
enable FortiGate devices to find the FortiAnalyzer unit
automatically and establish a connection for sending log packets.
“About FortiDiscovery” on page 37
for more information.
IP/Netmask
Enter an IP address and netmask.
Administrative
Access
Configure administrative access to an interface to control how
administrators access the FortiAnalyzer unit and the FortiAnalyzer
interfaces that administrators can connect to. Select from the
following administrative access options:
•
HTTPS to allow secure HTTPS connections to the web-based
manager through this interface.
•
PING to enable the interface to respond to pings. Use this
setting to verify your installation and for testing.
•
HTTP to allow HTTP connections to the web-based manager
through this interface. HTTP connections are not secure and
can be intercepted by a third party.
•
SSH to allow SSH connections to the CLI through this
interface.
•
TELNET to allow Telnet connections to the CLI through this
interface. Telnet connections are not secure and can be
intercepted by a third party.
•
AGREGGATOR to set the port to be the sender or receiver of
log aggregation transmissions. For more information on
aggregation see
.
MTU
To improve network performance, you can change the maximum
transmission unit (MTU) of the packets that the FortiAnalyzer unit
transmits from any physical interface. Ideally, this MTU should be
the same as the smallest MTU of all the networks between the
FortiAnalyzer unit and the destination of the packets. If the
packets that the FortiAnalyzer unit sends are larger, they are
broken up or fragmented, which slows down transmission.
Experiment by lowering the MTU to find an MTU size for best
network performance.
To change the MTU, select Override default MTU value (1500)
and enter the maximum packet size.
Содержание FortiAnalyzer-100A
Страница 1: ...www fortinet com FortiAnalyzer Version 3 0 MR3 A D M I N I S T R A T I O N G U I D E...
Страница 10: ...FortiAnalyzer Version 3 0 MR3 Administration Guide 10 05 30003 0082 20060925 Contents...
Страница 76: ...FortiAnalyzer Version 3 0 MR3 Administration Guide 76 05 30003 0082 20060925 Blocked Devices Devices...
Страница 88: ...FortiAnalyzer Version 3 0 MR3 Administration Guide 88 05 30003 0082 20060925 Log rolling Logs...
Страница 94: ...FortiAnalyzer Version 3 0 MR3 Administration Guide 94 05 30003 0082 20060925 Log rolling Content archive...
Страница 138: ...FortiAnalyzer Version 3 0 MR3 Administration Guide 138 05 30003 0082 20060925 Output Alerts...
Страница 150: ...FortiAnalyzer Version 3 0 MR3 Administration Guide 150 05 30003 0082 20060925 Log rolling Network Analyzer...
Страница 156: ...FortiAnalyzer Version 3 0 MR3 Administration Guide 156 05 30003 0082 20060925 Reports Vulnerability scan...
Страница 161: ...www fortinet com...
Страница 162: ...www fortinet com...