BenutzerhandbuchInhaltsverzeichnisTable of Contents3Introduction15Antivirus protection16Web content filtering16Email filtering17Firewall17NAT/Route mode18Transparent mode18VLANs and virtual domains18Network intrusion detection18VPN19High availability19Secure installation, configuration, and management20Web-based manager20Command line interface21Logging and reporting21Document conventions21Fortinet documentation22Comments on Fortinet technical documentation23Customer service and technical support23Getting started25Warnings and cautions26Warning26Package contents26Physical description27Front panel features28FortiBlade-4010 module29KVM switch module30Rear panel features31Power supplies and power connections32Cooling fan trays33Management module3310/100 out of band management module34Pass-through interface module35Switched interface module35Installing hardware37Choosing a suitable environment37Choosing a rack37Attaching the mounting rail37Installing FortiBlade-4010 modules38FortiGate-4000P network connections39FortiGate-4000S network connections39Out of band management connections40Console management connections40Turning FortiGate-4000 chassis power on and off40Turning on FortiGate-4000 chassis power40Turning off FortiGate-4000 chassis power41Hot swapping modules41Hot swapping FortiBlade-4010 modules42Hot swapping cooling fan trays42Hot swapping power supplies42Hot swapping interface modules43Hot swapping the 10/100 out of band management module43Hot swapping the management module43Hot swapping the KVM switch module44Connecting to the web-based manager44Connecting to the FortiGate-4000 internal interface module45Connecting to the FortiGate-4000 10/100 out of band management module46Connecting to the Command Line Interface (CLI)47Factory default configuration48Factory default NAT/Route mode network configuration48Factory default Transparent mode network configuration49Factory default firewall configuration49Factory default content profiles51Strict content profile51Scan content profile51Web content profile52Unfiltered content profile53Planning the FortiGate configuration53NAT/Route mode standalone configuration53Transparent mode standalone configuration54FortiGate-4000 HA configuration55FortiGate-4000P HA configuration56FortiGate-4000S HA configuration57FortiGate-4000P units with external load balancers57FortiGate model maximum values matrix59Next steps60NAT/Route mode installation61Preparing to configure NAT/Route mode61Advanced NAT/Route mode settings62Out of band management interface63Using the setup wizard63Starting the setup wizard63Reconnecting to the web-based manager63Using the command line interface64Configuring the FortiGate unit to operate in NAT/Route mode64Configuring NAT/Route mode IP addresses64Configuring the out of band management interface65Connecting the FortiGate unit to your networks65Configuring your networks66Completing the configuration66Configuring the out of band management interface66Setting the date and time66Changing antivirus protection66Registering your FortiGate unit67Configuring virus and attack definition updates67Transparent mode installation69Preparing to configure Transparent mode69Out of band management interface70Using the setup wizard70Changing to Transparent mode using the web-based manager70Starting the setup wizard70Reconnecting to the web-based manager71Using the command line interface71Changing to Transparent mode using the CLI71Configuring the Transparent mode management IP address71Configure the Transparent mode default gateway72Configure the out of band management interface72Completing the configuration72Setting the date and time72Enabling antivirus protection72Registering your FortiGate unit73Configuring virus and attack definition updates73Connecting the FortiGate unit to your networks73Transparent mode configuration examples74Default routes and static routes74Example default route to an external network75General configuration steps75Web-based manager example configuration steps76CLI configuration steps76Example static route to an external destination76General configuration steps77Web-based manager example configuration steps77CLI configuration steps78Example static route to an internal destination78General configuration steps79Web-based manager example configuration steps80CLI configuration steps80High availability81Configuring an HA cluster82Configuring FortiGate units for HA operation82Connecting the cluster84Adding a new FortiGate unit to a functioning cluster86Managing an HA cluster87Configuring cluster interface monitoring88Viewing the status of cluster members88Monitoring cluster members89Viewing cluster sessions90Viewing and managing cluster log messages90Monitoring cluster units for failover91Viewing cluster communication sessions91Managing individual cluster units92Changing cluster unit host names92Synchronizing the cluster configuration93Upgrading firmware94Replacing a FortiGate unit after failover95Advanced HA options95Selecting a FortiGate unit as a permanent primary unit95Configuring the priority of each FortiGate unit in the cluster96Configuring weighted-round-robin weights96Active-Active cluster packet flow97NAT/Route mode packet flow97Configuring switches to work with a NAT/Route mode cluster98Transparent mode packet flow99System status101Changing the FortiGate host name102Changing the FortiGate firmware102Upgrading to a new firmware version103Upgrading the firmware using the web-based manager103Upgrading the firmware using the CLI103Reverting to a previous firmware version104Reverting to a previous firmware version using the web-based manager104Reverting to a previous firmware version using the CLI105Installing firmware images from a system reboot using the CLI107Restoring the previous configuration109Testing a new firmware image before installing it109Installing and using a backup firmware image111Installing a backup firmware image111Switching to the backup firmware image113Switching back to the default firmware image113Manual virus definition updates114Manual attack definition updates115Displaying the FortiGate serial number115Displaying the FortiGate up time115Backing up system settings115Restoring system settings116Restoring system settings to factory defaults116Changing to Transparent mode117Changing to NAT/Route mode117Restarting the FortiGate unit118Shutting down the FortiGate unit118System status118Viewing CPU and memory status119Viewing sessions and network status120Viewing virus and intrusions status121Session list122Virus and attack definitions updates and registration123Updating antivirus and attack definitions123Connecting to the FortiResponse Distribution Network124Manually initiating antivirus and attack definitions updates125Configuring update logging126Scheduling updates126Enabling scheduled updates126Adding an override server127Enabling scheduled updates through a proxy server128Enabling push updates128Enabling push updates129Push updates when FortiGate IP addresses change129Enabling push updates through a NAT device129Example: push updates through a NAT device130Adding a port forwarding virtual IP to the FortiGate NAT device131Adding a firewall policy for the port forwarding virtual IP132Configuring the FortiGate unit with an override push IP and port132Registering FortiGate units133FortiCare Service Contracts134Registering the FortiGate unit134Updating registration information136Recovering a lost Fortinet support password136Viewing the list of registered FortiGate units137Registering a new FortiGate unit137Adding or changing a FortiCare Support Contract number138Changing your Fortinet support password138Changing your contact information or security question138Downloading virus and attack definitions updates139Registering a FortiGate unit after an RMA140Network configuration141Configuring zones141Adding zones142Deleting zones142Configuring interfaces142Viewing the interface list143Changing the administrative status of an interface143Adding an interface to a zone143Configuring an interface with a manual IP address144Configuring an interface for DHCP144Configuring an interface for PPPoE145Adding a secondary IP address to an interface146Adding a ping server to an interface146Controlling administrative access to an interface147Changing the MTU size to improve network performance148Configuring traffic logging for connections to an interface148Configuring the management interface in Transparent mode148Out of band management149Out of band management interface CLI command150Syntax description150VLAN overview150VLANs in NAT/Route mode151Rules for VLAN IDs151Rules for VLAN IP addresses152Adding VLAN subinterfaces152Virtual domains in Transparent mode153Virtual domain properties154Configuring a virtual domain154Adding a virtual domain155Adding VLAN subinterfaces to a virtual domain155Adding zones to virtual domains156Adding firewall policies for virtual domains157Adding addresses for virtual domains157Adding firewall policies for virtual domains157Deleting virtual domains158Adding DNS server IP addresses158Configuring routing158Adding a default route159Adding destination-based routes to the routing table159Adding routes in Transparent mode160Configuring the routing table161Policy routing161Policy routing command syntax162Configuring DHCP services162Configuring a DHCP relay agent163Configuring a DHCP server163Adding a DHCP server to an interface163Adding scopes to a DHCP server163Adding a reserve IP to a DHCP server165Viewing a DHCP server dynamic IP list165RIP configuration167RIP settings167Configuring RIP for FortiGate interfaces169Adding RIP filters171Adding a RIP filter list171Assigning a RIP filter list to the neighbors filter172Assigning a RIP filter list to the incoming filter172Assigning a RIP filter list to the outgoing filter173System configuration175Setting system date and time175Changing system options176Modifying the Dead Gateway Detection settings177Adding and editing administrator accounts178Adding new administrator accounts178Editing administrator accounts179Configuring SNMP180Configuring the FortiGate unit for SNMP monitoring180Configuring FortiGate SNMP support180Configuring SNMP access to an interface180Configuring SNMP community settings181FortiGate MIBs182FortiGate traps183General FortiGate traps183System traps183VPN traps184NIDS traps184Antivirus traps184Logging traps184Fortinet MIB fields185System configuration and status185Firewall configuration185Users and authentication configuration186VPN configuration and status186NIDS configuration186Antivirus configuration186Web filter configuration186Logging and reporting configuration187Replacement messages187Customizing replacement messages188Customizing alert emails189Firewall configuration191Default firewall configuration192Interfaces192VLAN subinterfaces193Zones193Addresses193Services194Schedules194Content profiles194Adding firewall policies194Firewall policy options196Source196Destination196Schedule196Service196Action196NAT197VPN Tunnel197Traffic Shaping197Authentication198Anti-Virus & Web filter198Log Traffic199Comments199Configuring policy lists200Policy matching in detail200Changing the order of policies in a policy list201Enabling and disabling policies201Disabling policies201Enabling policies201Addresses202Adding addresses202Editing addresses203Deleting addresses204Organizing addresses into address groups204Services205Predefined services205Adding custom TCP and UDP services208Adding custom ICMP services209Adding custom IP services209Grouping services209Schedules210Creating one-time schedules211Creating recurring schedules212Adding schedules to policies213Virtual IPs213Adding static NAT virtual IPs214Adding port forwarding virtual IPs215Adding policies with virtual IPs217IP pools218Adding an IP pool218IP Pools for firewall policies that use fixed ports219IP pools and dynamic NAT219IP/MAC binding220Configuring IP/MAC binding for packets going through the firewall220Configuring IP/MAC binding for packets going to the firewall221Adding IP/MAC addresses221Viewing the dynamic IP/MAC list222Enabling IP/MAC binding222Content profiles223Default content profiles224Adding content profiles224Adding content profiles to policies226Users and authentication227Setting authentication timeout228Adding user names and configuring authentication228Adding user names and configuring authentication228Deleting user names from the internal database229Configuring RADIUS support230Adding RADIUS servers230Deleting RADIUS servers230Configuring LDAP support231Adding LDAP servers231Deleting LDAP servers232Configuring user groups232Adding user groups233Deleting user groups234IPSec VPN235Key management236Manual Keys236Automatic Internet Key Exchange (AutoIKE) with pre-shared keys or certificates236AutoIKE with pre-shared keys236AutoIKE with certificates236Manual key IPSec VPNs237General configuration steps for a manual key VPN237Adding a manual key VPN tunnel237AutoIKE IPSec VPNs239General configuration steps for an AutoIKE VPN239Adding a phase 1 configuration for an AutoIKE VPN239Configuring advanced options241Adding a phase 2 configuration for an AutoIKE VPN244Managing digital certificates246Obtaining a signed local certificate246Generating the certificate request246Downloading the certificate request248Importing the signed local certificate248Backing up and restoring the local certificate and private key248Obtaining CA certificates249Importing CA certificates249Configuring encrypt policies249Adding a source address250Adding a destination address251Adding an encrypt policy251IPSec VPN concentrators253VPN concentrator (hub) general configuration steps254Adding a VPN concentrator255VPN spoke general configuration steps256Monitoring and Troubleshooting VPNs257Viewing VPN tunnel status257Viewing dialup VPN connection status258Testing a VPN258PPTP and L2TP VPN259Configuring PPTP259Configuring the FortiGate unit as a PPTP gateway260Configuring a Windows 98 client for PPTP262Configuring a Windows 2000 client for PPTP263Configuring a Windows XP client for PPTP263Configuring L2TP265Configuring the FortiGate unit as an L2TP gateway265Configuring a Windows 2000 client for L2TP267Configuring a Windows XP client for L2TP268Network Intrusion Detection System (NIDS)271Detecting attacks271Selecting the interfaces to monitor272Disabling monitoring interfaces272Configuring checksum verification272Viewing the signature list273Viewing attack descriptions273Disabling NIDS attack signatures274Adding user-defined signatures274Downloading the user-defined signature list275Preventing attacks276Enabling NIDS attack prevention276Enabling NIDS attack prevention signatures276Setting signature threshold values277Logging attacks278Logging attack messages to the attack log278Reducing the number of NIDS attack log and email messages278Automatic message reduction278Manual message reduction279Antivirus protection281General configuration steps281Antivirus scanning282File blocking283Blocking files in firewall traffic284Adding file patterns to block284Blocking oversized files and emails285Configuring limits for oversized files and email285Exempting fragmented email from blocking285Viewing the virus list286Web filtering287General configuration steps287Content blocking288Adding words and phrases to the Banned Word list288Clearing the Banned Word list289Backing up the Banned Word list290Restoring the Banned Word list290URL blocking291Configuring FortiGate Web URL blocking291Adding URLs to the Web URL block list291Clearing the Web URL block list292Downloading the Web URL block list293Uploading a URL block list293Configuring FortiGate Web pattern blocking294Configuring Cerberian URL filtering294Installing a Cerberian license key295Adding a Cerberian user295Configuring Cerberian web filter295About the default group and policy295Enabling Cerberian URL filtering296Script filtering297Enabling script filtering297Selecting script filter options297Exempt URL list298Adding URLs to the URL Exempt list298Downloading the URL Exempt List299Uploading a URL Exempt List299Email filter301General configuration steps301Email banned word list302Adding words and phrases to the email banned word list302Downloading the email banned word list303Uploading the email banned word list303Email block list304Adding address patterns to the email block list304Downloading the email block list304Uploading an email block list305Email exempt list305Adding address patterns to the email exempt list306Adding a subject tag306Logging and reporting307Recording logs307Recording logs on a remote computer308Recording logs on a NetIQ WebTrends server308Recording logs in system memory309Log message levels309Filtering log messages310Configuring traffic logging311Enabling traffic logging312Enabling traffic logging for an interface312Enabling traffic logging for a VLAN subinterface312Enabling traffic logging for a firewall policy312Configuring traffic filter settings313Adding traffic filter entries313Viewing logs saved to memory314Viewing logs314Searching logs315Configuring alert email315Adding alert email addresses316Testing alert email316Enabling alert email317Glossary319Index323Größe: 6,3 MBSeiten: 332Language: EnglishHandbuch öffnen
BetriebsanweisungInhaltsverzeichnisTable of Contents3Introduction13About FortiGate Antivirus Firewalls13Antivirus protection14Web content filtering15Spam filtering15Firewall15NAT/Route mode16Transparent mode16VLANs and virtual domains17Intrusion Prevention System (IPS)17VPN18High availability18Secure installation, configuration, and management19Web-based manager19Command line interface19Logging and reporting20Document conventions20FortiGate documentation22Comments on Fortinet technical documentation22Related documentation22FortiManager documentation23FortiClient documentation23FortiMail documentation23FortiLog documentation23Customer service and technical support24System status25Console access25Status26Viewing system status26System status26Unit Information27Recent Virus Detections27Interface Status27System Resources27History28Recent Intrusion Detections28Changing unit information29Session list31Changing the FortiGate firmware32Upgrading to a new firmware version33Upgrading the firmware using the web-based manager33Upgrading the firmware using the CLI33Reverting to a previous firmware version34Reverting to a previous firmware version using the web-based manager34Reverting to a previous firmware version using the CLI35Installing firmware images from a system reboot using the CLI37Restoring the previous configuration39Testing a new firmware image before installing it40Installing and using a backup firmware image42Installing a backup firmware image42Switching to the backup firmware image44Switching back to the default firmware image44System network47Interface47Interface settings48Name49Interface49VLAN ID49Virtual Domain50Addressing mode50Manual50DHCP50PPPoE51DDNS52Ping server52Administrative access52MTU53Log53Configuring interfaces53Zone57Zone settings58Management59DNS60Routing table (Transparent Mode)61Routing table list61Transparent mode route settings62VLAN overview62FortiGate units and VLANs63VLANs in NAT/Route mode63Rules for VLAN IDs64Rules for VLAN IP addresses64Adding VLAN subinterfaces65VLANs in Transparent mode66Rules for VLAN IDs68Transparent mode virtual domains and VLANs68Transparent mode VLAN list69Transparent mode VLAN settings69FortiGate IPv6 support71System DHCP73Service73DHCP service settings74Server75DHCP server settings76Exclude range77DHCP exclude range settings78IP/MAC binding78DHCP IP/MAC binding settings79Dynamic IP79System config81System time81Options82HA84HA configuration85Standalone Mode85High Availability85Cluster Members86Mode86Group ID86Unit Priority86Override Master87Password87Schedule88Priorities of Heartbeat Device88Heartbeat device IP addresses89Monitor priorities90Configuring an HA cluster90Managing an HA cluster94SNMP97Configuring SNMP98SNMP community99FortiGate MIBs101FortiGate traps102Fortinet MIB fields103Replacement messages106Replacement messages list106Changing replacement messages107FortiManager108System administration109Administrators109Administrators list110Administrators options110Using trusted hosts111Access profiles111Access profile list112Access profile options112System maintenance115Backup and restore115Backing up and Restoring116Update center118Updating antivirus and attack definitions120Enabling push updates123Push updates when FortiGate IP addresses change123Enabling push updates through a NAT device124Support125Sending a bug report126Registering a FortiGate unit127Shutdown129System virtual domain131Virtual domain properties132Exclusive virtual domain properties132Shared configuration settings133Administration and management134Virtual domains134Adding a virtual domain135Selecting a virtual domain135Selecting a management virtual domain135Configuring virtual domains136Adding interfaces, VLAN subinterfaces, and zones to a virtual domain136Configuring routing for a virtual domain138Configuring firewall policies for a virtual domain138Configuring IPSec VPN for a virtual domain140Router141Static141Static route list143Static route options144Policy145Policy route list145Policy route options146RIP146General147Networks list148Networks options149Interface list149Interface options150Distribute list151Distribute list options152Offset list153Offset list options153Router objects154Access list154New access list154New access list entry155Prefix list155New Prefix list156New prefix list entry157Route-map list157New Route-map158Route-map list entry159Key chain list160New key chain160Key chain list entry161Monitor162Routing monitor list162CLI configuration163get router info ospf163Command syntax163Examples163get router info protocols163Command syntax163get router info rip164Command syntax164Examples164config router ospf164Command syntax pattern164Example166config area167config area command syntax pattern167Example169config filter-list170config filter-list command syntax pattern170Example171config range171config range command syntax pattern171Example172config virtual-link173config virtual link command syntax pattern173Example175config distribute-list175config distribute-list command syntax pattern176Example176config neighbor177config neighbor command syntax pattern177Example178config network179config network command syntax pattern179Example179config ospf-interface180config ospf-interface command syntax pattern180Example184config redistribute184config redistribute command syntax pattern185Example185config summary-address185config summary-address command syntax pattern186Example186config router static6187Command syntax pattern187Example188Firewall189Policy190How policy matching works190Policy list190Policy options191Advanced policy options194Authentication194Traffic Shaping195Differentiated Services195Comments196Configuring firewall policies196Policy CLI configuration197Command syntax pattern197Address198Address list199Address options199Configuring addresses200Address group list201Address group options201Configuring address groups202Service202Predefined service list203Custom service list206Custom service options206TCP and UDP custom service options207ICMP custom service options207IP custom service options207Configuring custom services208Service group list209Service group options209Configuring service groups210Schedule210One-time schedule list211One-time schedule options211Configuring one-time schedules212Recurring schedule list212Recurring schedule options213Configuring recurring schedules213Virtual IP214Virtual IP list215Virtual IP options215Configuring virtual IPs216IP pool218IP pool list219IP pool options219Configuring IP pools220IP Pools for firewall policies that use fixed ports220IP pools and dynamic NAT221Protection profile221Protection profile list222Default protection profiles222Protection profile options222Configuring antivirus options223Configuring web filtering options224Configuring web category filtering options224Configuring spam filtering options225Configuring IPS options226Configuring content archive options226Configuring protection profiles227CLI configuration228profile228Command syntax pattern228Users and authentication233Setting authentication timeout234Local234Local user list234Local user options234RADIUS235RADIUS server list235RADIUS server options236LDAP236LDAP server list237LDAP server options237User group239User group list239User group options240CLI configuration241peer241Command syntax pattern241Example241peergrp242Command syntax pattern242Example242VPN245Phase 1246Phase 1 list246Phase 1 basic settings247Phase 1 advanced options248Configuring XAuth249Phase 2250Phase 2 list250Phase 2 basic settings251Phase 2 advanced options252Manual key253Manual key list254Manual key options254Concentrator255Concentrator list255Concentrator options256Ping Generator256Ping generator options257Monitor257Dialup monitor258Static IP and dynamic DNS monitor258PPTP259Setting up a PPTP-based VPN259Enabling PPTP and specifying a PPTP range260Configuring a Windows 2000 client for PPTP261Configuring a Windows XP client for PPTP261PPTP passthrough262L2TP263Setting up a L2TP-based VPN264Enabling L2TP and specifying an L2TP range264Configuring a Windows 2000 client for L2TP265Configuring a Windows XP client for L2TP266Certificates268Viewing the certificate list269Generating a certificate request269Installing a signed certificate271Enabling VPN access for specific certificate holders272CLI configuration273ipsec phase1273Command syntax pattern273Example275ipsec phase2275Command syntax pattern275Example276ipsec vip276Command syntax pattern276Example277Authenticating peers with preshared keys278Gateway-to-gateway VPN278Dialup VPN279Dynamic DNS VPN279Manual key IPSec VPN280Adding firewall policies for IPSec VPN tunnels280Setting the encryption policy direction280Setting the source address for encrypted traffic280Setting the destination address for encrypted traffic281Adding an IPSec firewall encryption policy281Internet browsing through a VPN tunnel281Configuring Internet browsing through a VPN tunnel282IPSec VPN in Transparent mode283Special rules283Hub and spoke VPNs284Configuring the hub284Adding a VPN concentrator285Configuring spokes286Redundant IPSec VPNs287Configuring redundant IPSec VPNs287Configuring IPSec virtual IP addresses288Troubleshooting290IPS291Protection profile configuration291IPS updates and information291Signature292Predefined292Predefined signature list293Configuring predefined signatures294Configuring parameters for dissector signatures295Custom296Custom signature list296Adding custom signatures297Backing up and restoring custom signature files297Anomaly298Anomaly list298Configuring an anomaly299Anomaly CLI configuration301(config ips anomaly) config limit301Command syntax pattern301Example301Configuring IPS logging and alert email302Default fail open setting302Antivirus303Protection profile configuration304Order of antivirus operations304Virus list updates and information304File block304File block list305Configuring the file block list306Quarantine306Quarantined files list306Quarantined files list options307AutoSubmit list308AutoSubmit list options308Configuring the AutoSubmit list308Config309Config310Virus list310Config310Grayware311Grayware options311CLI configuration312system global av_failopen312Command syntax pattern313Example313system global optimize313Command syntax pattern313Example314heuristic314Command syntax pattern314Example315quarantine315Command syntax pattern315antivirus quarantine command keywords and variables316service http316Command syntax pattern316Example316service ftp317Command syntax pattern317Example317service pop3318Command syntax pattern318Example318service imap318Command syntax pattern319Example319service smtp319Command syntax pattern320Example320Web filter321Protection profile configuration322Order of web filter operations322Content block322Web content block list323Web content block options323Configuring the web content block list324URL block324Web URL block list325Web URL block options325Configuring the web URL block list325Web pattern block list326Web pattern block options327Configuring web pattern block327URL exempt327URL exempt list328URL exempt list options328Configuring URL exempt328Category block329FortiGuard managed web filtering service329FortiGuard categories and ratings329FortiGuard Service Points329FortiGuard licensing330FortiGuard configuration330Category block configuration options330Configuring web category block331Category block reports331Category block reports options332Generating a category block report332Category block CLI configuration332Command syntax pattern333Example333Script filter333Web script filter options334Spam filter335Protection profile configuration336Order of spam filter operations337FortiShield IP address black list and spam filter337IP address338IP address list338IP address options338Configuring the IP address list338RBL & ORDBL339RBL & ORDBL list340RBL & ORDBL options340Configuring the RBL & ORDBL list340Email address341Email address list341Email address options341Configuring the email address list341MIME headers342MIME headers list343MIME headers options343Configuring the MIME headers list343Banned word344Banned word list344Banned word options345Configuring the banned word list346Using Perl regular expressions346Regular expression vs. wildcard match pattern346Word boundary347Case sensitivity347Examples348Log & Report349Log config350Log Setting options350FortiLog settings351Disk settings352Memory settings353Syslog settings353WebTrends settings353Alert E-mail options354Log filter options355Traffic log356Event log356Anti-virus log357Web filter log357Attack log358Spam filter log358Configuring log filters358Enabling traffic logging358Log access360Disk log file access360Viewing log messages361Choosing columns362Searching log messages364CLI configuration365fortilog setting365Command syntax pattern365Example366syslogd setting366Command syntax pattern366Example368FortiGuard categories369FortiGate maximum values375Glossary379Index383Größe: 5,4 MBSeiten: 390Language: EnglishHandbuch öffnen