Lecture Notes: FortiGate Logging Review and Configuration
Introduction
- Presenter: Devin Adams from Net Instructor in Tempe, Arizona.
- Purpose: Creating a lab environment for the FortiGate FortiOS 6.4 (Ana c4).
- Objective: Review FortiGate logging to ensure accountability and create a paper trail for changes and events.
Key Concepts
Logging Configuration
Steps to Access Logging
-
Log in as Admin:
- Use incognito mode or different browsers to login as different admins without sharing session keys.
-
Check Logging Settings:
- Navigate to "Log & Report" -> "Log Settings".
- Ensure event logging is enabled.
- Verify logging to a hard drive or remote options (FortiCloud, FortiAnalyzer, or Syslog).
- Enable "FortiView" for graphical representation of logs.
Event Logging
- System Events:
- Logs system-level changes like admin login/logout and configuration changes.
- Use filters to isolate specific activities (e.g., changes made by FortiDuck).
Traffic Logging
Demonstration
- Example on logging with a simulated PC generating web traffic.
- Use of "make Internet noise" to create traffic logs.
- Verification of logging through "Forwarding Logs" to track websites visited, leveraging device identification and reverse database for application names.
Advanced Features
Conclusion
- Logging is essential for network security and accountability.
- Ensure logging is enabled and appropriately configured.
- Regularly review logs and utilize FortiView for insights.
- Future topics include detailed inspection and web filtering configuration.
These notes encapsulate the crucial elements of the logging lecture, providing insights into best practices for monitoring and accountability in FortiGate configurations.