FAZ Trainining v6 - 20200310
FAZ Trainining v6 - 20200310
Kevin Yang
Technical Consultant
[email protected]
© Copyright Fortinet Inc. All rights reserved.
Course Prerequisite
2
LAB Requirement
3
Agenda - Lesson
6
Key Features
Reports
Alerts, and
Content archive
8
Key Features
Centralized log repository Features
9
Key Features
Feature Support
R 6.2.3 10
Key Features
Log Storage capacity
11
Key Features
Reports
12
Key Features
Alerts
» Uses data filtering to track and locate specific email or to examine the contents
of archived files
14
Administrative domains(ADOMs)
16
Operation Modes
17
Logging and reporting workflow
18
Scalability
New FortiAnalyzer Storage Model
19
Operation mode : Analyzer Mode
20
Network topology : Analyzer Mode
21
Operation mode : Collector
22
Network topology : Collector Mode
23
FortiAnalyzer HA : Typical FortiAnalyzer Cluster
24
FortiAnalyzer HA : Configuration HA Master
25
FortiAnalyzer HA : Configuration HA Slave
26
FortiAnalyzer HA : Successful Configuration
27
Database Language Support
Log data in inserted into SQL databased for log view and report
generation
Both local and remote SQL databases are supported (5.2 before)
ISAKMP ESP
33
FGT – FAZ Communication
The Optimized Fabric Transfer Protocol (OFTP) is used over SSL when information is
synchronized between FortiAnalyzer and FortiGate.
» OFTPS is the default setting for securing communications between FortiGate and
FortiAnalyzer.
» OFTP listens on ports TCP/514 and UDP/514.
SSL communications are auto-negotiated between FortiAnalyzer and FortiGate, so the oftpd
server will use SSL-encrypted FTP only if being used by the connecting FortiGate.
FortiAnalyzer’s encryption level must be equal to, or less than, FortiGate’s. (enc-algorithm
default setting may vary, please double check on manual for every release.)
» FortiGate = “high-medium" (low encryption models can only do the low level)
» FortiAnalyzer = high
Global setting on FortiAnalyzer — applies to all connecting FortiGates. If you even have one low
encryption FortiGate in your network while the rest are high, you must set the FortiAnalyzer
encryption level to low.
34
FGT – FAZ Communication
On FortiAnalyzer:
To verify current setting, enter the CLI command:
get system global
On FortiGate:
To change the level. enter the CLI command:
config log fortianalyzer setting
set enc-algorithm [high | high-medium | low]
end
35
FortiAnalyzer Series
* Only restricted to the hardware platform performance (e.g. there are no software licensing limitations) 36
FortiAnalyzer VM-Series
37
FortiAnalyzer VM-Series (Min System Requirement)
The collector sustained rate can be calculated by multiplying the analytic sustained rate by 1.5.
This table does not take into account other hardware specifications, such as bus speed, CPU model, or storage type.
R 6.2.0 38
Agenda - Lesson
41
GUI in 5.4
42
GUI in 5.6
43
GUI in 6.2
44
FortiAnalyzer – SOC / FortiView
45
FortiAnalyzer – FortiView (Compromised Hosts)
Machine Learning
Millions of Global
Sensors
Web Crawlers
200+ Threat Exchange
Hacker Sites/Forums
Community Submissions
FortiGuard Global Security Analysts
TIDB Botnet C&C IPs,
Malware Domain,
Malware URLs URLs
46
FortiAnalyzer – SOC Dashboard (Monitors)
47
FortiAnalyzer – Incidents & Events
48
FortiAnalyzer – Storage Trending and Visualizations
49
Resource
pod11 : pod11
pod12 : pod12
…
…
pod29 : pod29
pod30 : pod30
52
遠端連線主機資訊清單
53
或從 FortiClient 網站下載 Forticlient 程式
http://www.forticlient.com/
54
下載!、安裝!、執行!
55
建立一個新的 SSLVPN 設定檔
https://60.250.130.68 (SDL Portal Public IP )
https://10.1.201.200 (Fortinet Intranet Lab Portal)
60.250.130.68 or 10.1.201.200
56
下載!、安裝!、執行!
57
建立一個新的 SSLVPN 設定檔
https://60.250.130.68 (SDL Portal Public IP )
https://10.1.201.200 (Fortinet Intranet Lab Portal)
60.250.130.68
58
開啟 Forticlient 連線對應 SSLVPN 小組
59
SSLVPN 連線完成
Pod11 : 10.211.211.x
Pod12 : 10.212.212.x
…
…
Pod 30: 10.230.230.x
60
LAB 的環境配置
FortiGate WIN7 FortiAnalyzer
Internet
PodXX
OOB POD
NETWORK
10.10.2xx.0/24
62
Step 1 : 檢查你的 WIN7 OOB 連線
PODXX_RDP_WIN7
» Port 2: . 192.168.1.87/24
64
LAB01 – FAZ Basic Setup …
Language
Interface
Management
Gateway
Routing
Time Zone
License
DNS (option)
LAB01 – FAZ Basic Setup …
• Language
Interface
Management
Gateway
Routing
Time Zone
License
DNS (option)
LAB01-0 : 更改語系
Web GUI
67
LAB01-0 : 更改語系
Web GUI
68
LAB01-0 : 更改語系
Web GUI
5. 重新登入
右上角【登出】
69
LAB01-0 : 更改語系
Web GUI
70
LAB01 – FAZ Basic Setup …
Language
• Interface
• Management
• Gateway
• Routing
Time Zone
License
DNS (option)
LAB01-1 :
Step 1 : ssh 登入你的 FAZ
PODXX_RDP_WIN7
XX = POD
Number
10.10.2XX.87 Pod11
Pod12
Pod13
…
…
Pod30
Username = admin
Password =
72
LAB01-1 :
Step 2 : 測試你的 FAZ 能不能上網
PODXX_RDP_WIN7
» 為何不能上網?
73
LAB 的環境配置
FortiGate WIN7 FortiAnalyzer
Internet
PodXX
OOB POD
NETWORK
10.10.2xx.0/24
75
Step 3-1b : 設定你的 FAZ IntraLAN interface IP
Web GUI
1. Web UI login
2. 選擇【 System Settings 】
76
Step 3-1b : 設定你的 FAZ IntraLAN interface IP
Web GUI
1. Web UI login
2. 選擇【 System Settings 】
3. 選擇【 Network 】
4. 選擇【 All Interface 】
77
Step 3-1b : 設定你的 FAZ IntraLAN interface IP
Web GUI
1. 選擇 【 All Interface 】後
2. 點選設定【 Port2 】
按下【 Edit 】 , 設定其 IP
78
Step 3-1b : 設定你的 FAZ IntraLAN interface IP
Web GUI
設定 Port2 , edit
IP : 192.168.1.87/24
Administrative Access
HTTP , HTTPS ,
PING , SSH
79
Step 3-2b : 設定你的 FAZ Gateway
Web GUI
1. Web UI login
2. 選擇【 System Setting 】
80
Step 3-2b : 設定你的 FAZ Gateway
Web GUI
1. Web UI login
2. 選擇 System Setting
3. 選擇 Network
設定 Port1 Default Gateway
IP : 192.168.1.99
4. 測試 FAZ 網路連線
Exec Ping 168.95.1.1
OK, or not ______________
WHY__________________ 81
LAB 的環境配置
FortiGate WIN7 FortiAnalyzer
Internet
PodXX
OOB POD
NETWORK
10.10.2xx.0/24
1. Web UI login
2. 選擇【 System Setting 】
3. 選擇【 Network 】
4. 選擇【 Routing Table 】
83
Step 3-2b : 設定你的 FAZ Gateway
Web GUI
1. Web UI login
2. 選擇 System Setting
3. 選擇 Network
4. 選擇 Routing Table
5. Create new routing
Destination 0.0.0.0/0
Gateway 192.168.1.99
Device port2
6. 測試 FAZ 網路連線
Exec Ping 168.95.1.1
OK, or not _____________
84
LAB01 – FAZ Basic Setup …
Language
Interface
Management
Gateway
Routing
• Time Zone
License
DNS (option)
Step 3-3 : 設定 System time
Web GUI
1. Web UI login
2. 選擇【 System Setting 】
86
Step 3-3 : 設定 System time
Web GUI
1. Web UI login
2. 選擇【 System Setting 】
3. 選擇【 Dashboard 】
4. 選擇【 System Time 】
Time Zone 選
(GMT+8:00) Taipei
87
LAB01 – FAZ Basic Setup …
Language
Interface
Management
Gateway
Routing
Time Zone
• License
DNS (option)
Step 3-4 : Import your license
Web GUI
PODXX_RDP_WIN7
1. Web UI login
2. 選擇【 System Setting 】
3. 選擇【 Dashboard 】
4. 選擇【 License information 】
【 VM License 】
5. Upload Device License
89
LAB02 – FAZ Device Management
Add your Device in your FAZ
1. From FAZ manually
2. From FGT
LAB 的環境配置
FortiGate WIN7 FortiAnalyzer
Internet
PodXX
OOB POD
NETWORK
10.10.2xx.0/24
1. Web UI login
2. 選擇【 Device Manager 】
92
Lab02
Step 0 : Device Manager
93
Lab02
Step 0 : Device Manager
Column Setting
Device Name
IP Address
Platform
Logs
…
94
Step 1 : Device Manager
Lab02 Option 1 – Add Device from FAZ manually
1. Web UI login
2. 選擇
【 Device Manager 】
3. 選擇【 Add Device 】
IP Address
» 10.1.8.7
SN
» FG800D3915800145
Device Name
» FG800D
95
Step 1 : Device Manager
Lab02 Option 1 – Add Device from FAZ
1. IP Address:
10.1.8.7
2. SN:
FG800D3915800145
3. Device Name :
FG800D
96
Step 1 : Device Manager
Lab02 Option 2 – Add Device from FGT
5. 設定 IP : 192.168.1.87
6. 設定上傳格式 : Realtime
7. 按下 【 Test Connectivity 】
8. 按下 【 Apply 】 ( 可以 Disable Local Report 藉以優化 FGT 效能 )
97
Step 1 : Device Manager
Lab02 Option 2 – Add Device from FGT
1. Total
2. Unregistered
3. Log Status Down
4. Storage Used
98
Step 1 : Device Manager
Lab02 Option 2 – Add Device from FGT
1. 選擇 【 Unregistered 】
2. 勾選【設備】後
按下【 Authorize 】
99
Step 1 : Device Manager
Lab02 Option 2 – Add Device from FGT
1. 選擇 【 Unregistered 】
2. 勾選【設備】後
按下【 Authorize 】
3. 出現 Authorize Device ,
按下【 OK 】
100
Step 1 : Device Manager
Option 2 – Add Device from FGT
1. 選擇 【 Unregistered 】
2. 勾選【設備】後
按下【 Authorize 】
3. 出現 Authorize Device ,
按下【 OK 】
4. 觀察 Device Manager
5. Log is Green Light
Internet
PodXX
OOB POD
NETWORK
10.10.2xx.0/24
1. Web UI login
2. 選擇【 System Setting 】
106
Lab03-1
Step 2 : 設定開啟 ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 將【 Administrators Domain 】
開成 On
107
Lab03-1
Step 3 : 設定開啟 ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 將【 Administrators Domain 】
開成 On
4. 按下【 OK 】
確認開啟 ADOM
108
Lab03-1
Step 4 : 設定開啟 ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 將【 Administrators Domain 】
開成 On
4. 按下【 OK 】
確認開啟 ADOM
5. 系統自動登出 , 再登入
109
Lab03-1
Step 5 : 設定開啟 ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 將【 Administrators Domain 】
開成 On
4. 按下【 OK 】
確認開啟 ADOM
5. 系統自動登出 , 再登入
6. 選擇【 root 】 ADOM 點入
110
Lab03-1
Step 6 : 設定開啟 ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 將【 Administrators Domain 】
開成 On
4. 按下【 OK 】
確認開啟 ADOM
5. 系統自動登出 , 再登入
6. 選擇【 root 】 ADOM 點入
111
Lab03-2
Step 1 : 設定 Create Other ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 進入【 All ADOMs 】
112
Lab03-2
Step 2 : 設定 Create Other ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 進入【 All ADOMs 】
4. 按下【 Create New 】
113
Lab03-2
Step 3 : 設定 Create Other ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 進入【 All ADOMs 】
4. 按下【 Create New 】
5. 設定 New ADOMs
Name : Fortinet-HQ
Type : FortiGate
114
Lab03-2
Step 4 : 設定 Create Other ADOM
1. Web UI login
2. 選擇【 System Setting 】
3. 進入【 All ADOMs 】
4. 按下【 Create New 】
5. 設定 New ADOMs
Name : Fortinet-HQ
Type : FortiGate
Device : 【 FortiGate-VM 】
(may need to tune root ADOM to free disk quota for new ADOM)
115
Lab03-2
Step 5 : 設定 Create Other ADOM
116
117
Agenda - Lesson
FortiGate Devices Can Record The Following Types And Sub Types Of
LogType
Entry information Description Sub Type
Records traffic flow information, such as an
Traffic Local, Forward, Multicast, Sniffer
HTTP/HTTPS Request And Its response, If any.
AntiVirus, Application Control,
Security Records virus attack and intrusion attempts Data Leak Prevention (DLP),
(UTM) Intrusion Prevention (IPS), Email
Filter, Web Filter
System, High Availability, Router,
Records system and administrative events, such
Endpoint Control, GTP, Virtual
Event as downloading a backup copy of the
Private Network (VPN), WAD,
configuration, or daemon activities
Wireless, User
119
Understanding Log Messages
Priority Levels
Priority
Levels Name Description
0 Emergency The system is unusable or not responding
120
Understanding Log Messages
Log Schema Structure - Logs are divided into Header and Body Fields
• Header Contains the date and time the log originated, log identifier, message
identifier, administrative domain (ADOM), the log category, severity level, and
where the log originated. These fields are common to all log types.
• Body Describes the reason why the log was created and actions taken by the
FortiGate device to address it. These fields vary by log type
date=2014-07-04 time=14:26:59 logid=0001000014 type=traffic subtype=local
level=notice vd=vdom1 srcip=10.6.30.254 srcport=54705 srcintf="mgmt1"
dstip=10.6.30.1 dstport=80 dstintf="vdom1" sessionid=350696 status=close
policyid=0 dstcountry="Reserved" srccountry="Reserved" trandisp=noop
service=HTTP proto=6 app="Web Management" duration=13 sentbyte=1948
rcvdbyte=3553 sentpkt=9 rcvdpkt=9 devtype="FortinetDevice" osname="Fortinet
OS" mastersrcmac=00:09:0f:67:6c:31 srcmac=00:09:0f:67:6c:31
121
Understanding Log Messages
122
Understanding Log Messages
123
Understanding Log Messages
124
FortiAnalyzer and SQL
• FortiAnalyzer uses the internal PostgreSQL or external MySQL databases
to store the log data generated by the FortiGate
» Logs are received in Binary format and normalized in Raw Logs
» Individual Raw Logs for each device and log type are created
p.s. Starting with FortiAnalyzer software versions 5.0.7 and 5.2.0, remote SQL database support will only cover the insertion
of log data into the remote MySQL database. Historical log search and reporting capabilities, which rely on the remote SQL
data, will NO longer be supported.
125
Logging and reporting workflow
126
Log Processing Flow
Stand Alone Deployment
FORTIGATE FORTIANALYZER
127
Log Messages
More Information:
http://docs.fortinet.com/document/fortimanager/6.2.3/log-message-reference/
128
LAB04 – Back & Restore Log Files
LAB 的環境配置
FortiGate WIN7 FortiAnalyzer
Internet
PodXX
OOB POD
NETWORK
10.10.2xx.0/24
1. Web UI login
2. 選擇 ADOM :
Fortinet-HQ
3. 選擇【 Log View 】
131
Lab04-0
Step 1 : Check your Log
1. Web UI login
2. 選擇 ADOM :
Fortinet-HQ
3. 選擇【 Log View 】
4. 選擇【 Log Browse 】
132
Lab04-1
Step 1 : Use Web UI to backup log file
1. Web UI login
2. 選擇 ADOM :
Fortinet-HQ
3. 選擇【 Log View 】
4. 選擇【 Log Browse 】
5. 選擇 1. elog.log
6. 取消 Compress With gzip
7. 選擇【 Download 】
133
Lab04-1
Step 2: Use Web UI to import log file
1. Web UI login
2. 選擇 ADOM :
Fortinet-HQ
3. 選擇【 Log View 】
4. 選擇【 Log Browse 】
5. 選擇【 Import 】
6. 選擇剛下載的 Log 檔
7. 選擇【 OK 】
134
Lab04-1
Step 3: Check the Log status and view logs
1. Web UI login
2. 選擇 ADOM :
Fortinet-HQ
3. 選擇【 Log View 】
4. 選擇【 Log Browse 】
5. 選擇【 Import 】
6. 重新 refresh 網頁,可發現已匯入之檔案,檢視其 Type, Log
Files, From, To 等資訊
7. 亦可用【 Display 】檢視特定 Log 檔資訊
135
Lab04-1
Option Step: Use Web UI to import log file
1. Web UI login
2. 選擇 ADOM :
Fortinet-HQ
3. 選擇【 Log View 】
4. 選擇【 Log Browse 】
5. 選擇【 Import 】
6. 如果發生 “ Internal Error”,
【 Import 】前試著 un-gzip 該 Log 檔
136
Lab04-2 Use FTP load the log
Step 1 : Check your FTP Server Status
PODXX_RDP_WIN7
1. 從 System
Settings
Dashboard
CLI Console
Ping FTP Server
# exec ping 192.168.1.123
138
Lab04-2 Use FTP load the log
Step 3 : FAZ log backup from FTP Server
Backup all logs
execute backup logs-only <device name(s)| all> <ftp/sftp/scp> <ip> <username> <password> <directory>
139
Lab04-2 Use FTP load the log
Step 4 : FAZ log restore from FTP Server
Restore all logs
execute restore logs-only <device name(s)| all> <ftp/sftp/scp> <ip> <username> <password> <directory>
140
Lab04-2 Use FTP load the log
Step 5 : Check the Log status and view logs
1. Web UI login
2. 選擇【 Log View 】
3. 選擇【 Log Browse 】
4. 重新 refresh 網頁,可
發現已 Restore 之檔案,
檢視其 Type, Log
Files, From, To 等資
訊
141
Lab04-3 Schedule Backup Logs to FTP Server
Step 1 : Device Log Setting
1. 從 System Settings
Advanced
Device Log Settings
143
Lab04-3 Schedule Backup Logs to FTP Server
Step 2 : Automatically Delete Old Log Files
1. 從 System Settings
Advanced
File Management
(Automatically
Delete Log Files)
144
Agenda - Lesson
SSH to Generating
your FGT : 10.10.2XX.99
some logs or 192.168.1.99 PODXX_RDP_WIN7
On Fortigate CLI run diag log test several times (10 times)
146
Login in Log View
1. Web UI login
2. 選擇 Log View
147
Log View
1. Traffic
2. Event
3. Security
4. Custom View
5. Log Browse
6. Log Group
7. Storage Statistics
(move to System Settings -> Storage Info)
148
Log View
Traffic
149
Log View
Traffic – Filter
150
Log View
Traffic – Customize Time Slot View
151
Log View
Traffic – Column Settings
152
Log View
Traffic – Tools
1. Real-Time Log
2. Historical Log
3. Display Raw
4. Formatted Log
153
Log View
Traffic – Tools (Real-Time Log)
154
Log View
Traffic – Tools (Historical Log)
155
Log View
Traffic – Tools (Display Raw)
156
Log View
Traffic – Tools (Formatted Log)
157
Log View
Traffic – Custom View (Traffic in Last 5mins View)
158
Log View
Custom View - Traffic
159
Log View
Security
160
Log View
Event
161
Log View
Storage Statistics (move to System Settings -> Storage Info)
162
Log View
Storage Statistics (move to System Settings -> Storage Info)
163
Log View
Storage Statistics
164
Log View -> Storage Statistics move to
System Settings -> Storage Info
165
LAB05 – Log View
Step 1 : Generate the log by #diag log test
SSH to Generating
your FGT : 10.10.2XX.99
some logs or 192.168.1.99 PODXX_RDP_WIN7
On Fortigate CLI run diag log test several times (10 times)
167
Step 1 : Generate the log
•You will see the real time logs appearing
Generating some logs
168
LAB05
Lab05-1 :
客戶想了解 FortiGate-VM 的 Log Period 記錄到何時
__________________________________________________
Lab05-2 :
客戶想查詢 FortiGate-VM 上 , Source IP : 1.1.1.1 用了哪些
Application
__________________________________________________
Lab05-3
客戶想查詢 FortiGate-VM 上 , admin 登入的狀況
169
LAB05
Lab05-4 :
客戶想了解 FortiGate-VM 上 , Username = user 登出狀況
__________________________________________________
Lab05-5 :
客戶想查詢 FortiGate-VM 上 , Security Intrusion Prevention
__________________________________________________
Lab05-6
客戶想建立 Event System, Level=warning 的 客製化記錄顯示
170
171
Agenda - Lesson
1. Web UI login
2. 選擇 【 SOC 】
3. 選擇 【 FortiView 】
179
FortiView
Threats Top Threats
180
FortiView
Threats Threat Map
181
FortiView
Threats Comprised Hosts (need FortiGuard IOC license)
182
FortiView
Threats Comprised Hosts (Fortigate Policy Setting)
183
FortiView
Threats Comprised Hosts
184
FortiView
Traffic Top Source
185
FortiView
Traffic Top Destinations
186
FortiView
Traffic Top Country
187
FortiView
Traffic Hit Policy
188
FortiView
Applications & Websites Top Applications
189
FortiView
Applications & Websites Top Cloud Applications
190
FortiView
Applications & Websites Top Website Domains
191
FortiView
System Admin Logins
192
FortiView
System System Event
193
FortiView
System Resource Usage Drilldown
194
FortiView
System Failed Authentication Attempts
195
Agenda - Lesson
1. Web UI login
2. 選擇 【 SOC 】
3. 選擇 【 Monitors 】
197
SOC
Monitors Threats
198
SOC
Monitors Traffic
199
SOC
Monitors Applications & Websites
200
SOC
Monitors Compromised Hosts
201
SOC
Monitors Local System Performance
202
SOC
Monitors Archive Global Threat Research
203
SOC
Monitors Archive Threat Detection Timeline
204
SOC
Monitors (Create Your Own Dashboards)
205
LAB06 – FortiView
LAB06
Lab06-1 :
客戶想客製自己適用的 Monitors Dashboards
__________________________________________________
Lab06-2 :
客戶想查詢現在的環境哪個威脅 最多 (Top Threat) ,Have any P2P
__________________________________________________
Lab06-3
客戶想查詢現在的環境哪個 IP (Top Source) 流量最高 ? 在執行哪
些應用?
207
LAB06
Lab06-4 :
客戶想查詢哪個 Application (Top Application) 流量最高 ? 有沒有
Risk – High 的 Application ? 哪個 IP 在使用 ?
__________________________________________________
Lab06-5 :
客戶想查詢 admin 有沒有被人 Try 帳號
__________________________________________________
Lab06-6
客戶想查詢哪個網站最多人去
208
209
Agenda - Lesson
217
Sizing FAZ
218
Metrics
Sessions/Sec (CPS)
» Used to estimate LPS
219
Space
The raw logs on disk is first received in LZ4 format and then further
compressed/archived in .gz so the size is much smaller.
When the logs inserted into the database, The extra space from the SQL is
needed for storing the indexes, caches for fast performance of
FortiView/Reports, and the SQL's transaction logs, backup files etc so the
average size of a log gets much bigger.
http://fastcompression.blogspot.com.ar/2011/05/lz4-explained.html
220
Space -- Experience
Required Storage Size = Log Rate * Log Size * 86400 * Storage Period
For large existing deployments, there may be other tools available to measure the customer's unique usage and tune
these accordingly
221
Sizing Wizard
222
Existing Networks
223
Sizing Tool – Output
224
New Deployments
10%
Log/Sec=2~3% x Sessions/sec
IPS
App Control
AV
Botnet
DNS
2~3%
Log/Sec=Sessions/sec
Firewall Only
1:1
Sessions/sec
226
Scenarios Summary
Existing Network
» 20,000 LPS
» 3 Months Analytics / 1 Year Archive Requirements
# execute top
# get sys performance
# diagnose debug crashlog read
229
Hardware Commands
230
Log Daemon
231
SQL Commands
232
Diagnose
Sniffer
diagnose sniffer packet <interface> <filter>
<verbose> <count> <Timestamp_format>
233
Sniffer
234
Agenda - Lesson
1. Web UI login
2. 選擇 【 Incidents & Events 】
236
Event Management
Enable Event Handler List (# diag log test to trigger Events)
237
Event Management
All Events
238
Event Management
Raise Incident & Incidents Management
239
Event Management
FortiGate Event Handles (Automation with FortiGate)
240
Event Management
FortiGate Event Handles (Automation with FortiGate)
241
Event Management
FortiAnalyzer-build1631-postgres.schema
242
Agenda - Lesson
1. Web UI login
2. 選擇 【 Reports 】
244
Reports
All Reports
1. Web UI login
2. 選擇 【 Reports 】
3. 選擇 【 All Reports 】
245
Reports
Datasets
1. Web UI login
2. 選擇 【 Reports 】
3. 選擇 【 Datasets 】
246
Reports
Datasets
1. Web UI login
2. 選擇 【 Reports 】
3. 選擇 【 Datasets 】
4. 選擇
【 Top-User-by-Session 】
247
Reports
Datasets
1. Web UI login
2. 選擇 【 Reports 】
3. 選擇 【 Datasets 】
4. 選擇
【 Top-User-by-Session 】
按下右鍵 選擇【 View 】
248
Reports
FAZ Reports
Datasets
249
LAB07 – Customize a FAZ Report
LAB07
Dataset Examples
251
LAB07
Step 1 – Create a new dataset named as FAZ-Lab07
New Dataset Examples
Name : FAZ-Lab07
Log Type : Traffic
Query :
Time Period:
This Quarter
252
LAB07
Step 2 – Test from Query
Dataset Examples
Name : FAZ-Lab07
Log Type : Traffic
Query :
Time Period:
This Quarter
按下【 Test 】
253
LAB07
Step 3 – Select
Query :
SELECT srcip as ip, user, hostname, catdesc, app, appcat
FROM $log
WHERE dstport IN ('80','443') What is this user?
Dataset Examples
254
LAB07
Step 4 – Select User
Query :
SELECT srcip as ip, nullifna(`user`) as username, hostname, catdesc, app, appcat
FROM $log
WHERE dstport IN ('80','443')
GROUP BY ip, username, hostname, catdesc, app, appcat
Dataset Examples
255
LAB07
Step 5 – How can we avoid empty fields
Query :
SELECT srcip as ip, nullifna(`user`) as username, hostname, catdesc, app, appcat
FROM $log
WHERE dstport IN ('80','443') How can we avoid empy
fields?
GROUP BY ip, username, hostname, catdesc, app, appcat
Dataset Examples
256
LAB07
Step 6 – How can we avoid empty fields
Query :
SELECT srcip as ip, coalesce(nullifna(`user`),'-') as
username,coalesce(nullifna(`hostname`),ipstr(`dstip`)) as dsthost,coalesce(nullifna(`catdesc`),'-')
as category,app, appcat, count(*) as request
FROM $log
WHERE dstport IN ('80','443')
GROUP BY ip, username, dsthost, category, app, appcat
ORDER BY ip desc, dsthost
Dataset Examples
257
LAB07
Step 7 – Create a new chart
New Chart Library Examples
Name : FAZ-Lab07
Dataset : FAZ-Lab07
258
LAB07
Step 7 – Create a new chart
New Chart Library Examples
Name : FAZ-Lab07
Dataset : FAZ-Lab07
Reset to Default
if you change the dataset
259
LAB07
Step 7 – Create a new chart
New Chart Library Examples
Name : FAZ-Lab07
Dataset : FAZ-Lab07
260
LAB07
Step 8 – Create a new Report
Create a New Report for “All Reports”
Name : FAZ-Lab07
261
LAB07
Step 8 – Create a new Report
Create a New Report
Name : FAZ-Lab07
Create Form : Blank
262
LAB07
Step 8 – Create a new Report
Create a New Report
Name : FAZ-Lab07
Create Form : Blank
263
LAB07
Step 8 – Create a new Report
Create a New Report -- Layout
“Layout” TAB
Insert Chart
Chart : FAZ_Lab07
Title : Top N Users
按下【 OK 】
264
LAB07
Step 8 – Create a new Report
Create a New Report -- Layout
“Layout” TAB
Insert Chart
Chart : FAZ_Lab07
Title : Top N Users
按下【 OK 】
265
LAB07
Step 8 – Create a new Report
Create a New Report -- Layout
“Layout” TAB
Insert Chart
Chart : FAZ_Lab07
Title : Top N Users
按下【 OK 】
“Setting” TAB
Time Period = This Quarter
接著選擇 【 View Report 】
266
LAB07
Step 8 – Create a new Report
Create a New Report -- View Report
267
LAB07
Step 8 – Create a new Report
Create a New Report -- View Report
268
LAB07
Step 8 – Create a new Report
Create a New Report -- View Report
Report Layout
269
LAB07-2
SELECT
coalesce(nullifna(`user`),ipstr(`srcip`)) as username,
sentbyte, rcvdbyte
FROM $log
WHERE $filter 270
LAB07-2
Step 1 – Create a new the Dataset “ FAZ-Lab07-Bandwidth ”
Query :
SELECT coalesce(nullifna(`user`),ipstr(`srcip`)) as username,
If empty fill with ‘user’
round(sum(coalesce(sentbyte,0))/1024,2) as KBsent, or IP Address
round(sum(coalesce(rcvdbyte,0))/1024,2) as KBrcvd,
Express on KB
round(sum(coalesce(sentbyte,0))/1024+sum(coalesce(rcvdbyte,0))/1024,2) as KB_total
FROM $log
WHERE $filter Add all bytes
GROUP BY username
ORDER BY username asc Round with this decimals
Dataset Examples
271
LAB07-2
Step 2 – Create other new chart for Bandwidth
New Chart Library Examples
Name : FAZ-Lab07-Bandwidth
Dataset : FAZ-Lab07-Bandwidth
272
LAB07-2
Step 3 – Insert chart to exist Report
Name : FAZ-Lab07
選擇 Edit
273
LAB07-2
Step 4 – Modify a Report
Report -- Layout
“Layout” TAB
按下【 Insert Chart 】
Chart : FAZ_Lab07-Bandwidth
Title : Top N Bandwidth
按下【 OK 】
274
LAB07-2
Step 5 – Report Result
275
LAB07-3
Client asked a table report with Now client asked us to create a
Dataset
source IP Examples report showing bandwidth consuming per user
username (if available)
website/hostname accessed
website category
application name
application category
only considering TCP port 80 and port 443
Dataset Examples
277
LAB07-3
Step 2 – Solve unknown interface issue
Query :
Filter unknown interfaces
SELECT devid, srcintf,
round(sum(coalesce(sentbyte,0))/1024,2) as KBsent,
round(sum(coalesce(rcvdbyte,0))/1024,2) as KBrcvd,
round(sum(coalesce(sentbyte,0))/1024+sum(coalesce(rcvdbyte,0))/1024,2) as KB_total
FROM $log
WHERE $filter and srcintf not like 'unknown%' and srcintf not like 'root'
GROUP BY devid, srcintf
ORDER by devid, srcintf
Dataset Examples
278
LAB07-3
Step 3 – Create other new chart for Interface
New Chart Library Examples
Name : FAZ-Lab07-Interface
Dataset : FAZ-Lab07-Interface
279
LAB07-3
Step 4 – Insert chart to exist Report
Name : FAZ-Lab07
選擇 Edit
280
LAB07-3
Step 5 – Modify a Report
Report -- Layout
“Layout” TAB
按下【 Insert Chart 】
Chart : FAZ_Lab07-Interface
Title : Interfaces Utilization
按下【 OK 】
281
LAB07-3
Step 6 – Report Result
282
283
Feedback form
https://goo.gl/forms/WRxIJRadYPa2hMNN2