Carrier web-based manager settings

Logging

You can enable logging in an MMS profile to write event log messages when the MMS profile options that you have enabled perform an action. For example, if you enable MMS antivirus protection, you could also use the MMS profile logging options to write an event log message every time a virus is detected.

You must first configure how the unit stores log messages so that you can then record these logs messages. For more information, see the FortiOS Handbook Logging and Reporting guide.

 

Logging

MMSAntivirus                             If antivirus settings are enabled for this MMS profile, select the following options to record Antivirus Log messages.

Viruses                              Record a log message when this MMS profile detects a virus.

Blocked Files                   Record a log message when antivirus file filtering enabled in this MMS profile blocks a file.

Intercepted Files             Record a log message when this MMS profile intercepts a file.

Oversized Files/E- mails Record a log message when this MMS profile encounters an oversized file or email message. Oversized files and email messages cannot be scanned for viruses.

MMS Scanning If MMS scanning settings are enabled for this MMS profile, select the fol- lowing options to record Email Filter Log messages.

Logging

Notification Messages    Select to log the number of MMS notification messages sent.

Bulk Messages Select to log MMS Bulk AntiSpam events. You must also select which pro- tocols to write log messages for in the MMS bulk email filtering part of the MMS profile.

Carrier Endpoint Filter

Block

MMS Content Check- sumSelect to log MMS carrier endpoint filter events, such as MSISDN fil- tering. Select to log MMS content checksum activity.

Content Block                  Select to log content blocking events.

MMS Content Checksum

The MMS Content Checksum menu allows you to configure content checksum lists.

Configure MMS content checksum lists in Security Profiles > MMS Content Checksum using the following table.

MMS Content Checksum

Lists each individual content checksum list that you created. On this page, you can edit, delete or create a content checksum list.

 

Create New

Creates a new MMS content checksum list. When you select Create New, you are automatically redirected to the New List. This page provides a name field and comment field. You must enter a name to go to MMS Con- tent Checksum Settings page.

 

Edit      Modifies settings to a MMS content checksum. When you select Edit, you are automatically redirected to the MMS Content Checksum Settings page.

Removes an MMS content checksum from the page.

Delete

To remove multiple content checksum lists from within the list, on the MMS Content Checksum page, in each of the rows of the content checksum lists you want removed, select the check box and then select Delete.

To remove all content checksum lists from list, on the MMS Content Check- sum page, select the check box in the check box column and then select Delete.

 

Name                                           The name of the MMS content checksum list that you created.

# Entries                                     The number of checksums that are included in the content checksum list.

MMS Profiles                             The MMS profile or profiles that have the MMS content checksum list applied. For example if two different MMS profiles use this content check- sum list, they will both be listed here.

Comments                                  A description given to the MMS content checksum.

Ref.                                              Displays the number of times the object is referenced to other objects. For example, av_1 profile is applied to a security policy; on the Profile page (Security Profiles > AntiVirus > Profiles), 1 appears in Ref. .

To view the location of the referenced object, select the number in Ref., and the Object Usage window appears displaying the various locations of the referenced object.

To view more information about how the object is being used, use one of the following icons that is avialable within the Object Usage window:

  • View the list page for these objects – automatically redirects you to the list page where the object is referenced at.
  • Edit this object – modifies settings within that particular setting that the object is referenced with. For example, av_1 profile is referenced with a security policy and so, when this icon is selected, the user is redirected to the Edit Policy page.
  • View the details for this object – table, similar to the log viewer table, contains information about what settings are configured within that par- ticular setting that the object is referenced with. For example, av_1 profile is referenced with a security policy, and that security policy’s settings appear within the table.

Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

This entry was posted in FortiOS 5.4 Handbook on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.