![]() In part 2 of this blog, I will talk about the benefits of having SonicWALL reporting. Scroll up and hit Accept at the top and in a few minutes you should be seeing some nice SonicWALL reports being generated by Scrutinizer.įor a look at how Scrutinizer reports on IPFIX data from SonicWALL hardware read Mike’s blog. Make sure that is checked and change Kilobytes Exchanged to 1. You can leave these alone until you get to Report Flows on Kilo Bytes Exchanged. Now scroll down a bit until you reach Event Settings. In this case I needed to re-visit the SNMP interface counters in our Fortigate Firewalls and since. In this configuration, I am not enabling the IPFIX Collector, because I am using Scrutinizer to do my 3 rd party collecting. SNMP SNMP enables you to monitor hardware on your network FortiAP-S and FortiAP-W2 support all SNMP versions (v1, v2, and v3) Monitor ports 1 - 6 on the Cisco core switch Monitor ports 1 - 6 on the Cisco core switch. This is good to have checked off for dynamic flows like we are about to send. Now I would check off both boxes to Send Static Flows and Templates at Regular Intervals. The External Collector UDP Port is where you input whichever port you prefer just make sure port 2055 is not blocked on the firewall. Now enter the IP address of the server running Scrutinizer in the External Collector’s IP Address and (if you must) input the IP address to the VPN Tunnel. This allows Scrutinizer to report on all the juicy SonicWALL templates. When you drop that down and click the IPFIX with extensions. ![]() A few more options down the list you will check off External Flow Reporting Type. All of these allow you to export flows, report to a flow collector within the SonicWALL network, control what flows are reported externally or internally, and report based on already existing firewall rules.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |