Wan Optimization Monitoring - Fortinet FortiGate Series Administration Manual

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

WAN optimization monitoring

WAN optimization monitoring
690
Authentication
The method used to authenticate the tunnels: certificate (plus certificate
name) or pre-shared key.
method
Peer(s)
The host IDs of the peers added to the authentication group. When you add
the authentication group to a WAN optimization rule, only these FortiGate
units can authenticate to use this WAN optimization rule. Peer(s) can be any
peer, a peer added to the FortiGate unit peer list (defined peers), or a
selected peer.
Adding or modifying an authentication group
Create New
Select to add a new authentication group
Edit icon
Select Edit beside an existing authentication group to modify it.
Delete icon
Select to delete an authentication group.
Name
Add or change the name of the authentication group. Select this name when
adding the authentication group to a rule.
Other FortiGate units that participate in WAN optimization tunnels with this
FortiGate unit must have an authentication group with the same name.
Authentication
Select the authentication method to use.
Method
Select Certificate if you want to use a certificate to authenticate and encrypt
WAN optimization tunnels.
Select Pre-shared key if you want to use a pre-shared key or password to
authenticate and encrypt WAN optimization tunnels.
Certificate (list)
Available only when Authentication Method is Certificate.
Select a local certificate that has been added to this FortiGate unit. Other
FortiGate units that participate in WAN optimization tunnels with this
FortiGate unit must have an authentication group with the same name and
certificate.
Go to System > Certificates > Local Certificates to add a local certificate to a
FortiGate unit.
Password
Available only when Authentication Method is Pre-shared key.
Add the password (or pre-shared key) used by the authentication group.
Other FortiGate units that participate in WAN optimization tunnels with this
FortiGate unit must have an authentication group with the same name and
password.
The key must contain at least 6 printable characters and should be known
only by network administrators. For optimum protection against currently
known attacks, the key should consist of a minimum of 16 randomly chosen
alphanumeric characters.
Peer Acceptance
One or more of the following options are available to authenticate WAN
optimization peers:
Accept Any Peer Authenticate with any peer. Use this setting if you do not know the peer host
IDs or IP addresses of the peers that will use this authentication group. This
setting is most often used for WAN optimization with the FortiClient
application.
Accept Defined
Authenticate with any peer in the FortiGate unit peer list.
Peers
Specify Peer
Authenticate with the selected peer only. Select this option and then select
the peer to add to this authentication group.
Using WAN optimization monitoring, you can view and improve WAN optimization
performance. The monitoring tools help isolate performance problems, aid in
troubleshooting, and enable network optimization and capacity planning.
The monitor unit uses collected log information and presents it in a graphical format to
show network traffic summary and bandwidth optimization information.
To view the WAN optimization monitor, go to WAN Opt. & Cache > Monitor.
WAN optimization and web caching
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903
http://docs.fortinet.com/
Feedback

Advertisement

Table of Contents
loading

Table of Contents