Fortinet black logo

Performance monitoring

Copy Link
Copy Doc ID 7c8e21ef-1be2-11ec-8c53-00505692583a:727505
Download PDF

Performance monitoring

FortiGate supports multiple protocols for monitoring resource utilization, such as SNMPv3, NetFlow, and sFlow. These protocols are used to measure the performance of the FortiGate and provide insight into the traffic that it is passing.

SNMP polling and traps can be used to optimize monitoring, and the results should be collected and consolidated into meaningful output. A variety of third party SNMP reporting applications can be used to analyze collected results.

Resource monitoring helps to establish resource utilization baselines that can be useful for:

  • Configuring IPS signature rates.

  • Recognizing abnormal activity, such as when an attack is occurring.

  • Comparing the bandwidth utilization over specific time spans, such as month to month or year to year, to plan for growth.

  • Comparing the bandwidth utilization between different WANs, and applying SD-WAN and traffic shaping as needed.

  • Tuning security profiles to optimize resource usage.

Performance monitoring

FortiGate supports multiple protocols for monitoring resource utilization, such as SNMPv3, NetFlow, and sFlow. These protocols are used to measure the performance of the FortiGate and provide insight into the traffic that it is passing.

SNMP polling and traps can be used to optimize monitoring, and the results should be collected and consolidated into meaningful output. A variety of third party SNMP reporting applications can be used to analyze collected results.

Resource monitoring helps to establish resource utilization baselines that can be useful for:

  • Configuring IPS signature rates.

  • Recognizing abnormal activity, such as when an attack is occurring.

  • Comparing the bandwidth utilization over specific time spans, such as month to month or year to year, to plan for growth.

  • Comparing the bandwidth utilization between different WANs, and applying SD-WAN and traffic shaping as needed.

  • Tuning security profiles to optimize resource usage.