Fortinet FortiGate Series Administration Manual page 485

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

Firewall Protection Profile
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903
http://docs.fortinet.com/
Feedback
FortiGuard Web
FortiGuard Web Filtering options for HTTPS:
Filtering
Go to Firewall > Profile. Add or edit a protection profile and configure Web
Filtering > FortiGuard Web Filtering for HTTPS. For more information, see
"FortiGuard Web Filtering options" on page
Email Filtering
Email filtering options for IMAPS, POP3S, and SMTPS:
Go to Firewall > Protection Profile. Add or edit a protection profile and
configure Spam Filtering for IMAPS, POP3S, and SMTPS. For more
information, see
Data Leak Prevention
DLP for HTTPS, IMAPS, POP3S, and SMTPS. To apply DLP, follow the
steps below:
DLP archiving
DLP archiving for HTTPS, IMAPS, POP3S, and SMTPS. Add DLP Rules
for the protocol to be archived. See
Enable FortiGuard Web Filtering
Enable FortiGuard Web Filtering Overrides
Provide details for blocked HTTP 4xx and 5xx errors
Rate images by URL (blocked images will be replaced with blanks)
Allow websites when a rating error occurs
Strict Blocking
Rate URLs by domain and IP address
FortiGuard Email Filtering (or Antispam) IP address check, URL check,
E-mail checksum check, and Spam submission
IP address BWL check
HELO DNS lookup
E-mail address BWL check
Return e-mail DNS check
Banned word check
Spam Action
Tag Location
Tag Format
"Email Filtering options" on page
Go to UTM > Data Leak Prevention > Rule to add DLP rules. For
HTTPS, add an HTTP rule and select HTTPS POST and HTTPS GET.
For IMAPS, POP3S, and SMTPS, add an Email rule and select
IMAPS, POP3S, and SMTPS. See
on page
596.
Go to UTM > Data Leak Prevention > Sensor and add the DLP rules to
a DLP sensor. See
"Adding or editing a rule or compound rule in a DLP
sensor" on page
585.
Go to Firewall > Protection Profile. Add or edit a protection profile and
use Data Leak Prevention Sensor to add the DLP sensor to a
protection profile. Note: In a protection profile, if you set Protocol
Recognition > HTTPS Content Filtering Mode to URL Filtering, DLP
rules cannot inspect HTTPS. Set this option to Deep Scan.
Go to Firewall > Policy and add the protection profile to a firewall
policy. See
"Data Leak Prevention Sensor options" on page
SSL content scanning and inspection
495.
498.
"Adding or configuring DLP rules"
"DLP archiving" on page
588.
501.
485

Advertisement

Table of Contents
loading

Table of Contents