Fortinet FortiGate Series Administration Manual page 13

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

Contents
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903
http://docs.fortinet.com/
Feedback
Customizable routing widgets ................................................................................... 377
Access List.............................................................................................................. 377
Distribute List .......................................................................................................... 378
Key Chain ............................................................................................................... 378
Offset List................................................................................................................ 379
Prefix List ................................................................................................................ 380
Route Map .............................................................................................................. 380
Router Monitor ..................................................................................... 383
Viewing routing information ...................................................................................... 383
Searching the FortiGate routing table....................................................................... 385
Firewall Policy ...................................................................................... 387
How list order affects policy matching ..................................................................... 387
Moving a policy to a different position in the policy list ........................................... 388
Enabling and disabling policies............................................................................... 389
Multicast policies ........................................................................................................ 389
Viewing the firewall policy list ................................................................................... 390
Configuring firewall policies ...................................................................................... 391
Adding authentication to firewall policies ................................................................ 396
Identity-based firewall policy options (non-SSL-VPN) ............................................ 397
IPSec firewall policy options ................................................................................... 399
Configuring SSL VPN identity-based firewall policies............................................. 400
Using DoS policies to detect and prevent attacks ................................................... 404
Viewing the DoS policy list...................................................................................... 404
Configuring DoS policies ........................................................................................ 406
Using one-arm sniffer policies to detect network attacks ...................................... 406
Viewing the sniffer policy list................................................................................... 407
Configuring sniffer policies...................................................................................... 409
How FortiOS selects unused NAT ports ................................................................... 410
Global pool.............................................................................................................. 411
Global per-protocol pool ......................................................................................... 411
Per NAT IP pool...................................................................................................... 411
Per NAT IP, destination IP, port, and protocol pool ................................................ 412
Firewall policy examples ............................................................................................ 414
Scenario one: SOHO-sized business ..................................................................... 414
Scenario two: enterprise-sized business ................................................................ 417
Firewall Address .................................................................................. 421
About firewall addresses............................................................................................ 421
Viewing the firewall address list................................................................................ 422
Configuring addresses ............................................................................................... 423
Viewing the address group list .................................................................................. 424
13

Advertisement

Table of Contents
loading

Table of Contents