Fortinet FortiGate Series Administration Manual page 403

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

Firewall Policy
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903
http://docs.fortinet.com/
Feedback
Service
Available Services
Selected Services
Schedule
Protection Profile
Traffic Shaping
Reverse Direction
Traffic Shaping
Reverse Direction
Traffic Shaping
Log Allowed Traffic
For information about how to create a firewall encryption policy for SSL VPN users, see
the "SSL VPN administration tasks" chapter of the
Figure 215: Selecting user groups for authentication
Enable Identity Based
Policy
Add
Rule ID
List of available services to include in the firewall policy. To add a
service to the list, select the name and then select the Right Arrow.
List of services that are included in the firewall policy. To remove a
service from the list, select the name and then select the Left Arrow.
Select a one-time or recurring schedule that controls when the policy
is in effect.
You can also create schedules by selecting Create New from this list.
For more information, see
"Firewall Schedule" on page
Select a protection profile to apply to a firewall policy. You can also
create a protection profile by selecting Create New from this list. For
more information, see
"Firewall Protection Profile" on page
Select a traffic shaper for the policy. You can also select to create a
new traffic shaper. Traffic Shaping controls the bandwidth available to,
and sets the priority of the traffic processed by, the policy.
For information about traffic shaping, see
page
441.
Select to enable the reverse traffic shaping. For example, if the traffic
direction that a policy controls is from port1 to port2, select this option
will also apply the policy shaping configuration to traffic from port2 to
port1.
Select to enable the reverse traffic shaping. For example, if the traffic
direction that a policy controls is from port1 to port2, select this option
will also apply the policy shaping configuration to traffic from port2 to
port1.
Select to record messages to the traffic log whenever the policy
processes a connection. You must also enable traffic log for a logging
location (syslog, WebTrends, local disk if available, memory, or
FortiAnalyzer) and set the logging severity level to Notification or lower
using the Log and Report screen. For more information see
"Log&Report" on page
709.
FortiGate SSL VPN User
Select to enable identity-based policy authentication.
Select to create an identity-based firewall policy.
The ID number of the policy.
Configuring firewall policies
437.
479.
"Traffic Shaping" on
Guide.
Move Up
or Move Down
Delete
Edit
403

Advertisement

Table of Contents
loading

Table of Contents