Fortinet FortiGate Series Administration Manual page 607

Hide thumbs Also See for FortiGate Series:
Table of Contents

Advertisement

Application Control
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903
http://docs.fortinet.com/
Feedback
Category
Application
Action
Options
Session TTL
Enable Logging
In addition to these option, some IM applications and VoIP protocols have additional
options:
IM options
Block Login
Block File Transfers
Block Audio
Inspect Non-standard
Port
Display content meta-
information on the
system dashboard
VoIP options
Limit Call Setup
Limit REGISTER
request
Limit INVITE request
Enable Logging of
Violations
Other options
Command
Method
Adding or configuring an application control black/white list entry
The applications are categorized by type. If you want to choose an IM
application, for example, select the im category, and the application
black/white list will show only the im applications.
The Category selection can also be used to specify an entire category
of applications. To select all IM applications for example, select the im
category, and select all as the application. This specifies all the IM
applications with a single application control black/white list entry.
The FortiGate unit will examine network traffic for the listed
application. If Application is all, every application in the selected
category is included.
If the FortiGate unit detects traffic from the specified application, the
selected action will be taken.
The application's session TTL. If this option is not enabled, the TTL
defaults to the setting of the config system session-ttl CLI
command.
When enabled, the FortiGate unit will log the occurrence and the
action taken if traffic from the specified application is detected.
Select to prevent users from logging in to the selected IM system.
Select to prevent the sending and receiving of files using the selected
IM system.
Select to prevent audio communication using the selected IM system.
Select to allow the FortiGate unit to examine non-standard ports for
the IM client traffic.
Select to include meta-information detected for the IM system on the
FortiGate unit dashboard.
Enter the maximum number of calls each client can set up per minute.
Enter the maximum number of register requests per second allowed
for the firewall policy.
Enter the maximum number of invite requests per second allowed for
the firewall policy.
Select to enable logging of violations.
Some of traffic types include a command option. Specify a command
that appears in the traffic that you want to block or pass.
For example, enter GET as a command in the FTP.Command
application to have the FortiGate unit examine FTP traffic for the GET
command. Multiple commands can be entered.
A method option is available for HTTP, RTSP, and SIP protocols.
Specify a method that appears in the traffic that you want to block or
pass.
For example, enter POST as a method in the HTTP.Method application
to have the FortiGate unit examine HTTP traffic for the POST method.
Multiple methods can be entered.
607

Advertisement

Table of Contents
loading

Table of Contents