Fortinet FortiGate-60 series Administration Manual

Fortinet FortiGate-60 series Administration Manual

Hide thumbs Also See for FortiGate-60 series:
Table of Contents

Advertisement

ADMINISTRAT ION GUIDE
FortiGate™
Version 3.0 MR4
www.fortinet.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FortiGate-60 series and is the answer not in the manual?

Questions and answers

Summarization of Contents

Web-based manager
Button bar features
Explains the features accessible from the web-based manager button bar, including customer support and online help.
Web-based manager pages
Describes the web-based manager interface, including the menu structure, tabs, and page navigation.
System Status
Status page
Describes the System Status page, providing a snapshot of the FortiGate unit's operating status, license, and resource usage.
Changing system information
Details how to change the system time, host name, and operation mode for the FortiGate unit.
Changing the FortiGate firmware
Explains procedures for upgrading to a newer firmware version or reverting to a previous firmware version.
Viewing Statistics
Provides information on sessions, content archiving, and network protection activity, with details available per item.
Topology viewer
Explains how to diagram and document the networks connected to your FortiGate unit using the Topology viewer.
Using virtual domains
Virtual domains
Explains how virtual domains (VDOMs) enable a FortiGate unit to function as multiple independent units.
Enabling VDOMs
Guides on enabling multiple VDOM operation on the FortiGate unit using the default admin account.
Configuring VDOMs and global settings
Details configuration settings exclusive to virtual domains and global settings affecting all VDOMs.
System Network
Interface
Describes configuring FortiGate interfaces and DNS settings, including VLANs and zones.
Configuring the modem interface
Explains how to configure modem settings for backup or standalone Internet connection in NAT/Route mode.
VLAN overview
Explains what VLANs are and how they segregate devices logically.
VLANs in NAT/Route mode
Describes how FortiGate units control traffic flow between VLANs in NAT/Route mode.
VLANs in Transparent mode
Explains applying firewall policies to traffic on an IEEE 802.1 VLAN trunk in Transparent mode.
FortiGate IPv6 support
Details assigning IPv4 and IPv6 addresses to interfaces and configuring IPv6 traffic.
System Wireless
The FortiWiFi wireless LAN interface
Describes configuring the FortiWiFi Wireless interface for access point or client mode.
System wireless settings (FortiWiFi-60)
Details configuring wireless LAN settings for FortiWiFi-60 units.
System wireless settings (FortiWiFi-60A and 60AM)
Explains configuring wireless LAN settings for FortiWiFi-60A and 60AM units.
Wireless MAC Filter
Describes allowing or denying wireless access to users based on their MAC address.
Wireless Monitor
Explains how to view connected users on the wireless LAN and monitor their activity.
System DHCP
FortiGate DHCP servers and relays
Describes DHCP services provided by FortiGate interfaces and VLAN subinterfaces.
Configuring DHCP services
Details configuring DHCP services, including relays and servers, and viewing address leases.
Viewing address leases
Explains how to view IP addresses assigned by DHCP servers and corresponding client MAC addresses.
System Config
HA
Describes FortiGate high availability (HA) for enhanced reliability and performance.
SNMP
Explains configuring the SNMP agent for hardware monitoring and trap reporting.
Replacement messages
Details changing replacement messages for alerts and customized content streams.
Operation mode and VDOM management access
Explains changing VDOM operation modes and managing administrative access.
System Admin
Administrators
Describes configuring administrator accounts with varying levels of access.
Access profiles
Explains how access profiles control access to features based on categories.
FortiManager
Describes configuring the FortiGate unit to be managed through a FortiManager server.
Settings
Details setting administrative ports, idle timeout, language, and LCD PIN protection.
System Maintenance
Backup and restore
Describes backing up and restoring system configuration and managing firmware.
FortiGuard Center
Explains configuring the FortiGate unit for FortiGuard Distribution Network (FDN) and services.
License
Details purchasing license keys to increase the maximum number of VDOMs.
System Chassis (FortiGate-5000 series)
SMC (shelf manager card)
Describes viewing the status of shelf manager cards (SMCs) in FortiGate-5000 series chassis.
Blades (FortiGate-5000 chassis slots)
Displays a list of slots in FortiGate-5000 chassis and information about installed modules.
Chassis monitoring event log messages
Explains log messages related to chassis monitoring for temperature, voltage, and fan speeds.
Router Static
Routing concepts
Explains general routing concepts and how the FortiGate unit performs routing functions.
Static Route
Describes defining static routes and creating route policies.
Policy Route
Explains how to define route policies based on packet properties.
Router Dynamic
RIP
Explains the RIP distance-vector routing protocol and its implementation.
OSPF
Describes the OSPF link-state routing protocol used in large heterogeneous networks.
BGP
Explains the BGP Internet routing protocol for exchanging routing information.
Multicast
Details how FortiGate units operate as Protocol Independent Multicast (PIM) routers.
Router Monitor
Displaying routing information
Explains how to interpret the Routing Monitor list and display routes from the routing table.
Searching the FortiGate routing table
Guides on applying filters to search the routing table and display specific routes.
Firewall Policy
About firewall policies
Explains that firewall policies control traffic and are instructions for connection decisions.
Viewing the firewall policy list
Describes how to view, add, delete, and re-order policies in the policy list.
Configuring firewall policies
Details how to define firewall policies to apply to communication sessions.
Firewall policy examples
Provides practical applications of firewall policies in SOHO and enterprise environments.
Firewall Address
About firewall addresses
Defines what a firewall address can be and how to enter IP addresses and netmasks.
Configuring addresses
Details creating and editing firewall addresses, IP ranges, or FQDNs.
Configuring address groups
Explains creating address groups to organize related addresses for easier policy configuration.
Firewall Service
Viewing the predefined service list
Explains how to view predefined services available globally on the FortiGate unit.
Configuring custom services
Details creating custom services for policies when services are not in the predefined list.
Configuring service groups
Details creating groups of services to simplify policy creation.
Firewall Schedule
Configuring one-time schedules
Details creating one-time schedules to activate or deactivate policies for a specified period.
Configuring recurring schedules
Details creating recurring schedules to activate or deactivate policies at specified times or days.
Firewall Virtual IP
Virtual IPs
Describes FortiGate Virtual IPs and how they are used in firewall policies for connections.
Configuring virtual IPs
Details adding and editing virtual IPs, including static NAT and load balancing.
IP pools
Describes using IP pools to add NAT policies that translate source addresses.
Configuring IP Pools
Details adding IP pools to interfaces and selecting them for firewall policies.
Firewall Protection Profile
What is a protection profile
Defines a protection profile as a group of settings to adjust for specific traffic protection.
Configuring a protection profile
Details configuring antivirus, web filtering, spam filtering, and IPS options.
Adding a protection profile to a policy
Explains enabling protection profiles for firewall policies with specific actions and services.
VPN IPSEC
Overview of IPSec interface mode
Provides information about route-based IPSec VPN options available through the web-based manager.
Auto Key
Explains configuring IPSec phase 1 and phase 2 exchanges to generate unique IKE keys automatically.
Manual Key
Details manually defining cryptographic keys for establishing IPSec VPN tunnels.
Concentrator
Explains defining a concentrator to include spokes in a hub-and-spoke configuration.
Monitor
Describes viewing activity on IPSec VPN tunnels and starting or stopping them.
VPN PPTP
PPTP Range
Explains specifying a range of IP addresses for PPTP clients.
VPN SSL
Config
Covers basic SSL VPN settings, including timeout values and encryption preferences.
Monitor
Describes displaying a list of all active SSL VPN sessions.
VPN Certificates
Local Certificates
Explains managing X.509 security certificates, including generating requests and installing signed certificates.
Remote Certificates
Details importing remote (OCSP) certificates.
CA Certificates
Explains obtaining and installing root certificates and CRLs.
CRL
Describes Certificate Revocation Lists (CRLs) and their use in ensuring certificate validity.
User
Configuring user authentication
Explains setting up user accounts, groups, and external authentication servers for network access control.
Local user accounts
Guides on adding local user accounts and configuring authentication methods.
RADIUS servers
Details configuring RADIUS support for user authentication.
LDAP servers
Explains configuring LDAP support for user authentication.
PKI authentication
Describes utilizing Public Key Infrastructure (PKI) for certificate-based authentication.
Windows AD servers
Details configuring Windows Active Directory servers for transparent user authentication.
User group
Explains what a user group is and its role in managing user identities.
Configuring peers and peer groups
Describes defining peers and peer groups for VPN configurations and PKI authentication.
AntiVirus
Order of operations
Explains the sequence of antivirus processing modules and engines.
Antivirus elements
Describes how antivirus elements work together for efficient scanning of incoming files.
Antivirus settings and controls
Compares antivirus options in protection profiles and the antivirus menu.
File pattern
Explains configuring file patterns to block potential threats and prevent virus attacks.
Quarantine
Describes how FortiGate units quarantine blocked and infected files.
Config
Displays a list of current viruses blocked and configures file/email size limits, and grayware blocking.
Antivirus CLI configuration
Details CLI commands that extend antivirus features available through the web-based manager.
Intrusion Protection
About intrusion protection
Explains how the FortiGate unit records suspicious traffic and matches it against attack signatures.
Predefined signatures
Describes enabling/disabling and configuring settings for individual predefined signatures.
Custom signatures
Explains creating custom signatures to customize FortiGate IPS for diverse network environments.
Protocol Decoders
Details how FortiGate IPS uses anomaly detection to identify network traffic exploiting known exploits.
Anomalies
Explains how FortiGate IPS uses anomaly detection to identify traffic that doesn't fit known patterns.
IPS CLI configuration
Describes CLI commands that extend IPS features available through the web-based manager.
Web Filter
Order of web filtering
Explains the specific order in which web filters are applied to traffic.
How web filtering works
Shows how web filters interact with each other and how to use them to your advantage.
Web filter controls
Describes how to configure web filtering settings and enable filters in a protection profile.
Content block
Explains controlling web content by blocking specific words or patterns.
URL filter
Details allowing or blocking access to specific URLs by adding them to the URL filter list.
FortiGuard - Web Filter
Describes FortiGuard-Web filtering, its categories, and how users can block or monitor web pages.
Antispam
Antispam
Explains configuring spam filtering options associated with firewall protection profiles.
Banned word
Details controlling spam by blocking email messages containing specific words or patterns.
Black/White List
Explains using IP address lists and email address lists to filter incoming email.
Advanced antispam configuration
Covers command-line interface (CLI) commands for advanced antispam configuration.
Using Perl regular expressions
Explains using wildcards or Perl regular expressions in email lists.
IM, P2P & VoIP
Overview
Describes controlling and monitoring usage of IM/P2P applications and VoIP protocols.
Configuring IM/P2P protocols
Guides on enabling/disabling IM/P2P options and configuring them within protection profiles.
Statistics
Explains viewing IM, P2P, and VoIP statistics to gain insight into protocol usage.
User
Describes viewing the Current Users list and analyzing it to allow or block users.
Log&Report
FortiGate Logging
Explains how a FortiGate unit can log network activities and traffic.
Storing Logs
Describes configuring where the FortiGate unit stores logs.
Log types
Describes various log types and how to enable logging for each.
Log Access
Explains viewing logs stored in memory, hard disk, or on FortiAnalyzer/FortiGuard servers.
Alert Email
Describes configuring alert email notifications for specific activities or events.
Content Archive
Enables viewing archived logs stored on the FortiAnalyzer unit.
Reports
Explains configuring and viewing reports integrated with FortiAnalyzer.
Viewing FortiAnalyzer reports from a FortiGate unit
Guides on viewing reports generated by the FortiAnalyzer unit on the Report Access page.

Table of Contents