Contents
Configuring L2TP ............................................................................................................ 213
Detecting attacks ............................................................................................................ 221
Disabling the NIDS...................................................................................................... 222
Preventing attacks .......................................................................................................... 225
Logging attacks............................................................................................................... 228
Antivirus protection........................................................................................... 231
Antivirus scanning........................................................................................................... 232
File blocking .................................................................................................................... 233
Viewing the virus list ....................................................................................................... 234
Web filtering ....................................................................................................... 235
Content blocking ............................................................................................................. 236
URL blocking................................................................................................................... 237
Script filtering .................................................................................................................. 242
10
Fortinet Inc.