EasyManua.ls Logo

Fortinet FortiGate 4000 - Page 12

Fortinet FortiGate 4000
332 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
12 Fortinet Inc.
Network Intrusion Detection System (NIDS) ................................................... 271
Detecting attacks ............................................................................................................ 271
Selecting the interfaces to monitor.............................................................................. 272
Disabling monitoring interfaces................................................................................... 272
Configuring checksum verification .............................................................................. 272
Viewing the signature list ............................................................................................ 273
Viewing attack descriptions......................................................................................... 273
Disabling NIDS attack signatures ............................................................................... 274
Adding user-defined signatures .................................................................................. 274
Preventing attacks .......................................................................................................... 276
Enabling NIDS attack prevention ................................................................................ 276
Enabling NIDS attack prevention signatures .............................................................. 276
Setting signature threshold values.............................................................................. 277
Logging attacks............................................................................................................... 278
Logging attack messages to the attack log................................................................. 278
Reducing the number of NIDS attack log and email messages.................................. 278
Antivirus protection........................................................................................... 281
General configuration steps............................................................................................ 281
Antivirus scanning........................................................................................................... 282
File blocking.................................................................................................................... 283
Blocking files in firewall traffic ..................................................................................... 284
Adding file patterns to block........................................................................................ 284
Blocking oversized files and emails ................................................................................ 285
Configuring limits for oversized files and email........................................................... 285
Exempting fragmented email from blocking.................................................................... 285
Viewing the virus list ....................................................................................................... 286
Web filtering ....................................................................................................... 287
General configuration steps............................................................................................ 287
Content blocking ............................................................................................................. 288
Adding words and phrases to the Banned Word list ................................................... 288
Clearing the Banned Word list .................................................................................... 289
Backing up the Banned Word list................................................................................ 290
Restoring the Banned Word list .................................................................................. 290
URL blocking................................................................................................................... 291
Configuring FortiGate Web URL blocking................................................................... 291
Configuring FortiGate Web pattern blocking............................................................... 294
Configuring Cerberian URL filtering ................................................................................ 294
Installing a Cerberian license key ............................................................................... 295
Adding a Cerberian user ............................................................................................. 295
Configuring Cerberian web filter ................................................................................. 295
Enabling Cerberian URL filtering ................................................................................ 296

Table of Contents

Related product manuals