EasyManuals Logo

Fortinet FortiGate Series Administration Guide

Fortinet FortiGate Series
764 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #13 background imageLoading...
Page #13 background image
Contents
FortiGate Version 4.0 MR1 Administration Guide
01-410-89802-20090903 13
http://docs.fortinet.com/ • Feedback
Customizable routing widgets ................................................................................... 377
Access List.............................................................................................................. 377
Distribute List.......................................................................................................... 378
Key Chain ............................................................................................................... 378
Offset List................................................................................................................ 379
Prefix List................................................................................................................ 380
Route Map .............................................................................................................. 380
Router Monitor ..................................................................................... 383
Viewing routing information ...................................................................................... 383
Searching the FortiGate routing table....................................................................... 385
Firewall Policy ...................................................................................... 387
How list order affects policy matching ..................................................................... 387
Moving a policy to a different position in the policy list ........................................... 388
Enabling and disabling policies............................................................................... 389
Multicast policies ........................................................................................................ 389
Viewing the firewall policy list ................................................................................... 390
Configuring firewall policies ...................................................................................... 391
Adding authentication to firewall policies ................................................................ 396
Identity-based firewall policy options (non-SSL-VPN) ............................................ 397
IPSec firewall policy options ................................................................................... 399
Configuring SSL VPN identity-based firewall policies............................................. 400
Using DoS policies to detect and prevent attacks................................................... 404
Viewing the DoS policy list...................................................................................... 404
Configuring DoS policies ........................................................................................ 406
Using one-arm sniffer policies to detect network attacks ...................................... 406
Viewing the sniffer policy list................................................................................... 407
Configuring sniffer policies...................................................................................... 409
How FortiOS selects unused NAT ports ................................................................... 410
Global pool.............................................................................................................. 411
Global per-protocol pool ......................................................................................... 411
Per NAT IP pool...................................................................................................... 411
Per NAT IP, destination IP, port, and protocol pool ................................................ 412
Firewall policy examples ............................................................................................ 414
Scenario one: SOHO-sized business ..................................................................... 414
Scenario two: enterprise-sized business ................................................................ 417
Firewall Address .................................................................................. 421
About firewall addresses............................................................................................ 421
Viewing the firewall address list................................................................................ 422
Configuring addresses ............................................................................................... 423
Viewing the address group list .................................................................................. 424

Table of Contents

Other manuals for Fortinet FortiGate Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Fortinet FortiGate Series and is the answer not in the manual?

Fortinet FortiGate Series Specifications

General IconGeneral
ModelFortiGate Series
CategoryFirewall
ThroughputVaries by model
InterfacesVaries by model
Concurrent SessionsVaries by model
VPN SupportYes
High AvailabilityYes
Firewall ThroughputVaries by model
VPN ThroughputVaries by model
IPS ThroughputVaries by model
NGFW ThroughputVaries by model
Threat Protection ThroughputVaries by model
New Sessions per SecondVaries by model
Power SupplyVaries by model
Security FeaturesFirewall, IPS, Application Control, Web Filtering, Antivirus, VPN
Virtual DomainsYes
Form FactorDesktop, Rackmount

Related product manuals