EasyManuals Logo

Fortinet FortiGate Series Administration Guide

Fortinet FortiGate Series
764 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #698 background imageLoading...
Page #698 background image
Configuring application detection lists Endpoint NAC
FortiGate Version 4.0 MR1 Administration Guide
698 01-410-89802-20090903
http://docs.fortinet.com/ • Feedback
Figure 433: Creating an application detection list
Application Detection List
Create New Create a new application detection list.
Name Enter a name for the application detection list.
Comments Optionally, enter descriptive information about this list.
# of Entries The number of application entries in the list.
Profiles The Endpoint NAC profiles that use this application detection list.
Edit Edit this application detection list.
Application Detection List Entry
Other Applications
(not specified below)
Select what to do if applications not included in this list are installed on the
endpoint:
• Allow — allow the endpoint to connect
• Deny — quarantine the endpoint
• Monitor — include this endpoint’s information in statistics and logs
Create New Create a new application entry.
Category Select the software category, Remote Access, for example.
Vendor Select the software vendor.
Application Select the application from the list.
Status Select one of the following:
• Installed — application is installed but not currently running
• Running — application is currently running
1
2
3
4
5
Edit
Edit
Delete
Insert
Move To

Table of Contents

Other manuals for Fortinet FortiGate Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Fortinet FortiGate Series and is the answer not in the manual?

Fortinet FortiGate Series Specifications

General IconGeneral
ModelFortiGate Series
CategoryFirewall
ThroughputVaries by model
InterfacesVaries by model
Concurrent SessionsVaries by model
VPN SupportYes
High AvailabilityYes
Firewall ThroughputVaries by model
VPN ThroughputVaries by model
IPS ThroughputVaries by model
NGFW ThroughputVaries by model
Threat Protection ThroughputVaries by model
New Sessions per SecondVaries by model
Power SupplyVaries by model
Security FeaturesFirewall, IPS, Application Control, Web Filtering, Antivirus, VPN
Virtual DomainsYes
Form FactorDesktop, Rackmount

Related product manuals