EasyManua.ls Logo

Fortinet FortiWAN - IP MAC Mapping

Fortinet FortiWAN
182 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
IP MAC Mapping Optional Services
System Name : Enter a string to represent this system.
System Contact : Enter a string to represent a person in charge of this system.
System Location : Enter a string to represent the location of this system.
Username : Enter user name used for authentication.
Password : Enter the password used for authentication.
Privacy Key : Enter the privacy key code. Eg: 12345678ABCDEFGHUI.etc.
AuthProtocol : Select the authentication protocol used for transferring the authenticated password,
either MD5 or SHA.
PrivProtocol : Select the authentication protocol used for transferring the authenticated privacy key.
Authentication : Select the authentication method for user and privacy key, either authentication with or
without privacy.
IP MAC Mapping
Users can specify the IP-MAC table by classifying periods like peak hours and idle hours. Once the IP-MAC table is set
up, a packet from a certain IP address can pass through FortiWAN only when its MAC address matches the table list
and time period.
FortiWAN provides log mechanism to the IP MAC Mapping service, see "Log".
E : Enable/Disable
When : Select the time period: busy hour, idle hour and all time. All time is defined in 24-hour
system. For details, refer to [System] -> [Busyhour Settings] (See "Busyhour
Settings").
IP Address : Enter the IP address of the network interface card.
MAC Address : Enter the MAC address of the network interface card.
L : Check it to activate the rule and record results in log file. Otherwise, the rule is inact-
ive and data will not be stored.
FortiWAN Handbook
Fortinet Technologies Inc.
142

Table of Contents

Other manuals for Fortinet FortiWAN

Related product manuals