EasyManua.ls Logo

Fortinet Gate 60D - Page 105

Fortinet Gate 60D
706 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Using virtual domains Virtual domains
FortiGate Version 4.0 Administration Guide
01-400-89802-20090424 105
http://docs.fortinet.com/Feedback
The following configuration settings are exclusively part of a virtual domain and are not
shared between virtual domains. A regular VDOM administrator sees only these settings.
The default super_admin can also access these settings, but must first select which
VDOM to configure.
Table 6: VDOM configuration settings
Configuration Object For more information, see
System
Network Zone “Configuring zones” on page 138
Network Web Proxy “Web Proxy” on page 147
Network Routing Table
(Transparent mode)
“Routing table (Transparent Mode)” on page 149
Network Modem “Configuring the modem interface” on page 139
Wireless Settings “Wireless settings” on page 162
Wireless MAC Filter “Wireless MAC Filter” on page 165
Wireless Monitor “Wireless Monitor” on page 167
Wireless Rogue AP “Rogue AP detection” on page 168
DHCP service “Configuring DHCP services” on page 172
DHCP Address Leases “Viewing address leases” on page 175
Config Operation mode
(NAT/Route or
Transparent)
“Changing operation mode” on page 206
Config Management IP
(Transparent mode)
“Changing operation mode” on page 206
Router
Static “Router Static” on page 277
Dynamic “Router Dynamic” on page 289
Monitor “Router Monitor” on page 315
Firewall
Policy “Firewall Policy” on page 319
Address “Firewall Address” on page 345
Service “Firewall Service” on page 351
Schedule “Firewall Schedule” on page 361
Virtual IP “Firewall Virtual IP” on page 365
Virtual IP Group “Virtual IP Groups” on page 380
Virtual IP, IP pool “IP pools” on page 381
Load Balance “Firewall Load Balance” on page 389
Protection Profile “Firewall Protection Profile” on page 397
UTM
AntiVirus File Filter “File Filter” on page 443
Intrusion Protection “Intrusion Protection” on page 455
Web Filter “Web Filter” on page 475
AntiSpam “Antispam” on page 495
Data Leak Prevention “Data Leak Prevention” on page 511

Table of Contents