EasyManua.ls Logo

Fortinet Gate 60D - Page 12

Fortinet Gate 60D
706 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
FortiGate Version 4.0 Administration Guide
12 01-400-89802-20090424
http://docs.fortinet.com/Feedback
Firewall Virtual IP................................................................................. 365
How virtual IPs map connections through FortiGate units..................................... 365
Inbound connections............................................................................................... 365
Outbound connections............................................................................................ 368
VIP requirements.................................................................................................... 369
Viewing the virtual IP list............................................................................................ 369
Configuring virtual IPs................................................................................................ 370
Adding a static NAT virtual IP for a single IP address ............................................ 372
Adding a static NAT virtual IP for an IP address range .......................................... 373
Adding static NAT port forwarding for a single IP address
and a single port ..................................................................................................... 375
Adding static NAT port forwarding for an IP address range
and a port range ..................................................................................................... 377
Adding dynamic virtual IPs ..................................................................................... 378
Adding a virtual IP with port translation only........................................................... 379
Virtual IP Groups......................................................................................................... 380
Viewing the VIP group list.......................................................................................... 380
Configuring VIP groups.............................................................................................. 380
IP pools ........................................................................................................................ 381
IP pools and dynamic NAT ..................................................................................... 382
IP Pools for firewall policies that use fixed ports..................................................... 382
Source IP address and IP pool address matching.................................................. 382
Viewing the IP pool list............................................................................................... 383
Configuring IP Pools................................................................................................... 383
Double NAT: combining IP pool with virtual IP........................................................ 384
Adding NAT firewall policies in transparent mode .................................................. 386
Firewall Load Balance ......................................................................... 389
How load balancer works........................................................................................... 389
Configuring virtual servers ........................................................................................ 390
Configuring real servers............................................................................................. 392
Configuring health check monitors........................................................................... 393
Monitoring the servers ............................................................................................... 395
Firewall Protection Profile................................................................... 397
What is a protection profile?...................................................................................... 397
Adding a protection profile to a firewall policy........................................................ 398
Default protection profiles ......................................................................................... 398
Viewing the protection profile list ............................................................................. 399

Table of Contents