EasyManua.ls Logo

Fortinet Gate 60D - Page 14

Fortinet Gate 60D
706 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
FortiGate Version 4.0 Administration Guide
14 01-400-89802-20090424
http://docs.fortinet.com/Feedback
File Quarantine............................................................................................................ 446
Viewing the File Quarantine list .............................................................................. 447
Viewing the AutoSubmit list .................................................................................... 448
Configuring the AutoSubmit list .............................................................................. 449
Configuring quarantine options............................................................................... 449
Viewing the virus database information ................................................................... 451
Viewing and configuring the grayware list............................................................... 452
Antivirus CLI configuration........................................................................................ 453
Intrusion Protection............................................................................. 455
About intrusion protection......................................................................................... 455
Intrusion Protection settings and controls............................................................... 456
When to use Intrusion Protection............................................................................ 456
Signatures.................................................................................................................... 456
Viewing the predefined signature list...................................................................... 457
Using display filters................................................................................................. 458
Custom signatures...................................................................................................... 459
Viewing the custom signature list ........................................................................... 459
Creating custom signatures.................................................................................... 459
Protocol decoders....................................................................................................... 460
Viewing the protocol decoder list............................................................................ 460
Upgrading the IPS protocol decoder list ................................................................. 461
IPS sensors.................................................................................................................. 461
Viewing the IPS sensor list ..................................................................................... 461
Adding an IPS sensor............................................................................................. 462
Configuring IPS sensors......................................................................................... 462
Configuring filters.................................................................................................... 464
Configuring pre-defined and custom overrides....................................................... 465
Packet logging ........................................................................................................ 467
DoS sensors ................................................................................................................ 469
Viewing the DoS sensor list.................................................................................... 470
Configuring DoS sensors........................................................................................ 470
Understanding the anomalies................................................................................. 472
Intrusion protection CLI configuration ..................................................................... 472
Web Filter.............................................................................................. 475
Order of web filtering.................................................................................................. 475
How web filtering works............................................................................................. 475
Web filter controls....................................................................................................... 476

Table of Contents