EasyManua.ls Logo

Fortinet Gate 60D - Page 18

Fortinet Gate 60D
706 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
FortiGate Version 4.0 Administration Guide
18 01-400-89802-20090424
http://docs.fortinet.com/Feedback
Options......................................................................................................................... 590
Monitor......................................................................................................................... 591
Firewall user monitor list......................................................................................... 591
IPSEC monitor list................................................................................................... 592
SSL VPN monitor list .............................................................................................. 593
IM user monitor list ................................................................................................. 594
NAC quarantine and the Banned User list................................................................ 595
NAC quarantine and DLP ....................................................................................... 595
NAC quarantine and DLP replacement messages................................................. 595
Configuring NAC quarantine................................................................................... 596
The Banned User list.............................................................................................. 596
WAN optimization and web caching .................................................. 599
Frequently asked questions about FortiGate WAN optimization........................... 599
Overview of FortiGate WAN optimization................................................................. 601
WAN optimization tunnels....................................................................................... 602
WAN optimization peer authentication.................................................................... 602
Authentication Groups ............................................................................................ 603
WAN optimization rules and firewall policies .......................................................... 603
WAN optimization Transparent mode..................................................................... 604
FortiGate models that support WAN optimization................................................... 604
Configuring WAN optimization.................................................................................. 605
How list order affects rule matching........................................................................ 606
Moving a rule to a different position in the rule list.................................................. 607
Configuring a WAN optimization rule ....................................................................... 608
Web caching................................................................................................................ 610
Web cache only topology........................................................................................ 611
Configuring web cache only WAN optimization...................................................... 611
Configuring client/server (active-passive) web caching.......................................... 612
Configuring peer to peer web caching.................................................................... 614
Client/server or active passive WAN optimization................................................... 617
Configuring client/server (active-passive) WAN optimization ................................. 617
Peer to peer WAN optimization.................................................................................. 620
Configuring peer to peer WAN optimization ........................................................... 620
About WAN optimization addresses ....................................................................... 622
Protocol optimization ................................................................................................. 623
Byte caching................................................................................................................ 624
SSL offloading for WAN optimization and web caching ......................................... 624
Example configuration: SSL offloading for a WAN optimization tunnel .................. 625
SSL offloading and reverse proxy web caching for an internet web server............ 627
Secure tunnelling........................................................................................................ 630
WAN optimization over IPSec VPN ........................................................................ 630

Table of Contents