Contents
FortiGate Version 4.0 Administration Guide
01-400-89802-20090424 3
http://docs.fortinet.com/ • Feedback
Contents
Introduction ............................................................................................ 21
Fortinet products .......................................................................................................... 21
About this document .................................................................................................... 21
Document conventions ................................................................................................ 24
IP addresses............................................................................................................. 24
CLI constraints.......................................................................................................... 24
Cautions, Notes and Tips ......................................................................................... 24
Typographical conventions....................................................................................... 25
Registering your Fortinet product............................................................................... 25
Customer service and technical support.................................................................... 25
Training.......................................................................................................................... 26
Fortinet documentation ............................................................................................... 26
Tools and Documentation CD................................................................................... 26
Fortinet Knowledge Center ...................................................................................... 26
Comments on Fortinet technical documentation ..................................................... 26
What’s new in FortiOS 4.0..................................................................... 27
FortiOS 4.0 FortiGate models and features supported ............................................. 28
UTM features grouped under new UTM menu............................................................ 29
Data Leak Prevention.................................................................................................... 29
Application Control....................................................................................................... 29
SSL content scanning and inspection........................................................................ 29
WAN Optimization......................................................................................................... 30
Endpoint control ........................................................................................................... 30
Network Access Control (NAC) quarantine................................................................ 30
IPS extensions............................................................................................................... 31
DoS policies for applying IPS sensors...................................................................... 31
NAC quarantine in DoS Sensors .............................................................................. 31
Adding IPS sensors to a DoS policy from the CLI.................................................... 32
One-arm IDS (sniffer mode) ..................................................................................... 32
IPS interface policies for IPv6 ............................................................................... 33
IPS Packet Logging .................................................................................................. 33
Enhanced Antispam Engine (ASE).............................................................................. 33
WCCP v2 support.......................................................................................................... 33
“Any” interface for firewall policies ............................................................................ 35
Global view of firewall policies.................................................................................... 35
Identity-based firewall policies.................................................................................... 35
Web filtering HTTP upload enhancements ................................................................. 36