EasyManua.ls Logo

Fortinet Gate 60D - Using Web-Based Manager Lists; Adding Filters to Web-Based Manager Lists

Fortinet Gate 60D
706 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Web-based manager Web-based manager pages
FortiGate Version 4.0 Administration Guide
01-400-89802-20090424 53
http://docs.fortinet.com/Feedback
Using web-based manager lists
Many of the web-based manager pages contain lists. There are lists of network interfaces,
firewall policies, administrators, users, and others.
If you log in as an administrator with an admin profile that allows Read-Write access to a
list, depending on the list you will usually be able to:
select Create New to add a new item to the list
select the Edit icon for a list item to view and change the settings of the item
select the Delete icon for a list item to delete the item. The delete icon will not be
available if the item cannot be deleted. Usually items cannot be deleted if they have
been added to another configuration; you must first find the configuration settings that
the item has been added to and remove the item from them. For example, to delete a
user that has been added to a user group you must first remove the user from the user
group (see Figure 11).
Figure 11: A web-based manager list (read-write access)
If you log in as an administrator with an admin profile that allows Read Only access to a
list, you will only be able to view the items on the list (see Figure 12).
Figure 12: A web-based manager list (read only access)
For more information, see “Admin profiles” on page 222.
Adding filters to web-based manager lists
You can add filters to control the information that is displayed by the following complex
lists:
Session list (see Viewing the session list” on page 83)
VPN Configure IPSec and SSL virtual private networking. PPTP is
configured in the CLI.
User Configure user accounts for use with firewall policies that require user
authentication. Also configure external authentication servers such as
RADIUS, LDAP, TACACS+, and Windows AD. Configure monitoring of
Firewall, IPSec, SSL, IM, and Banned Users.
Endpoint control Configure end points, view FortiClient configuration information, and
configure software detection patterns.
Log&Report Configure logging and alert email. View log messages and reports.
Edit
Delete
View

Table of Contents