Fortinet FortiGate 50A User Manual Page 139

  • Download
  • Add to my manuals
  • Print
  • Page
    / 272
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 138
Firewall configuration Default firewall configuration
FortiGate-50A Installation and Configuration Guide 139
The firewall uses these addresses to match the source and destination addresses of
packets received by the firewall. The default policy matches all connections from the
internal network because it includes the Internal_All address. The default policy also
matches all connections to the external network because it includes the External_All
address.
You can add more addresses to each interface to improve the control you have over
connections through the firewall. For more information about firewall addresses, see
“Addresses” on page 146.
You can also add firewall policies that perform network address translation (NAT). To
use NAT to translate destination addresses, you must add virtual IPs. Virtual IPs map
addresses on one network to a translated address on another network. For more
information about Virtual IPs, see “Virtual IPs” on page 157.
Services
Policies can control connections based on the service or destination port number of
packets. The default policy accepts connections using any service or destination port
number. The firewall is configured with over 40 predefined services. You can add
these services to a policy for more control over the services that can be used by
connections through the firewall. You can also add user-defined services. For more
information about services, see “Services” on page 149.
Schedules
Policies can control connections based on the time of day or day of the week when the
firewall receives the connection. The default policy accepts connections at any time.
The firewall is configured with one schedule that accepts connections at any time. You
can add more schedules to control when policies are active. For more information
about schedules, see “Schedules” on page 154.
Content profiles
Add content profiles to policies to apply antivirus protection, web filtering, and email
filtering to web, file transfer, and email services. The FortiGate unit includes the
following default content profiles:
Strict—to apply maximum content protection to HTTP, FTP, IMAP, POP3, and
SMTP content traffic.
Scan—to apply antivirus scanning to HTTP, FTP, IMAP, POP3, and SMTP content
traffic.
Web—to apply antivirus scanning and Web content blocking to HTTP content
traffic.
Unfiltered—to allow oversized files to pass through the FortiGate unit without
scanned for viruses.
The default policy includes the scan content profile.
For more information about content profiles, see “Content profiles” on page 166.
Page view 138
1 2 ... 134 135 136 137 138 139 140 141 142 143 144 ... 271 272

Comments to this Manuals

No comments