Fortinet FortiGate 50A User Manual Page 225

  • Download
  • Add to my manuals
  • Print
  • Page
    / 272
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 224
FortiGate-50A Installation and Configuration Guide Version 2.50
FortiGate-50A Installation and Configuration Guide 225
Antivirus protection
You can enable antivirus protection in firewall policies. You can select a content profile
that controls how the antivirus protection behaves. Content profiles control the type of
traffic protected (HTTP, FTP, IMAP, POP3, SMTP), the type of antivirus protection and
the treatment of fragmented email and oversized files or email.
This chapter describes:
General configuration steps
Antivirus scanning
File blocking
Blocking oversized files and emails
Exempting fragmented email from blocking
Viewing the virus list
General configuration steps
Configuring antivirus protection involves the following general steps.
1 Select antivirus protection options in a new or existing content profile. See “Adding
content profiles” on page 167.
2 Select the Anti-Virus & Web filter option in firewall policies that allow web (HTTP),
FTP, and email (IMAP, POP3, and SMTP) connections through the FortiGate unit.
Select a content profile that provides the antivirus protection options that you want to
apply to a policy. See “Adding content profiles to policies” on page 169.
3 Configure antivirus protection settings to control how the FortiGate unit applies
antivirus protection to the web, FTP, and email traffic allowed by policies. See:
“Antivirus scanning” on page 226,
“File blocking” on page 227,
“Blocking oversized files and emails” on page 228,
“Exempting fragmented email from blocking” on page 228.
4 Configure the messages that users receive when the FortiGate unit blocks or deletes
an infected file. See “Replacement messages” on page 133.
5 Configure the FortiGate unit to send an alert email when it blocks or deletes an
infected file. See “Configuring alert email” in the Logging and Message Reference
Guide.
Note: For information about receiving virus log messages, see “Configuring logging”, and for
information about log message content and format, see “Virus log messages” in the Logging
Configuration and Reference Guide
Page view 224
1 2 ... 220 221 222 223 224 225 226 227 228 229 230 ... 271 272

Comments to this Manuals

No comments