Fortinet FortiGate-800 User Manual Page 11

  • Download
  • Add to my manuals
  • Print
  • Page
    / 336
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 10
Contents
FortiGate-800 Installation and Configuration Guide 11
Network Intrusion Detection System (NIDS) ................................................... 269
Detecting attacks ............................................................................................................ 269
Selecting the interfaces to monitor.............................................................................. 270
Disabling monitoring interfaces................................................................................... 270
Configuring checksum verification .............................................................................. 270
Viewing the signature list ............................................................................................ 271
Viewing attack descriptions......................................................................................... 271
Disabling NIDS attack signatures ............................................................................... 272
Adding user-defined signatures .................................................................................. 272
Preventing attacks .......................................................................................................... 274
Enabling NIDS attack prevention ................................................................................ 274
Enabling NIDS attack prevention signatures .............................................................. 274
Setting signature threshold values.............................................................................. 275
Logging attacks............................................................................................................... 276
Logging attack messages to the attack log................................................................. 276
Reducing the number of NIDS attack log and email messages.................................. 276
Antivirus protection........................................................................................... 279
General configuration steps............................................................................................ 279
Antivirus scanning........................................................................................................... 280
File blocking.................................................................................................................... 281
Blocking files in firewall traffic ..................................................................................... 282
Adding file patterns to block........................................................................................ 282
Quarantine ...................................................................................................................... 283
Quarantining infected files .......................................................................................... 283
Quarantining blocked files........................................................................................... 283
Viewing the quarantine list .......................................................................................... 284
Sorting the quarantine list ........................................................................................... 284
Filtering the quarantine list.......................................................................................... 285
Deleting files from the quarantine list.......................................................................... 285
Downloading quarantined files.................................................................................... 285
Configuring quarantine options ................................................................................... 285
Blocking oversized files and emails ................................................................................ 286
Configuring limits for oversized files and email........................................................... 286
Exempting fragmented email from blocking.................................................................... 287
Viewing the virus list ....................................................................................................... 287
Web filtering ....................................................................................................... 289
General configuration steps............................................................................................ 289
Content blocking ............................................................................................................. 290
Adding words and phrases to the Banned Word list ................................................... 290
Clearing the Banned Word list .................................................................................... 291
Backing up the Banned Word list................................................................................ 292
Restoring the Banned Word list .................................................................................. 292
Page view 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 335 336

Comments to this Manuals

No comments