Fortinet MR8 manual Factory default protection profiles, Strict, Scan

Page 22

Factory default FortiGate configuration settings

 

Getting started

 

 

 

 

 

Table 5: Default firewall configuration

 

 

 

 

 

 

Configuration setting

Name

Description

 

 

 

 

 

Firewall policy

Internal ->Wan1

Source: All Destination: All

 

Firewall address

All

Firewall address matches the source or

 

 

 

destination address of any packet.

 

Pre-defined service

More than 50

Select from any of the 50 pre-defined services

 

 

predefined services

to control traffic through the FortiGate unit that

 

 

 

uses that service.

 

 

 

 

 

Recurring schedule

Always

The recurring schedule is valid at any time.

 

 

 

 

 

Protection Profiles

Strict, Scan, Web,

Control how the FortiGate unit applies virus

 

 

Unfiltered

scanning, web content filtering, spam filtering,

 

 

 

and IPS.

 

 

 

 

The factory default firewall configuration is the same in NAT/Route and Transparent mode.

Factory default protection profiles

Use protection profiles to apply different protection settings for traffic that is controlled by firewall policies. You can use protection profiles to:

Configure antivirus protection for HTTP, FTP, IMAP, POP3, and SMTP firewall policies

Configure Web filtering for HTTP firewall policies

Configure Web category filtering for HTTP firewall policies

Configure spam filtering for IMAP, POP3, and SMTP firewall policies

Enable the Intrusion Protection System (IPS) for all services

Enable content logging for HTTP, FTP, IMAP, POP3, and SMTP firewall policies

Using protection profiles, you can build protection configurations that can be applied to different types of firewall policies. This allows you to customize types and levels of protection for different firewall policies.

For example, while traffic between internal and external addresses might need strict protection, traffic between trusted internal addresses might need moderate protection. You can configure firewall policies for different traffic services to use the same or different protection profiles.

Protection profiles can be added to NAT/Route mode and Transparent mode firewall policies.

The FortiGate unit comes preconfigured with four protection profiles.

Strict

To apply maximum protection to HTTP, FTP, IMAP, POP3, and SMTP traffic.

 

You may not use the strict protection profile under normal circumstances but

 

it is available if you have problems with viruses and require maximum

 

screening.

Scan

To apply antivirus scanning and file quarantining to HTTP, FTP, IMAP,

 

POP3, and SMTP content traffic.

22

01-28008-0018-20050128

Fortinet Inc.

Image 22
Contents Installation Guide January 01-28008-0018-20050128Trademarks Regulatory ComplianceTable of Contents Index Secure installation, configuration, and management IntroductionCommand line interface Web-based managerSetup wizard Document conventionsFortiGate Installation Guide FortiGate documentationComments on Fortinet technical documentation Related documentationFortinet Knowledge Center FortiManager documentationFortiMail documentation Customer service and technical supportFortiLog documentation Customer service and technical support Customer service and technical support Getting started Package contents MountingEnvironmental specifications Turning the FortiGate unit power on and offPower requirements To power on the FortiGate unitConnecting to the web-based manager To connect to the web-based managerBits per second 9600 Data bits Parity Connecting to the command line interface CLITo connect to the CLI Stop bits Flow controlQuick installation using factory defaults Go to System Network DNSFactory default FortiGate configuration settings Factory default Dhcp server configurationFactory default NAT/Route mode network configuration Administrative access Factory default Transparent mode network configurationFactory default firewall configuration Management IPStrict Factory default protection profilesScan Planning the FortiGate configuration NAT/Route modeNAT/Route mode with multiple external network connections Example NAT/Route mode network configurationTransparent mode Example NAT/Route multiple internet connection configurationWeb-based manager and setup wizard Configuration optionsNext steps NAT/Route mode installation Preparing to configure the FortiGate unit in NAT/Route modeDhcp or PPPoE configuration Using the web-based managerPPPoE settings User name Password To configure DNS server settings Go to System Network DNS Configuring basic settingsTo configure interfaces Go to System Network Interface To add a default routeTo add/change the administrator password Using the command line interfaceConfiguring the FortiGate unit to operate in NAT/Route mode To configure interfacesExample Get system interfaceUsing the setup wizard To configure DNS server settingsDhcp server Setup wizard settings PasswordExternal Interface Internal serversStarting the setup wizard Connecting the FortiGate unit to the networksSetup wizard settings Antivirus FortiGate-60 NAT/Route mode connections FortiGate-60Configuring the networks Configuring the Modem interfaceTo set the date and time Go to System Config TimeTo configure virus, attack, and spam definition updates To register the FortiGate unitGo to System Maintenance Update Center Transparent mode installation Preparing to configure Transparent modeTo change the Management IP Go to System Network Management Management IPReconnecting to the web-based manager To change to Transparent mode using the CLITo configure the management IP address To configure the default gatewayTo start the setup wizard Connecting the FortiGate unit to your network InternalTo register your FortiGate unit Go to System Maintenance Update Center High availability configuration settings High availability installationConfiguring FortiGate units for HA operation Priorities of heartbeat device and monitor prioritiesGroup ID MAC Address To change the FortiGate unit host name Configuring FortiGate units for HA using the CLI Config system global Set hostname namestr endConnecting the cluster to your networks To configure the FortiGate unit for HA operationHA network configuration To connect the clusterInstalling and configuring the cluster Installing and configuring the cluster Selecting a modem mode Configuring the modem interfaceRedundant mode configuration Standalone mode configuration To operate in standalone mode Go to System Network ModemAuto-dial Configuring modem settingsMode Redundant forTo configure modem settings Go to System Network Modem Connecting and disconnecting the modem in Standalone modeTo connect to a dialup account Go to System Network Modem To disconnect the modem Defining a Ping ServerDead gateway detection ISPAdding firewall policies for modem connections Index CLIIndex