Fortinet FortiOS 3.0 manual Router, Static, Dynamic

Page 21

 

 

New features and changes

Router

an administration account with access profile that provides read and write access to

only the admin administrator account can configure a VDOM unless you create and assign a regular administrator to that VDOM

Router

The Router menu consists of the following menus:

Static

Dynamic

Monitor

Static

The Static menu has two tabs, Policy Route and Static Route. The Policy Route tab was previously a menu in the Router menu.

Dynamic

The Dynamic menu is new and includes four tabs to configure Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and Multicast protocols.

Dynamic routing protocols enable the FortiGate unit to automatically share information about routes with neighboring routers, including learning about routers and networks advertised by neighboring routers.

RIP protocol is a distance-vector routing protocol for small networks, or similar networks.

OSPF is slightly different, and is a link-state routing protocol, most often used in large networks to share networking information among the routers in the same autonomous system.

BGP is an Internet routing protocol, typically used by ISPs to exchange routing information between different ISP networks. For example, a BGP enables the sharing of network paths between the ISP network and an autonomous system that uses RIP and/or OSPF to route packets within the autonomous system.

Multicast enables the FortiGate unit to operate as a Protocol Independent Multicast (PIM) version 2 router in the root virtual domain. The PIM routers throughout the network ensure only one copy of the packet is forwarded until it reaches an end-point destination and at this destination copies of the packet are made only when required to deliver the information to multicast client applications requesting traffic destined for the multicast address.

Note: The following are now in the CLI:

Distribution list

Offset list

Pre-fix list

Route-Map

Key-chain

Access list

Upgrade Guide for FortiOS v3.0

21

01-30000-0317-20060424

Image 21
Contents G R a D E G U I D E Regulatory compliance TrademarksContents Upgrading to FortiOS Backing up your configurationIntrusion Protection formerly IPS AntiSpam formerly Spam FilterIndex Reverting to FortiOS v2.80MR11Contents Upgrade Guide for FortiOS 01-30000-0317-20060424 Introduction About this documentDocument conventions Typographic conventions Fortinet documentationCustomer service and technical support Fortinet Knowledge CenterComments on Fortinet technical documentation Customer service and technical support Backing up configuration files Upgrade NotesSetup Wizard FortiLog name change01-30000-0317-20060424 Web-based manager changesChanges to the web-based manager Command Line Interface changesOther USB supportUpgrade Notes Other Other System New features and changesStatus ConfigSessions NetworkMaintenance AdminShutdown is now located on System Status System Operation Virtual DomainRouter StaticDynamic Firewall Certificates IPSecLocal UserRadius Windows ADIntrusion Protection formerly IPS AntivirusFile Pattern QuarantineWeb Filter Banned word Black/White list AntiSpam formerly Spam FilterIM/P2P new Banned wordBlack/White list Log & Report Log ConfigStatistics UserReport Log AccessSnmp MIBs and traps changes To upgrade the clusterUpgrading the HA cluster for FortiOS In-depth Snmp trap changesOptions Backing up your configuration Backing up your configuration using the web-based managerUpgrading to FortiOS Backing up your configuration using the CLI Upgrading using the web-based managerUpgrading your FortiGate unit To upgrade to FortiOS 3.0 using the CLI Upgrading using the CLIVerifying the upgrade Backing up your FortiOS 3.0 configuration Reverting to FortiOS v2.80MR11Backing up to a FortiUSB key Verifying the downgrade Downgrading to FortiOS v2.80MR11 using web-based managerTo downgrade using the CLI Downgrading to FortiOS v2.80MR11 using the CLIRestoring your configuration Restoring your configuration settings using the CLITo restore configuration settings using the CLI Execute restore allconfig confall 192.168.1.168 ghrffdt123 Restoring your configuration Index 01-30000-0317-20060424

FortiOS 3.0 specifications

Fortinet FortiOS 3.0 is a robust network operating system designed to provide a comprehensive security solution for enterprise environments. Released as part of Fortinet's commitment to advancing cybersecurity, FortiOS 3.0 integrates several cutting-edge technologies and features to enhance network performance and protection against emerging threats.

One of the main features of FortiOS 3.0 is its advanced threat management capabilities. This includes intrusion prevention systems (IPS), application control, and web filtering, which work in tandem to identify and mitigate risks in real-time. The IPS component utilizes deep packet inspection to analyze traffic patterns and block malicious activity, ensuring that sensitive data remains secure.

Another key characteristic of FortiOS 3.0 is its unified threat management (UTM) approach. By consolidating multiple security functions into a single platform, organizations can simplify their infrastructure, reduce costs, and streamline administration. This consolidation is particularly beneficial for businesses looking to enhance their security posture without overwhelming their IT resources.

FortiOS 3.0 also incorporates advanced VPN capabilities, allowing remote access to secure corporate networks. With support for both IPsec and SSL VPN technologies, users can enjoy secure connections from virtually any location, which is essential in today's increasingly mobile work environment. This flexibility promotes productivity while maintaining stringent security standards.

Additionally, FortiOS 3.0 includes sophisticated logging and reporting features. These provide critical insights into network activity, helping organizations to analyze potential threats and compliance with industry regulations. Customizable alerts and reports empower IT teams to remain vigilant and responsive to any irregularities or breaches in security.

Moreover, FortiOS 3.0 leverages Fortinet's proprietary security processor technology, which accelerates threat processing and reduces latency. This hardware acceleration ensures that even in high-volume traffic situations, security measures do not compromise network speed.

In summary, Fortinet FortiOS 3.0 stands out due to its comprehensive security features, unified threat management capabilities, advanced VPN functionalities, and robust logging and reporting tools. These characteristics make it an ideal solution for organizations seeking to enhance their cybersecurity measures while maintaining operational efficiency. As cyber threats continue to evolve, FortiOS 3.0 equips enterprises with the tools necessary to safeguard their networks effectively.