Fortinet 100 user manual Editing administrator accounts, 133

Page 133

System configuration

Editing administrator accounts

 

 

Editing administrator accounts

The admin account user can change individual administrator account passwords, configure the IP addresses from which administrators can access the web-based manager, and change the administrator permission levels.

Administrator account users with Read & Write access can change their own administrator passwords.

To edit an administrator account

1Go to System > Config > Admin.

2To change an administrator account password, select Change Password .

3Type the Old Password.

4Type a New Password and Confirm the new password.

For improved security, the password should be at least 6 characters long. The password can contain any characters except spaces. If you enter a password that is less than 6 characters long, the system displays a warning message but still accepts the password.

5Select OK.

6To edit the settings of an administrator account, select Edit .

7Optionally type a Trusted Host IP address and netmask for the location from which the administrator can log into the web-based manager.

If you want the administrator to be able to access the FortiGate unit from any address, set the trusted host to 0.0.0.0 and the netmask to 255.255.255.255.

To limit the administrator to only be able to access the FortiGate unit from a specific network, set the trusted host to the address of the network and set the netmask to the netmask for the network. For example, to limit an administrator to accessing the FortiGate unit from your internal network, set the trusted host to the address of your internal network (for example, 192.168.1.0) and set the netmask to 255.255.255.0.

8Change the administrator’s permission level as required.

9Select OK.

10To delete an administrator account, choose the account to delete and select Delete .

FortiGate-100 Installation and Configuration Guide

133

Image 133
Contents August Installation and Configuration GuideRegulatory Compliance TrademarksTable of Contents NAT/Route mode installation System status Virus and attack definitions updates and registration RIP configuration 121 Users and authentication 173 IPSec VPN 181 Network Intrusion Detection System Nids 221 Glossary 259 Index 263 Contents Antivirus protection IntroductionEmail filtering Web content filteringFirewall NAT/Route modeNetwork intrusion detection Transparent modeWeb-based manager Secure installation, configuration, and managementFortiGate web-based manager and setup wizard Command line interfaceNetwork configuration System administrationWhat’s new in Version Logging and reportingUsers and authentication Replacement messagesDhcp server FirewallWeb Filter AntivirusEmail filter About this document Document conventions Comments on Fortinet technical documentation Fortinet documentationCustomer service and technical support Comments on Fortinet technical documentation Getting started Mounting Package contentsEnvironmental specifications Powering onConnecting to the web-based manager Connecting to the web-based managerFactory default FortiGate configuration settings Connecting to the command line interface CLIBits per second 9600 Data bits Parity Stop bits Flow controlAccount Factory default NAT/Route mode network configurationInternal interface External interfaceFactory default firewall configuration Factory default Transparent mode network configurationFactory default firewall configuration Traffic Shaping Factory default content profilesAuthentication Antivirus & Web FilterScan content profile Strict content profileStrict content profile Options Scan content profile OptionsUnfiltered content profile Web content profileWeb content profile Options Unfiltered content profile OptionsExample NAT/Route mode network configuration Planning your FortiGate configurationExample NAT/Route multiple internet connection configuration NAT/Route mode with multiple external network connectionsSetup Wizard Configuration optionsFortiGate model maximum values matrix Next steps Configuration options Getting started Preparing to configure NAT/Route mode NAT/Route mode installationInternal servers Advanced FortiGate NAT/Route mode settings Advanced NAT/Route mode settingsDMZ interface Dhcp serverUsing the command line interface Using the setup wizardSet system interface external mode static ip 204.23.1.5 FortiGate-100 NAT/Route mode connections Connecting the FortiGate unit to your networksCompleting the configuration Configuring your networksConfiguring the DMZ interface Setting the date and timeConfiguring virus and attack definition updates Configuration example Multiple connections to the InternetEnabling antivirus protection Registering your FortiGateExample multiple Internet connection configuration Primary and backup links to the Internet Configuring Ping serversUsing the CLI Destination based routing examplesLoad sharing and primary and secondary connections Load sharingRouting table should have routes arranged as shown in Table Adding the routes using the CLIPolicy routing examples Routing a service to an external networkFirewall policy example Adding a redundant default policyAdding more firewall policies Action AcceptRestricting access to a single Internet connection Preparing to configure Transparent mode Transparent mode installationTransparent mode settings Administrator Password DNS SettingsGo to System Status Changing to Transparent modeConfigure the Transparent mode default gateway Configuring the Transparent mode management IP addressFortiGate-100 Transparent mode connections Setting the date and time Default routes and static routes Transparent mode configuration examplesDefault route to an external network General configuration stepsCLI configuration steps Web-based manager example configuration stepsGo to System Network Management Go to System Network RoutingStatic route to an external destination Set system route number 1 dst 24.102.233.5 255.255.255.0 gw1 Example static route to an internal destination Set system route number 1 dst 172.16.1.11 255.255.255.0 gw1 System status System statusChanging the FortiGate host name Firmware upgrade procedures Procedure DescriptionChanging the FortiGate firmware Upgrading the firmware using the web-based manager Upgrade to a new firmware versionUpgrading the firmware using the CLI Revert to a previous firmware version Execute restore image namestr tftpipReverting to a previous firmware version using the CLI Execute ping To install firmware from a system reboot Install a firmware image from a system reboot using the CLIPress Any Key To Download Boot Image Restoring your previous configuration Test a new firmware image before installing itTest a new firmware image before installing it Installing a backup firmware image Installing and using a backup firmware imageInstalling and using a backup firmware image Switching to the backup firmware image Switching back to the default firmware image Manual virus definition updatesBacking up system settings Manual attack definition updatesDisplaying the FortiGate serial number Displaying the FortiGate up timeRestoring system settings to factory defaults Restoring system settingsChanging to NAT/Route mode Changing to Transparent modeRestarting the FortiGate unit System status Shutting down the FortiGate unitViewing CPU and memory status Go to System Status Monitor Viewing sessions and network statusSessions and network status monitor Viewing virus and intrusions statusViewing the session list Go to System Status Session Session listTo IP Updating antivirus and attack definitions Virus and attack definitions updates and registrationVersion Expiry date Last update attempt Last update status Connecting to the FortiResponse Distribution NetworkGo to System Update Configuring scheduled updatesGo to Log&Report Log Setting Configuring update loggingSuccessful Update FDN error Adding an override server Configuring push updatesManually updating antivirus and attack definitions About push updates To enable push updatesPush updates and external dynamic IP addresses Push updates through a NAT deviceExample network topology Push updates through a NAT device Example push updates through a NAT deviceGo to Firewall Virtual IP General procedureAdding a firewall policy for the port forwarding virtual IP Schedule Always Service ANY Action Accept100 Scheduled updates through a proxy serverRegistering FortiGate units FortiCare Service Contracts101 102 Registering the FortiGate unitRegistering a FortiGate unit product information 103Updating registration information Recovering a lost Fortinet support passwordViewing the list of registered FortiGate units 104Adding or changing a FortiCare Support Contract number Registering a new FortiGate unit105 Downloading virus and attack definitions updates Changing your Fortinet support passwordChanging your contact information or security question 106107 Registering a FortiGate unit after an RMA108 Configuring interfaces Network configuration109 Bringing up an interface Viewing the interface listChanging an interface static IP address Adding a secondary IP address to an interfaceAdding a ping server to an interface Controlling management access to an interface111 Configuring the external interface with a static IP address Configuring traffic logging for connections to an interfaceConfiguring the external interface for Dhcp 113 Configuring the external interface for PPPoEConfiguring the management interface Transparent mode Adding DNS server IP addresses Configuring routing115 Go to System Network DNSAdding destination-based routes to the routing table Adding a default route117 Adding routes in Transparent modePolicy routing Configuring the routing tablePolicy routing command syntax Providing Dhcp services to your internal network119 Go to System Network Dhcp120 Viewing the dynamic IP list121 RIP configurationGo to System RIP Settings RIP settings122 123 UpdateInvalid HolddownPassword Configuring RIP for FortiGate interfaces124 Mode125 Adding RIP neighborsAdding RIP neighbors Go to System RIP Neighbor Adding a single RIP filter Adding RIP filters126 Go to System RIP Filter127 Adding a RIP filter listAdd the IP address of the route Mask Add the netmask of the route ActionAdding a routes filter Adding a neighbors filter128 Setting system date and time System configurationTo set the date and time Go to System Config Time 129Changing web-based manager options To set the system idle timeout130 To modify the Dead Gateway Detection settings To set the Auth timeout131 To select a language for the web-based managerAdding new administrator accounts Adding and editing administrator accountsGo to System Config Admin 132To edit an administrator account Go to System Config Admin Editing administrator accounts133 Configuring the FortiGate unit for Snmp monitoring Configuring SnmpConfiguring FortiGate Snmp support Go to System Config Snmp v1/v2c135 FortiGate MIBsTrap Community Trap Receiver IP Addresses FortiGate MIBs MIB file name Description EtherLike.mibFortiGate traps Customizing replacement messages136 FortiGate traps Trap message DescriptionGo to System Config Replacement Messages Customizing replacement messages137 138 Customizing alert emailsAlert email message sections Alert email message sections 139140 141 Firewall configurationAddresses Default firewall configuration142 Content profiles ServicesSchedules 143144 Adding firewall policiesGo to Firewall Policy 145 Traffic Shaping VPN Tunnel146 Dynamic IP Pool Fixed PortAnti-Virus & Web filter Authentication147 Comments Log Traffic148 Policy matching in detail Configuring policy listsChanging the order of policies in a policy list 149Enabling and disabling policies AddressesDisabling a policy Enabling a policy151 Adding addressesGo to Firewall Address Deleting addresses Editing addressesOrganizing addresses into address groups 152Predefined services Services153 ANY 154IRC 155Grouping services Providing access to custom servicesGo to Firewall Service Custom Go to Firewall Service Group157 SchedulesCreating recurring schedules Creating one-time schedules158 Go to Firewall Schedule One-time159 Adding a schedule to a policyAdding static NAT virtual IPs Virtual IPs160 161 Adding port forwarding virtual IPs162 163 Adding policies with virtual IPsAdding an IP pool IP pools164 Go to Firewall IP PoolIP pools and dynamic NAT IP Pools for firewall policies that use fixed ports165 IP/MAC binding Go to Firewall IP/MAC Binding Setting166 Go to Firewall IP/MAC Binding Static IP/MAC167 Adding IP/MAC addressesEnabling IP/MAC binding Viewing the dynamic IP/MAC list168 Go to Firewall IP/MAC Binding Dynamic IP/MAC169 Content profilesAdding a content profile Default content profilesGo to Firewall Content Profile 170171 Adding a content profile to a policyOversized File/Email Block Pass Fragmented Email 172 173 Users and authenticationAdding user names and configuring authentication Setting authentication timeoutAdding user names and configuring authentication 174175 Deleting user names from the internal databaseAdding Radius servers Configuring Radius supportDeleting Radius servers 176Adding Ldap servers Configuring Ldap support177 Go to User Ldap178 Deleting Ldap serversAdding user groups Configuring user groups179 Go to User User Group180 Deleting user groups181 IPSec VPNManual Keys Key managementAutoIKE with pre-shared keys AutoIKE with certificatesManual key IPSec VPNs General configuration steps for a manual key VPNAdding a manual key VPN tunnel 183184 Adding a phase 1 configuration for an AutoIKE VPN General configuration steps for an AutoIKE VPNGo to VPN Ipsec Phase AutoIKE IPSec VPNsRemote Gateway Static IP Address 186Remote Gateway Dialup User 187 Configuring advanced options188 189 Adding a phase 2 configuration for an AutoIKE VPN190 Obtaining a signed local certificate Managing digital certificates191 192 Generating the certificate requestGo to VPN Local Certificates Requesting the signed local certificate Downloading the certificate request193 Importing the signed local certificate Retrieving the signed local certificate194 Retrieving a CA certificate Obtaining a CA certificateImporting a CA certificate 195196 Configuring encrypt policiesAdding a destination address Adding a source addressAdding an encrypt policy 197Adding an encrypt policy 198IPSec VPN concentrators VPN concentrator hub general configuration steps199 Source InternalAll Destination VPN spoke address Action 200201 Adding a VPN concentratorGo to VPN IPSec Concentrator 202 VPN spoke general configuration stepsVPN Tunnel PoliciesRedundant IPSec VPNs Configuring redundant IPSec VPN203 204 See Adding a phase 1 configuration for an AutoIKE VPN onViewing VPN tunnel status Monitoring and Troubleshooting VPNsViewing dialup VPN connection status 205206 Testing a VPNGo to VPN IPSec Dialup Pptp and L2TP VPN Configuring Pptp207 Adding users and user groups Configuring the FortiGate unit as a Pptp gatewayEnabling Pptp and specifying an address range 208209 Adding an address groupInstalling Pptp support Configuring a Windows 98 client for PptpGo to Start Settings Control Panel Network Adding a firewall policyConnecting to the Pptp VPN Configuring a Pptp dialup connectionConfiguring a Windows 2000 client for Pptp 211Configuring the VPN connection Configuring a Windows XP client for Pptp212 Go to Start Control Panel213 Configuring L2TPEnabling L2TP and specifying an address range Configuring the FortiGate unit as a L2TP gateway214 Go to VPN L2TP L2TP Range215 Sample L2TP address range configuration216 Configuring an L2TP dialup connection Configuring a Windows 2000 client for L2TPDisabling IPSec 217Configuring a Windows XP client for L2TP Connecting to the L2TP VPNConfiguring an L2TP VPN dialup connection Go to Start Settings219 220 Detecting attacks Network Intrusion Detection System Nids221 Selecting the interfaces to monitor Configuring checksum verificationDisabling the Nids 222Viewing attack descriptions Viewing the signature list223 Go to Nids Detection Signature ListAdding user-defined signatures Enabling and disabling Nids attack signatures224 Go to Nids Detection User Defined Signature ListDownloading the user-defined signature list Preventing attacksEnabling Nids attack prevention 225Enabling Nids attack prevention signatures Setting signature threshold values226 227 Value Description Minimum Maximum Default Configuring synflood signature valuesLogging attacks Logging attack messages to the attack logAutomatic message reduction Reducing the number of Nids attack log and email messagesManual message reduction 229230 Antivirus protection General configuration steps231 232 Antivirus scanningTo scan FortiGate firewall traffic for viruses Blocking files in firewall traffic File blockingAdding file patterns to block 233Blocking oversized files and emails Configuring limits for oversized files and emailExempting fragmented email from blocking Viewing the virus list235 Web filteringGo to Web Filter Content Block Content blockingAdding words and phrases to the banned word list 236URL blocking Using the FortiGate web filterAdding URLs or URL patterns to the block list 237238 Clearing the URL block listUploading a URL block list Downloading the URL block list239 Installing a Cerberian license key on the FortiGate unit Using the Cerberian web filterAdding a Cerberian user to the FortiGate unit 240About the default group and policy Configuring Cerberian web filterTo configure the Cerberian web filtering Enabling Cerberian URL filteringEnabling the script filter Script filteringSelecting script filter options 242Adding URLs to the exempt URL list Exempt URL list243 Go to Web Filter Exempt URL244 245 Email filterEmail banned word list Go to Email Filter Content Block246 Email exempt list Email block listAdding address patterns to the email block list 247Adding a subject tag To add a subject tag Go to Email Filter ConfigAdding address patterns to the email exempt list 248Recording logs Logging and reporting249 Recording logs on a NetIQ WebTrends server Recording logs on a remote computer250 Recording logs in system memory Filtering log messages251 252 Example log filter configurationEnabling traffic logging Configuring traffic loggingEnabling traffic logging for an interface Enabling traffic logging for a firewall policyGo to Log&Report Log Setting Traffic Filter Configuring traffic filter settingsAdding traffic filter entries 254Viewing logs saved to memory Destination IP Address Destination Netmask ServiceViewing logs 255Searching logs Configuring alert emailAdding alert email addresses 256Enabling alert email Testing alert email257 Go to Log&Report Alert Mail Categories258 259 Glossary260 261 262 263 IndexIndex 264FDS 265Ldap 266MIB 267RMA 268TCP 269UDP 270271 272
Related manuals
Manual 84 pages 47.25 Kb