Fortinet 620B manual AntiSpam options

Page 36

AntiSpam options

Advanced configuration

Grayware - These are unsolicited commercial software programs that are installed on computers, often without the user's consent or knowledge. Grayware programs are generally considered an annoyance, but these programs can cause system performance problems or be used for malicious ends. The FortiGate unit scans for known grayware executable programs in each enabled category.

Heuristics - The FortiGate heuristic antivirus engine performs tests on the file to detect virus-like behavior or known virus indicators. In this way, heuristic scanning may detect new viruses, but may also produce some false positive results.

The antivirus elements work in sequence to give you an efficient method of scanning incoming files. The first three elements have specific functions, the fourth, the heuristics, is to cover any new previously unknown virus threats. The four elements work together to offer your network unparalleled antivirus protection. To ensure that your system is providing the most protection available, all virus definitions and signatures are up dated regularly through the FortiGuard antivirus services.

To configure the file patterns that the FortiGate scans, go to AntiVirus > File Filter.

To enable grayware blocking, go to AntiVirus > Config > Grayware.

Antivirus settings are turned on in the protection profile. In the protection profile you can enable antivirus options for specific services and which services will use the file patterns as a part of the antivirus process.

To configure antivirus protection profile settings, go to Firewall > Protection Profile. Select edit for a profile and select the Anti-Virus options.

For details on the antivirus features and settings, see the FortiGate Administration Guide or the FortiGate Online Help.

AntiSpam options

The FortiGate unit’s antispam feature detects unsolicited commercial email by identifying spam email messages and spam transmissions from known or suspected spam servers.

This feature requires a FortiGuard subscription and a registered FortiGate unit. When the FortiGate unit receives an email message, it verifies with the FortiGuard server whether it is a valid email or a spam message. FortiGuard Antispam is one of the features designed to manage spam. FortiGuard is an antispam system from Fortinet that includes an IP address black list, a URL black list, and spam filtering tools. The FortiGuard Center accepts submission of spam email messages as well as well as reports of false positives.

Depending on how you configure the FortiGate unit, the FortiGate unit will either tag the message with text so you can easily identify the spam, or delete the message before it reaches the recipient.

The FortiGate unit also enables you to create your own spam filters using banned words and black/white lists.

 

FortiGate-620B FortiOS 3.0 MR6 Install Guide

36

01-30006-83054-20081015

Image 36
Contents Install G U I D E Trademarks Regulatory complianceContents Advanced configuration AMC modulesUsing the web-based manager Installing firmware from a system reboot using the CLITesting new firmware before installing FortiGate FirmwarePage Introduction Register your FortiGate unitLacp configuration About the FortiGate-620BAbout this document Further Reading Document conventionsTypographic conventions Addressipv4FortiGate Administration Guide Fortinet Knowledge CenterCustomer service and technical support Comments on Fortinet technical documentationCustomer service and technical support Installing Environmental specificationsGrounding Rack mount instructionsTo install the FortiGate unit into a rack MountingConnecting to the network To power on the FortiGate unitTo power off the FortiGate unit Plugging in the FortiGateConfiguring NAT vs. Transparent modeNAT mode Connecting to the FortiGate unit Transparent modeConnecting to the web-based manager To connect to the web-based managerConnecting to the CLI To connect to the CLIConfiguring NAT mode Using the web-based managerConfigure the interfaces To configure interfaces Go to System Network InterfaceConfigure a DNS server Adding a default route and gatewayTo modify the default gateway Go to Router Static Adding firewall policiesUsing the CLI To set an interface to use a static addressTo set an interface to use Dhcp addressing To configure DNS server settings To set an interface to use PPPoE addressingTo modify the default gateway To add an outgoing traffic firewall policyConfiguring Transparent mode Switching to Transparent modeTo switch to Transparent mode Go to System Status Source Address All Destination Interface To switch to Transparent mode Verify the configuration Backing up the configurationRestoring a configuration Additional configurationSet the Administrator password Set the time and dateConfigure FortiGuard Updating antivirus and IPS signaturesAdditional configuration Advanced configuration Protection profilesFirewall policies Firewall policiesConfiguring firewall policies Antivirus optionsAntiSpam options Web filtering Logging Installing AMC filler units Installing modulesTo install the filler module AMC modulesUsing the AMC modules Removing modulesHard disk module To insert a module into a FortiGate chassisLog configuration using the web-based manager To format the ASM-S08 hard disk enter the following commandFormatting the hard disk Execute formatlogdiskLog configuration using the CLI Changing interfaces to operate in Sgmii or SerDes modeFortiAnalyzer command config log disk setting enable Viewing logsConfigure the speed Config system interface edit AMC-SW1/1 Set speed auto EndUsing the AMC modules FortiGate Firmware Downloading firmwareUsing the web-based manager Upgrading the firmwareReverting to a previous version Backup and Restore from a USB key Using the USB Auto-InstallTo revert to a previous firmware version Using the CLI To upgrade the firmware using the CLIExecute ping Execute restore image namestr tftpip4 Execute restore image image.outExecute update-now To revert to a previous firmware version using the CLIInstalling firmware from a system reboot using the CLI Execute restore image namestr tftpipv4Execute restore image image28.out Execute restore config namestr tftpip4To install firmware from a system reboot Execute rebootPress any key to display configuration menu Enter Tftp server addressRestoring the previous configuration To backup configuration using the CLIEnter Local Address Enter File Name image.outAdditional CLI Commands for a USB key To restore configuration using the CLITo configure the USB Auto-Install using the CLI Testing new firmware before installing To test the new firmware imageTesting new firmware before installing Testing new firmware before installing Index Web filtering 37 web-based manager Page Page

620B specifications

The Fortinet 620B is a state-of-the-art security appliance designed to provide comprehensive cybersecurity solutions for medium to large enterprises. As part of Fortinet's FortiGate series, the 620B combines advanced security features with robust performance capabilities, ensuring that organizations can protect their networks against an evolving threat landscape.

One of the standout features of the Fortinet 620B is its exceptional threat protection capabilities. The device utilizes Fortinet's proprietary FortiOS operating system, which integrates multiple security functions, including firewall, intrusion prevention system (IPS), virtual private network (VPN), and antivirus. This unified approach enables organizations to enforce consistent security policies across their network without compromising performance.

The FortiGate 620B is powered by Fortinet's purpose-built security processing unit (SPU) architecture, which significantly accelerates threat detection and mitigation processes. With multi-core processing capabilities, the device can handle high volumes of traffic while maintaining low latency, making it suitable for environments with heavy data flows. This performance is critical for organizations requiring real-time inspection of encrypted traffic, as the 620B offers strong decryption capabilities without sacrificing throughput.

In addition to its security features, the Fortinet 620B includes advanced networking technologies. The device supports software-defined networking (SDN) and integrates with Fortinet’s Security Fabric, allowing for enhanced visibility and control across the entire network ecosystem. This fabric architecture enables seamless communication between multiple devices, streamlining the management of security policies and improving overall network efficiency.

Another key characteristic of the FortiGate 620B is its scalability. Organizations can easily scale their deployment to meet growing demands by utilizing additional Fortinet appliances and services. The device also provides extensive reporting and analytics features, offering insights into network usage and security incidents, empowering security teams to make informed decisions.

Overall, the Fortinet 620B is an exceptional solution for organizations looking to strengthen their network security posture. With its combination of powerful threat protection, high performance, and advanced networking capabilities, it stands out as a reliable choice for safeguarding critical business operations in today's digital landscape. Its comprehensive feature set, combined with Fortinet's commitment to innovation, makes the FortiGate 620B a formidable asset for any cybersecurity strategy.