Fortinet 60B manual Antivirus options, Configuring firewall policies

Page 33

 

 

Advanced configuration

Antivirus options

Configuring firewall policies

To add or edit a firewall policy go to Firewall > Policy and select Edit on an existing policy, or select Create New to add a policy.

The source and destination Interface/Zone match the firewall policy with the source and destination of a communication session. The Address Name matches the source and destination address of the communication session.

Schedule defines when the firewall policy is enabled. While most policies are always on, you can configure a firewall policy so that it is only on at specific times of the day. For example, you may want to block news and entertainment sites most of the day, except during lunch or after work, enabling your employees to only view those sites during non-working times.

Service matches the firewall policy with the service used by a communication session. This enables you to configure a policy for general web surfing and a different policy specifically for other traffic such as SMTP mail or FTP uploads and downloads.

Action defines how the FortiGate unit processes traffic. Specify an action to accept or deny traffic or configure a firewall encryption policy.

Add ACCEPT policies that accept communication sessions. Using an accept policy, you can apply FortiGate features such as virus scanning and authentication to the communication session accepted by the policy.

Add DENY policies to deny communication sessions.

Add IPSec encryption policies to enable IPSec tunnel mode VPN traffic and SSL VPN encryption policies to enable SSL VPN traffic. Firewall encryption policies determine which types of IP traffic will be permitted during an IPSec or SSL VPN session.

Select Protection Profile to include apply a protection profile to the firewall policy for scanning of traffic passing through the FortiGate unit.

For details on the firewall policies features and settings, see the FortiGate Administration Guide or the FortiGate Online Help.

Antivirus options

The FortiGate unit’s antivirus configuration prevents malicious files from entering and infecting your network environment.

The FortiGate unit uses a number of processes to scan files to ensure unwanted files and potential attackers do not get through. The FortiGate unit scans using these antivirus options:

File pattern - The FortiGate will check the file against the file pattern setting you have configured. You can set which file names or file types the FortiGate unit looks for in the incoming traffic.

Virus scan - The virus definitions are kept up to date through the FortiNet Distribution Network. The list is updated on a regular basis so you do not have to wait for a firmware upgrade. Note that you must register the FortiGate unit to and purchase FortiGuard services to use virus scanning through the FDN.

FortiGate-60B FortiOS 3.0 MR6 Install Guide

 

01-30006-0446-20080910

33

Image 33
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the modem interface Advanced configurationConfiguring Transparent mode Protection profilesIndex FortiGate FirmwarePage Register your FortiGate unit IntroductionAbout the FortiGate-60B About this documentDocument conventions Typographic conventions Further ReadingCustomer service and technical support Fortinet Knowledge CenterComments on Fortinet technical documentation Environmental specifications InstallingRack mount instructions GroundingPlugging in the FortiGate Connecting to the networkTurning off the FortiGate unit MountingTurning off the FortiGate unit NAT mode NAT vs. Transparent modeTransparent mode Connecting to the FortiGate unitConnecting to the web-based manager To connect to the web-based managerTo connect to the CLI Connecting to the CLIUsing the web-based manager Configuring NAT modeConfigure the interfaces To configure interfaces Go to System Network InterfaceAdding a default route and gateway Configure a DNS serverAdding firewall policies To modify the default gateway Go to Router StaticUsing the CLI To set an interface to use a static addressTo set an interface to use Dhcp addressing To set an interface to use PPPoE addressing To configure DNS server settingsConfiguring Transparent mode To modify the default gatewayTo add an outgoing traffic firewall policy To switch to Transparent mode Go to System Status Switching to Transparent modeTo switch to Transparent mode To configure DNS server settings Backing up the configuration Verify the configurationAdditional configuration Restoring a configurationSet the Administrator password Set the time and dateUpdating antivirus and IPS signatures Configure FortiGuardAdditional configuration Protection profiles Advanced configurationFirewall policies Firewall policiesAntivirus options Configuring firewall policiesAntiSpam options Web filtering Logging Redundant mode Selecting a modem modeStand alone mode Configuring modem settingsDial on demand To configure modem settings Go to System Network ModemSyntax Configuring the modem using the CLIKeywords and variables Description Default Mode redudant Phone-number ExampleDead gateway detection Adding a Ping ServerConfiguring the Pcmcia modem card Administrative access through the modem portTo configure the modem Go to System Network Modem Adding firewall policies for modem connectionsAt+cpin=5555 Downloading firmware FortiGate FirmwareUsing the web-based manager Upgrading the firmwareReverting to a previous version Backup and Restore from a USB key Using the USB Auto-InstallTo revert to a previous firmware version To upgrade the firmware using the CLI Using the CLITo revert to a previous firmware version using the CLI Execute restore image namestr tftpip4Execute restore image namestr tftpipv4 Installing firmware from a system reboot using the CLIPress any key to display configuration menu To install firmware from a system rebootTo backup configuration using the CLI Restoring the previous configurationAdditional CLI Commands for a USB key To restore configuration using the CLITo configure the USB Auto-Install using the CLI To test the new firmware image Testing new firmware before installingTesting new firmware before installing Testing new firmware before installing Index System modem 43 system reboot, installing Page Page Page Page

60B specifications

The Fortinet FortiGate 60B is a compact, high-performance network security appliance designed for small to medium-sized businesses. As part of Fortinet's FortiGate series, the 60B integrates advanced security features and technologies, making it an ideal solution for organizations seeking to protect their networks from growing cyber threats.

One of the main features of the FortiGate 60B is its robust firewall capability. The device provides next-generation firewall (NGFW) functionalities, allowing businesses to monitor and control traffic at multiple layers. This includes application control, intrusion prevention, and web filtering, ensuring that only legitimate traffic is allowed access to critical resources. With a strong emphasis on threat detection, the 60B employs FortiGuard Labs' threat intelligence services to stay updated on the latest malware and attack vectors.

Another significant characteristic of the FortiGate 60B is its integrated virtual private network (VPN) capabilities. The device supports both site-to-site and remote access VPNs, enabling secure connections for remote employees and branch offices. This feature is essential for organizations that require secure communication over public networks, ensuring that sensitive data remains protected.

Performance is also a focal point of the FortiGate 60B. The appliance is equipped with dedicated hardware acceleration that optimizes throughput and minimizes latency. With impressive SSL inspection capabilities, it can handle encrypted traffic efficiently, making it well-suited for an increasingly secure internet landscape.

The FortiGate 60B also boasts extensive reporting and analytics features, enabling IT teams to gain valuable insights into network activity. This includes detailed logs and dashboards that help organizations identify potential security risks and respond to incidents in real time. In addition, the appliance is built with scalability in mind, allowing businesses to expand their security posture as they grow.

Furthermore, the FortiGate 60B is designed for ease of management. The unit can be configured and monitored through Fortinet's centralized management system, FortiManager, simplifying the administration of multiple devices across various locations.

In summary, the Fortinet FortiGate 60B is a powerful, versatile network security solution that combines advanced firewall capabilities, VPN support, and integrated threat intelligence. With its strong performance metrics and user-friendly management tools, it is an excellent choice for organizations aiming to bolster their cybersecurity defenses while maintaining operational efficiency.