Fortinet 30B manual Firewall policies

Page 34

Firewall policies

Advanced configuration

Web Apply virus scanning and web content blocking to HTTP traffic.

Unfiltered Apply no scanning, blocking or IPS. Use the unfiltered content profile if no content protection for content traffic is required. Add this protection profile to firewall policies for connections between highly trusted or highly secure networks where content does not need to be protected.

The best way to begin creating your own protection profile is to open a predefined profile. This way you can see how a profile is set up, and then modify it suit your requirements. You access Protection profile options by going to Firewall > Protection Profile, and selecting Edit for one of the predefined profiles.

Protection profiles are used by the firewall policies to determine how network and Internet traffic is controlled, scanned and when necessary, rejected. The Protection Profiles can be considered the rules of the firewall policy. Because of this, you should take some time to review the various options to consider what you want the firewall policies to do. If, after setting the protection profile and firewall policies, traffic is not flowing or flowing too much, verify your profile settings.

The number of options and configuration for the protection profile is too vast for this document. For details on each protection profile feature and setting, see the FortiGate Administration Guide or the FortiGate Online Help.

Firewall policies

Firewall policies are instructions the FortiGate unit uses to decide what to do with a connection request. When the firewall receives a connection request, it analyzes it to extract its source address, destination address, and port number.

For the connection through the FortiGate unit to be successful, the source address, destination address, and service of the connection must match a firewall policy. The policy directs the firewall action for the connection. The action can be to allow the connection, deny the connection, require authentication before the connection is allowed, or process the packet as an IPSec VPN connection.

You can configure each firewall policy to route connections or apply network address translation (NAT) to translate source and destination IP addresses and ports. You also add protection profiles to firewall policies to apply different protection settings for the traffic controlled by firewall policies.

The FortiGate unit matches firewall policies by searching from the top of the firewall policy list and moving down until it finds the first match, then performs the required address translation, blocking and so on described by the protection profile, then passes on the packet information. This is important, because once the FortiGate unit finds a match to a policy, it will not continue down the list. You need to arrange policies in the policy list from more specific to more general.

For example, if you have two policies, one that blocks specific URLs or IP addresses, and another general policy that lets traffic through. If you put the general policy at the top, the FortiGate unit will act on the general policy, figuring the policy has been matched and potentially let the URLs or IPs you wanted blocked through.

Note: No traffic will flow through a FortiGate unit until at least one firewall policy is added.

 

FortiGate-30B FortiOS 3.0 MR6 Install Guide

34

01-30006-0459-20080505

Image 34
Contents Install G U I D E Trademarks Regulatory complianceConfiguring InstallingConents Introduction Advanced configuration FortiGate FirmwareTesting new firmware before installing Installing firmware from a system reboot using the CLIIndex Page Introduction Register your FortiGate unitAbout the FortiGate-30B About this documentDocument conventions Further ReadingTypographic conventions Fortinet Knowledge Center Comments on Fortinet technical documentationCustomer service and technical support Customer service and technical support Installing Environmental specificationsRack mount instructions GroundingMounting To power off the FortiGate unit Connecting to the networkTo power on the FortiGate unit Plugging in the FortiGateTurning off the FortiGate unit NAT vs. Transparent mode NAT modeConnecting to the web-based manager Connecting to the FortiGate unitTransparent mode To connect to the web-based managerConnecting to the CLI To connect to the CLIConfigure the interfaces Configuring NAT modeUsing the web-based manager To configure interfaces Go to System Network InterfaceConfigure a DNS server Adding a default route and gatewayTo modify the default gateway Go to Router Static Adding firewall policiesTo set an interface to use a static address Using the CLITo set an interface to use Dhcp addressing To configure DNS server settings To set an interface to use PPPoE addressingTo modify the default gateway Configuring Transparent modeTo add an outgoing traffic firewall policy Switching to Transparent mode To switch to Transparent mode Go to System StatusTo switch to Transparent mode To configure DNS server settings Verify the configuration Backing up the configurationSet the Administrator password Restoring a configurationAdditional configuration Set the time and dateConfigure FortiGuard Updating antivirus and IPS signaturesAdditional configuration Advanced configuration Protection profilesFirewall policies Firewall policiesConfiguring firewall policies Antivirus optionsAntiSpam options Web filtering Logging FortiGate Firmware Downloading firmwareUpgrading the firmware Using the web-based managerReverting to a previous version Using the USB Auto-Install Backup and Restore from a USB keyTo revert to a previous firmware version Using the CLI To upgrade the firmware using the CLIExecute restore image namestr tftpip4 To revert to a previous firmware version using the CLIInstalling firmware from a system reboot using the CLI Execute restore image namestr tftpipv4To install firmware from a system reboot Press any key to display configuration menuRestoring the previous configuration To backup configuration using the CLITo restore configuration using the CLI Additional CLI Commands for a USB keyTo configure the USB Auto-Install using the CLI Testing new firmware before installing To test the new firmware imageTesting new firmware before installing Testing new firmware before installing Index Web filtering 37 web-based manager Page Page

30B specifications

Fortinet's FortiGate 30B is a compact yet powerful security appliance designed for small to medium-sized businesses and branch offices. This next-generation firewall (NGFW) integrates various security functions, helping organizations safeguard their networks without compromising on performance or ease of use.

One of the standout features of the FortiGate 30B is its robust security capabilities. It offers firewall protection, intrusion prevention systems (IPS), antivirus, web filtering, and application control, all in one device. This consolidated approach simplifies security management, enabling companies to deploy a range of protections without the need for multiple products.

The FortiGate 30B utilizes Fortinet's proprietary FortiOS operating system, which allows for centralized management and visibility into network traffic. With features like FortiView, administrators can gain insights into application usage, user activities, and security events, helping them make informed decisions to enhance their security posture.

Performance is another critical aspect of the FortiGate 30B. Equipped with Fortinet's purpose-built security processing units (SPUs), the device is designed to handle high throughput while maintaining low latency. This ensures that businesses can operate smoothly without facing interruptions caused by security measures.

Additionally, the FortiGate 30B supports advanced technologies such as VPN (Virtual Private Network) for secure remote access and SD-WAN (Software-Defined Wide Area Network) capabilities. This combination enables organizations to optimize their network performance and enhance connectivity between branch offices or remote workers, making it an ideal solution for today's flexible work environments.

A highlight of the FortiGate 30B is its ease of deployment. With a user-friendly interface and guided setup wizards, even those with limited IT experience can configure the device quickly. The included FortiCloud service allows for easy management and monitoring, further simplifying the administrative overhead.

Scalability is yet another critical characteristic of the FortiGate 30B. As businesses grow, they can easily expand their security infrastructure by integrating additional Fortinet solutions into their network, maintaining a cohesive security strategy without disrupting operations.

In summary, the FortiGate 30B offers a comprehensive, high-performance security solution for small and medium-sized organizations. With its integrated features, advanced technologies, and user-friendly management capabilities, it empowers businesses to protect their networks effectively while ensuring optimal performance and scalability for future growth.