Predefined service list

 

 

Firewall

 

 

 

 

 

 

 

 

Table 21: FortiGate predefined services

 

 

 

 

 

 

 

 

 

 

 

 

Service name

Description

Protocol

Port

 

 

 

 

 

 

 

 

 

 

ANY

Match connections on any port. A connection

all

all

 

 

 

 

that uses any of the predefined services is

 

 

 

 

 

 

allowed through the firewall.

 

 

 

 

 

GRE

Generic Routing Encapsulation. A protocol

 

47

 

 

 

 

that allows an arbitrary network protocol to be

 

 

 

 

 

 

transmitted over any other arbitrary network

 

 

 

 

 

 

protocol, by encapsulating the packets of the

 

 

 

 

 

 

protocol within GRE packets.

 

 

 

 

 

AH

Authentication Header. AH provides source

 

51

 

 

 

 

host authentication and data integrity, but not

 

 

 

 

 

 

secrecy. This protocol is used for

 

 

 

 

 

 

authentication by IPSec remote gateways set

 

 

 

 

 

 

to aggressive mode.

 

 

 

 

 

ESP

Encapsulating Security Payload. This service

 

50

 

 

 

 

is used by manual key and AutoIKE VPN

 

 

 

 

 

 

tunnels for communicating encrypted data.

 

 

 

 

 

 

AutoIKE key VPN tunnels use ESP after

 

 

 

 

 

 

establishing the tunnel using IKE.

 

 

 

 

 

AOL

AOL instant messenger protocol.

tcp

5190-5194

 

 

 

 

 

 

 

 

 

 

BGP

Border Gateway Protocol routing protocol.

tcp

179

 

 

 

 

BGP is an interior/exterior routing protocol.

 

 

 

 

 

DHCP

Dynamic Host Configuration Protocol (DHCP)

udp

67

 

 

 

 

allocates network addresses and delivers

 

 

 

 

 

 

configuration parameters from DHCP servers

 

 

 

 

 

 

to hosts.

 

 

 

 

 

DNS

Domain name service for translating domain

tcp

53

 

 

 

 

names into IP addresses.

 

 

 

 

 

 

udp

53

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

FINGER

A network service that provides information

tcp

79

 

 

 

 

about users.

 

 

 

 

 

FTP

FTP service for transferring files.

tcp

21

 

 

 

 

 

 

 

 

 

 

GOPHER

Gopher communication service. Gopher

tcp

70

 

 

 

 

organizes and displays Internet server

 

 

 

 

 

 

contents as a hierarchically structured list of

 

 

 

 

 

 

files.

 

 

 

 

 

H323

H.323 multimedia protocol. H.323 is a

tcp

1720, 1503

 

 

 

 

standard approved by the International

 

 

 

 

 

 

Telecommunication Union (ITU) that defines

 

 

 

 

 

 

how audiovisual conferencing data is

 

 

 

 

 

 

transmitted across networks.

 

 

 

 

 

HTTP

HTTP is the protocol used by the word wide

tcp

80

 

 

 

 

web for transferring data for web pages.

 

 

 

 

 

HTTPS

HTTP with secure socket layer (SSL) service

tcp

443

 

 

 

 

for secure communication with web servers.

 

 

 

 

 

IKE

IKE is the protocol to obtain authenticated

udp

500

 

 

 

 

keying material for use with ISAKMP for

 

 

 

 

 

 

IPSEC.

 

 

 

 

 

IMAP

Internet Message Access Protocol is a

tcp

143

 

 

 

 

protocol used for retrieving email messages.

 

 

 

 

 

Internet-Locator-

Internet Locator Service includes LDAP, User

tcp

389

 

 

 

Service

Locator Service, and LDAP over TLS/SSL.

 

 

 

 

204

01-28007-0068-20041203

Fortinet Inc.

Page 204
Image 204
Fortinet 100A manual 204, Any

100A specifications

Fortinet 100A is a versatile network security device designed to provide comprehensive protection against various cyber threats while ensuring optimal network performance. As part of the FortiGate series, the 100A combines advanced security features with powerful hardware capabilities, making it suitable for small to medium-sized businesses.

One of the key features of the Fortinet 100A is its deep packet inspection technology. This capability allows the firewall to analyze both the header and payload of packets traversing the network, enabling it to detect and block malicious content effectively. The 100A can identify and mitigate a wide range of threats, including malware, intrusions, and application-layer attacks.

The FortiOS operating system powers the Fortinet 100A, offering a robust and user-friendly interface for configuration and management. With its unified security management console, administrators can efficiently monitor network traffic and enforce security policies across the organization. The system provides centralized logging and reporting features, enabling users to gain valuable insights into their security posture and respond swiftly to incidents.

The 100A supports multiple deployment modes, including transparent, NAT, and route modes. This flexibility allows organizations to integrate the device into their existing network architecture with ease. The firewall's high throughput capabilities ensure that network performance remains unaffected, even under heavy load from multiple users and devices.

Another notable aspect of the Fortinet 100A is its support for various VPN technologies, including IPsec and SSL VPN. This feature facilitates secure remote access for employees, enabling them to connect to the corporate network safely, regardless of their location. As remote work continues to be a norm in many sectors, this capability is critical for maintaining productivity and security.

In addition to these features, the Fortinet 100A provides comprehensive web filtering capabilities, protecting users from harmful websites and inappropriate content. This protection is essential for organizations looking to maintain a secure and productive environment.

With its combination of powerful security features, flexible deployment options, and robust performance, the Fortinet 100A stands out as an ideal solution for organizations seeking to bolster their cybersecurity measures while ensuring seamless connectivity for users. As cyber threats continue to evolve, investing in a capable device like the FortiGate 100A is crucial for maintaining a secure network infrastructure.