
Index
IDS log viewing 255
IKE 259
IMAP 154, 259
Inbound NAT encrypt policy 146
interface RIP 124
internal address example 152
internal address group example 153
internal network configuring 48
Internet
blocking access to Internet sites 237, 247 blocking access to URLs 237, 247
Internet key exchange 259
intrusion attempts alert email 257
IP
configuring checksum verification 222
IP address
IP/MAC binding 166
IP addresses
configuring from the CLI 45, 59
IP pool adding 164
IP spoofing 166
IP/MAC binding 166 adding 167 allow traffic 167 block traffic 167 dynamic IP/MAC list 166 enabling 168
static IP/MAC list 166 IPSec 259
IPSec VPN
authentication for user group 179 AutoIKE 182
certificates 182 disabling 217, 219 manual keys 182
IPSec VPN tunnel testing 206
J
Java applets 242
removing from web pages 242
L
L2TP 179, 259
configuring Windows XP client 218 network configuration 214
L2TP gateway configuring 214
language
LDAP
example configuration 178 LDAP server
adding server address 177 deleting 178
lease duration DHCP 119
log setting
filtering log entries 94, 251 traffic filter 254
log to memory configuring 251 viewing saved logs 255
Log Traffic
firewall policy 148 policy 148
logging 19, 249 attack log 251
configuring traffic settings 253, 254 email filter log 252
enabling alert email 257 event log 251
filtering log messages 251 log to memory 251
log to remote host 250 log to WebTrends 250 recording 249 searching logs 256 selecting what to log 251 traffic log 251
traffic sessions 253 update log 252 virus log 251
web filtering log 251 logs
recording on NetIQ WebTrends server 250
M
MAC address 260 IP/MAC binding 166
malicious scripts
removing from web pages 242, 248 management interface
Transparent mode 114 management IP address
transparent mode 59
K
manual keys introduction 182
keyword | matching |
log search 256 | policy 149 |
266 | Fortinet Inc. |