12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Firewall Policy<br />

About firewall policies<br />

Firewall Policy<br />

Firewall policies control all traffic passing through the <strong>FortiGate</strong> unit. Add firewall<br />

policies to control connections and traffic between <strong>FortiGate</strong> interfaces, zones,<br />

and VLAN subinterfaces.<br />

This section describes:<br />

• About firewall policies<br />

• Viewing the firewall policy list<br />

• Configuring firewall policies<br />

• Firewall policy examples<br />

About firewall policies<br />

Firewall policies are instructions the <strong>FortiGate</strong> unit uses to decide what to do with<br />

a connection request. When the firewall receives a connection request in the form<br />

of a packet, it analyzes the packet to extract its source address, destination<br />

address, and service (by port number).<br />

For the packet to be connected through the <strong>FortiGate</strong> unit, the source address,<br />

destination address, and service of the packet must match a firewall policy. The<br />

policy directs the firewall action on the packet. The action can be to allow the<br />

connection, deny the connection, require authentication before the connection is<br />

allowed, or process the packet as an IPSec VPN packet.<br />

Each policy can be configured to route connections or apply network address<br />

translation (NAT) to translate source and destination IP addresses and ports. Add<br />

IP pools to use dynamic NAT when the firewall translates source addresses. Use<br />

policies to configure port address translation (PAT) through the <strong>FortiGate</strong> unit.<br />

Add protection profiles to firewall policies to apply different protection settings for<br />

the traffic that is controlled by firewall policies. For details about protection<br />

profiles, see “Firewall Protection Profile” on page 329.<br />

Enable traffic logging for a firewall policy so the <strong>FortiGate</strong> unit logs all connections<br />

that use this policy.<br />

The firewall matches policies by searching for a match starting at the top of the<br />

policy list and moving down until it finds the first match. Arrange policies in the<br />

policy list from more specific to more general. For example, the default policy is a<br />

very general policy because it matches all connection attempts. Exceptions to that<br />

policy are added to the policy list above the default policy. No policy below the<br />

default policy will ever be matched.<br />

Policy options are configurable when creating or editing a firewall policy.<br />

Depending on the type of action selected, a different set of options is presented.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 267

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!