12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Viewing the firewall policy list<br />

Firewall Policy<br />

Multicast policies<br />

The <strong>FortiGate</strong> unit supports multicast policies. You can configure and create<br />

multicast policies using the following CLI <strong>com</strong>mand:<br />

config firewall multicast-policy<br />

For details, see the <strong>FortiGate</strong> CLI Reference.<br />

How policy matching works<br />

When the <strong>FortiGate</strong> unit receives a connection attempt at an interface, it selects a<br />

policy list to search through for a policy that matches the connection attempt. The<br />

<strong>FortiGate</strong> unit chooses the policy list based on the source and destination<br />

addresses of the connection attempt.<br />

The <strong>FortiGate</strong> unit then starts at the top of the selected policy list and searches<br />

down the list for the first policy that matches the connection attempt source and<br />

destination addresses, service port, and time and date at which the connection<br />

attempt was received. The first policy that matches is applied to the connection<br />

attempt. If no policy matches, the connection is dropped. As a general rule,<br />

always order firewall policies from most specific to most general.<br />

General policies are policies that can accept connections from multiple source<br />

and destination addresses or from address ranges. General policies can also<br />

accept connections from multiple service ports or have schedules that mean the<br />

policy can be matched over a wide range of times and dates. If you want to add<br />

policies that are exceptions to general policies, then these specific exception<br />

policies should be added to the policy list above the general policies.<br />

For example, you may have a general policy that allows all users on your internal<br />

network to access all services on the Internet. If you want to block access to FTP<br />

servers on the Internet, you should add a policy that denies FTP connections<br />

above the general policy. The deny policy blocks FTP connections, but connection<br />

attempts for all other kinds of services do not match the FTP policy but do match<br />

the general policy. Therefore, the firewall still accepts all connections from the<br />

internal network to the Internet other than FTP connections.<br />

Also note the following about policy matching:<br />

• Policies that require authentication must be added to the policy list above<br />

matching policies that do not; otherwise, the policy that does not require<br />

authentication is selected first.<br />

• IPSec VPN tunnel mode policies must be added to the policy list above<br />

matching accept or deny policies<br />

• SSL VPN policies must be added to the policy list above matching accept or<br />

deny policies<br />

Viewing the firewall policy list<br />

If virtual domains are enabled on the <strong>FortiGate</strong> unit, firewall policies are<br />

configured separately for each virtual domain. To access policies, select a virtual<br />

domain from the main menu.<br />

You can add, delete, edit, and re-order policies in the policy list.<br />

To view the policy list, go to Firewall > Policy.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

268 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!