12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring firewall policies<br />

Firewall Policy<br />

Firewall policy options<br />

Service matches the firewall policy with the service used by a <strong>com</strong>munication<br />

session.<br />

Action defines how the <strong>FortiGate</strong> unit processes traffic. Specify an action to accept<br />

or deny traffic or configure a firewall encryption policy.<br />

You can use the remaining firewall policy options (NAT, Protection Profile, Log<br />

Allowed Traffic, Log Violation Traffic, Authentication, and Traffic shaping) to set<br />

additional features. Log Violation Traffic can be applied to policies that deny traffic.<br />

Differentiated services can be configured through CLI <strong>com</strong>mands (see the<br />

“firewall” chapter of the <strong>FortiGate</strong> CLI Reference).<br />

Go to Firewall > Policy and select Create New to add a firewall policy. You can<br />

configure the following firewall policy options:<br />

Intra-VLAN<br />

Policy<br />

Source<br />

Interface/Zone<br />

Source Address<br />

(<strong>FortiGate</strong> model 224B only) This is available only in switch view.<br />

Enable to create a policy governing traffic between switch ports on a<br />

switch VLAN. There must be at least one secure port available. See<br />

“Configuring intra-VLAN firewall policies (<strong>FortiGate</strong>-224B only)” on<br />

page 275.<br />

Select the name of the <strong>FortiGate</strong> interface or zone on which IP packets<br />

are received. Interfaces and zones are configured on the System<br />

Network page. See “Interface” on page 79 for information about<br />

interfaces. See “Zone” on page 98 for information about zones.<br />

If Action is set to IPSEC, the interface is associated with the local<br />

private network.<br />

If Action is set to SSL-VPN, the interface is associated with<br />

connections from remote SSL VPN clients.<br />

Select the name of a previously defined IP address to associate with<br />

the source interface or zone, or select Create New to define a new IP<br />

address or address group.<br />

If you want to associate multiple addresses or address groups to the<br />

interface/zone, select Multiple beside Source Address. In the pop-up<br />

window, move the addresses or address groups from the Available<br />

Addresses box to the Members box, then select OK.<br />

A packet must have the associated IP address in its header to be<br />

subject to the policy. Addresses can be created in advance.<br />

See “Configuring addresses” on page 291.<br />

If Action is set to IPSEC, the address is the private IP address of the<br />

host, server, or network behind the <strong>FortiGate</strong> unit.<br />

If Action is set to SSL-VPN and the policy is for web-only mode clients,<br />

select all.<br />

If Action is set to SSL-VPN and the policy is for tunnel mode clients,<br />

select the name of the address that you reserved for tunnel mode<br />

clients.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

272 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!