12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firewall Policy<br />

Configuring firewall policies<br />

Destination<br />

Interface/Zone<br />

Destination<br />

Address<br />

Schedule<br />

Service<br />

Action<br />

Select the name of the <strong>FortiGate</strong> interface or zone to which IP packets<br />

are forwarded. Interfaces and zones are configured on the System<br />

Network page. See “Interface” on page 79 for information about<br />

interfaces. See “Zone” on page 98 for information about zones.<br />

If Action is set to IPSEC, the interface is associated with the entrance<br />

to the VPN tunnel.<br />

If Action is set to SSL-VPN, the interface is associated with the local<br />

private network.<br />

Select the name of a previously defined IP address to associate with<br />

the destination interface or zone, or select Create New to define a new<br />

IP address.<br />

f you want to associate multiple addresses or address groups to the<br />

interface/zone, select Multiple beside Destination Address. In the popup<br />

window, move the addresses or address groups from the Available<br />

Addresses box to the Members box, then select OK.<br />

A packet must have the associated IP address in its header to be<br />

subject to the policy. Addresses can be created in advance.<br />

See “Configuring addresses” on page 291.<br />

If Action is set to IPSEC, the address is the private IP address to which<br />

packets may be delivered at the remote end of the VPN tunnel.<br />

If Action is set to SSL-VPN, select the name of the IP address that<br />

corresponds to the host, server, or network that remote clients need to<br />

access behind the <strong>FortiGate</strong> unit.<br />

Select a one-time or recurring schedule that controls when the policy is<br />

available to be matched with <strong>com</strong>munication sessions. Schedules can<br />

be created in advance by going to Firewall > Schedule. See “Firewall<br />

Schedule” on page 301.<br />

You can also select Create New to create a Recurring or One-time<br />

schedule during policy configuration. Add the information required for<br />

the recurring or one-time schedule and select OK. The new schedule is<br />

added to the Schedule list.<br />

Select the name of a service or service group that matches the service<br />

or protocol of the packets to be matched with this policy. Select from a<br />

wide range of predefined services. Custom services can be created in<br />

advanced by going to Firewall > Service > Custom. Service groups can<br />

be created in advance by going to Firewall > Service > Group. See<br />

“Configuring custom services” on page 297 and “Configuring service<br />

groups” on page 300.<br />

You can select Create New to create a custom service or a service<br />

group during policy configuration. Add the information required for the<br />

custom service or service group and select OK. The new custom<br />

service or service group is added to the Service list.<br />

By selecting the Multiple button beside Service, you can select multiple<br />

services or service groups.<br />

Select how you want the firewall to respond when a packet matches the<br />

conditions of the policy.<br />

ACCEPT<br />

DENY<br />

IPSEC<br />

SSL-VPN<br />

Accept traffic matched by the policy. You can configure<br />

NAT, protection profiles, log traffic, shape traffic, set<br />

authentication options, or add a <strong>com</strong>ment to the policy.<br />

Reject traffic matched by the policy. The only other<br />

configurable policy options are to log traffic (to log the<br />

connections denied by this policy) or add a <strong>com</strong>ment.<br />

Configure an IPSec firewall encryption policy, which<br />

causes the <strong>FortiGate</strong> unit to process IPSec VPN packets.<br />

See “IPSec firewall policy options” on page 280.<br />

Configure an SSL-VPN firewall encryption policy, which<br />

causes the <strong>FortiGate</strong> unit to accept SSL VPN traffic. This<br />

option is available only after you have added a SSL-VPN<br />

user group. See “SSL-VPN firewall policy options” on<br />

page 281.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 273

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!