12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring firewall policies<br />

Firewall Policy<br />

NAT<br />

Enable Network Address Translation for the policy. NAT translates the<br />

source address and port of packets accepted by the policy. When NAT<br />

is selected, Dynamic IP Pool and Fixed Port can be configured.<br />

Dynamic IP Pool<br />

Fixed Port<br />

Select to translate the source address to an<br />

address randomly selected from an IP Pool. An IP<br />

Pool can be a single IP address or an IP address<br />

range. An IP pool list appears if IP Pool addresses<br />

have been added to the destination interface.<br />

Select the name of an IP Pool added to the<br />

destination interface to cause the <strong>FortiGate</strong> unit to<br />

translate the source address to one of the<br />

addresses defined by this IP Pool.<br />

Dynamic IP Pool cannot be selected if the<br />

destination interface, VLAN subinterface, or one of<br />

the interfaces or VLAN subinterfaces in the<br />

destination zone is configured using DHCP or<br />

PPPoE.<br />

You cannot use IP pools when using zones. An IP<br />

pool can only be associated with an interface.<br />

For information about adding IP Pools, see “IP<br />

pools” on page 324.<br />

Select Fixed Port to prevent NAT from translating<br />

the source port.<br />

Some applications do not function correctly if the<br />

source port is changed. In most cases, if Fixed<br />

Port is selected, Dynamic IP pool is also selected.<br />

If Dynamic IP pool is not selected, a policy with<br />

Fixed Port selected can only allow one connection<br />

at a time.<br />

Protection<br />

Profile<br />

Log Allowed<br />

Traffic<br />

Log Violation<br />

Traffic<br />

Authentication<br />

Check FortiClient<br />

is Installed and<br />

Running<br />

Select a protection profile to configure how antivirus, web filtering, web<br />

category filtering, spam filtering, IPS, content archiving, and logging are<br />

applied to a firewall policy. Protection profiles can be created in<br />

advance or during profile configuration. Profiles created at this point<br />

appear in the protection profile list. For information about adding and<br />

configuring Protection profiles, see “Firewall Protection Profile” on<br />

page 329.<br />

For authentication in the advanced settings, the protection profile<br />

option is disabled because the user group chosen for authentication ia<br />

already tied to a protection profile. For more information about adding<br />

authentication to firewall policies, see “Adding authentication to firewall<br />

policies” on page 276.<br />

Select Log Allowed Traffic, for Accept, IPSEC or SSL-VPN policies to<br />

record messages to the traffic log whenever the policy processes a<br />

connection. Enable traffic log for a logging location (syslog,<br />

WebTrends, local disk if available, memory, or FortiAnalyzer) and set<br />

the logging severity level to Notification or lower. For information about<br />

logging, see “Log&Report” on page 469.<br />

Select Log Violation Traffic, for Deny policies, to record messages to<br />

the traffic log whenever the policy processes a connection. Enable<br />

traffic log for a logging location (syslog, WebTrends, local disk if<br />

available, memory, or FortiAnalyzer) and set the logging severity level<br />

to Notification or lower. For information about logging, see<br />

“Log&Report” on page 469.<br />

Add users and a firewall protection profile to a user group before<br />

selecting Authentication. For information about adding and configuring<br />

user groups, see “User groups” on page 386. Authentication is<br />

available if Action is set to Accept or SSLVPN. For more information<br />

about adding authentication to firewall policies, see “Adding<br />

authentication to firewall policies” on page 276.<br />

On the <strong>FortiGate</strong> model 1000A, 3600A, and 5005FA2, firewall policies<br />

can deny access for hosts that do not have FortiClient Host Security<br />

software installed and operating. See “Options to check FortiClient on<br />

hosts” on page 282.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

274 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!