12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring firewall policies<br />

Firewall Policy<br />

To configure traffic shaping<br />

1 Go to Firewall > Policy.<br />

2 When you create a new policy or edit a policy, select the Traffic Shaping option.<br />

3 Configure the following three options:<br />

Guaranteed<br />

Bandwidth<br />

Maximum<br />

Bandwidth<br />

Traffic Priority<br />

Use traffic shaping to guarantee the amount of bandwidth available<br />

through the firewall for a policy. Guarantee bandwidth (in Kbytes) to<br />

ensure there is enough bandwidth available for a high-priority service.<br />

Be sure that the sum of all Guaranteed Bandwidth in all firewall policies<br />

is significantly less than the bandwidth capacity of the interface.<br />

Use traffic shaping to limit the amount of bandwidth available through<br />

the firewall for a policy. Limit bandwidth to keep less important services<br />

from using bandwidth needed for more important services.<br />

Select High, Medium, or Low. Select Traffic Priority so the <strong>FortiGate</strong> unit<br />

manages the relative priorities of different types of traffic. For example,<br />

a policy for connecting to a secure web server needed to support<br />

e-<strong>com</strong>merce traffic should be assigned a high traffic priority. Less<br />

important services should be assigned a low priority. The firewall<br />

provides bandwidth to low-priority connections only when bandwidth is<br />

not needed for high-priority connections.<br />

Be sure to enable traffic shaping on all firewall policies. If you do not<br />

apply any traffic shaping rule to a policy, the policy is set to high priority<br />

by default.<br />

Distribute firewall policies over all three priority queues.<br />

Note: If you set both guaranteed bandwidth and maximum bandwidth to 0 (zero),<br />

the policy does not allow any traffic.<br />

IPSec firewall policy options<br />

When Action is set to IPSEC, the following options are available:<br />

Figure 169:IPSEC encryption policy<br />

VPN Tunnel<br />

Allow Inbound<br />

Allow outbound<br />

Inbound NAT<br />

Outbound NAT<br />

Select the VPN tunnel name defined in the phase 1 configuration. The<br />

specified tunnel will be subject to this firewall encryption policy.<br />

Select to enable traffic from a dialup client or <strong>com</strong>puters on the remote<br />

private network to initiate the tunnel.<br />

Select to enable traffic from <strong>com</strong>puters on the local private network to<br />

initiate the tunnel.<br />

Select to translate the source IP addresses of inbound decrypted<br />

packets into the IP address of the <strong>FortiGate</strong> interface to the local<br />

private network.<br />

Select in <strong>com</strong>bination with a natip CLI value to translate the source<br />

addresses of outbound cleartext packets into the IP address that you<br />

specify. Do not select Outbound NAT unless you specify a natip<br />

value through the CLI. When a natip value is specified, the source<br />

addresses of outbound IP packets are replaced before the packets<br />

are sent through the tunnel. For more information, see the “firewall”<br />

chapter of the <strong>FortiGate</strong> CLI Reference.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

280 01-30005-0203-20070830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!