12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firewall Policy<br />

Firewall policy examples<br />

The proposed network is based around a ForitGate 100A unit. The 15 internal<br />

<strong>com</strong>puters are behind the <strong>FortiGate</strong> unit. They now access the email and web<br />

servers in a DMZ, which is also behind the <strong>FortiGate</strong> unit. All home based<br />

employees now access the office network through the <strong>FortiGate</strong> unit via VPN<br />

tunnels.<br />

Scenario two: enterprise sized business<br />

Located in a large city, the library system is anchored by a main downtown<br />

location serving most of the population, with more than a dozen branches spread<br />

throughout the city. Each branch is wired to the Internet but none are linked with<br />

each other by dedicated connections.<br />

The current network topography at the main location consists of three user<br />

groups. The main branch staff and public terminals access the servers in the DMZ<br />

behind the firewall. The catalog access terminals directly access the catalog<br />

server without first going through the firewall.<br />

The topography at the branch office has all three users accessing the servers at<br />

the main branch via non secured internet connections.<br />

Figure 174:The library system’s current network topology<br />

The library must be able to set different access levels for patrons and staff<br />

members.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 285

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!