12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Firewall Protection Profile<br />

What is a protection profile?<br />

Firewall Protection Profile<br />

This section describes how to add protection profiles to NAT/Route mode and<br />

Transparent mode policies.<br />

This section describes:<br />

• What is a protection profile?<br />

• Default protection profiles<br />

• Viewing the protection profile list<br />

• Configuring a protection profile<br />

• Adding a protection profile to a policy<br />

• Protection profile CLI configuration<br />

What is a protection profile?<br />

A protection profile is a group of settings you can adjust to suit a particular<br />

purpose. Since protection profiles apply different protection settings to traffic<br />

controlled by firewall policies, you can tailor the settings to the type of traffic each<br />

policy handles. Use protection profiles to:<br />

• Configure antivirus protection for HTTP, FTP, IMAP, POP3, SMTP, and IM<br />

policies.<br />

• Configure web filtering for HTTP and HTTPS policies.<br />

• Configure web category filtering for HTTP and HTTPS policies.<br />

• Configure spam filtering for IMAP, POP3, and SMTP policies.<br />

• Enable IPS for all services.<br />

• Configure content archiving for HTTP, HTTPS, FTP, IMAP, POP3, SMTP, and<br />

IM policies.<br />

• Configure IM filtering and access control for AIM, ICQ, MSN, Yahoo, and<br />

SIMPLE instant messaging.<br />

• Configure P2P access and bandwidth control for Bit Torrent, eDonkey,<br />

Gnutella, Kazaa, Skype, and WinNY peer to peer clients.<br />

• Configure which protection profile actions will be logged.<br />

• Configure rate limiting for VoIP protocols (SIP and SCCP).<br />

Using protection profiles, you can customize types and levels of protection for<br />

different firewall policies.<br />

For example, while traffic between internal and external addresses might need<br />

strict protection, traffic between trusted internal addresses might need moderate<br />

protection. Configure policies for different traffic services to use the same or<br />

different protection profiles.<br />

If virtual domains are enabled on the <strong>FortiGate</strong> unit, protection profiles are<br />

configured globally and are available to all virtual domains. To access protection<br />

profiles, go to Global Configuration > Firewall > Protection Profile.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 329

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!