12.03.2015 Views

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

FortiGate Administration Guide - FirewallShop.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IM, P2P & VoIP<br />

Overview<br />

IM, P2P & VoIP<br />

The IM, P2P & VoIP menu provides IM user management tools and statistics for<br />

network IM, P2P, and VoIP usage. IM, P2P, and VoIP protocols must be enabled<br />

in the active protection profile for the settings in this section to have any effect.<br />

This section describes:<br />

• Overview<br />

• Configuring IM/P2P protocols<br />

• Statistics<br />

• User<br />

Overview<br />

Instant Messenger (IM), Peer to Peer (P2P), and Voice over Internet Protocol<br />

(VoIP) protocols are gaining in popularity as an essential way to <strong>com</strong>municate<br />

between two or more individuals in real time. Some <strong>com</strong>panies even rely on IM<br />

protocols for critical business applications such as Customer/Technical Support.<br />

The most <strong>com</strong>mon IM protocols in use today include AOL Instant Messenger,<br />

Yahoo Instant Messenger, MSN messenger, and ICQ. Although these are the<br />

most <strong>com</strong>mon currently in use, there are always new protocols being developed<br />

as well as newer versions of older ones.<br />

P2P protocols are most <strong>com</strong>monly used to transfer files from one user to another<br />

and can use large amounts of bandwidth.<br />

VoIP is increasingly being used by businesses to cut down on the cost of long<br />

distance voice <strong>com</strong>munications.<br />

Some organizations need to control or limit the use of IM/P2P and VoIP protocols<br />

in order to more effectively manage bandwidth use.<br />

With FortiOS firmware, you can control and monitor the usage of IM/P2P<br />

applications and VoIP protocols.<br />

FortiOS supports two VoIP protocols: Session Initiation Protocol (SIP) and Skinny<br />

Client Control Protocol (SCCP).<br />

Fortinet Inc. recognizes that IM/P2P applications are be<strong>com</strong>ing part of doing<br />

business but also, if abused, can seriously decrease productivity and network<br />

performance.<br />

<strong>FortiGate</strong> systems allow you to set up user lists that either allow or block the use<br />

of applications, to determine which applications are allowed and how much<br />

bandwidth can be used by the applications.<br />

By <strong>com</strong>bining <strong>com</strong>prehensive protection policies and easy-to-view statistical<br />

reports, you can see which applications are being used and for what purpose,<br />

making it easy to control IM/P2P applications and to maximize productivity.<br />

<strong>FortiGate</strong> Version 3.0 MR5 <strong>Administration</strong> <strong>Guide</strong><br />

01-30005-0203-20070830 459

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!