Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
4Activity

Table Of Contents

Introduction
• Before you begin
• How this guide is organized
Before you begin
How this guide is organized
Document conventions
IP addresses
Cautions, Notes and Tips
Typographical conventions
CLI command syntax
Introduction Registering your Fortinet product
Registering your Fortinet product
Fortinet products End User License Agreement
See the Fortinet products End User License Agreement
Customer service and technical support
Training
Fortinet documentation
Tools and Documentation CD
Fortinet Knowledge Base
Comments on Fortinet technical documentation
UTM overview
• UTM components
UTM components
Intrusion Protection System (IPS)
Anomaly protection (DoS policies)
One-armed IDS (sniffer policies)
Email filtering
Data Leak Prevention (DLP)
Application Control (for example, IM and P2P)
SSL content scanning and inspection
Setting up certificates to avoid client warnings
SSL content scanning and inspection settings
Table 3: SSL content scanning and inspection settings
DoS overview
• DoS concepts
DoS concepts
Distributed denial of service attacks
Defending against infection - best practices overview DoS overview
Defending against infection - best practices overview
Intrusion prevention (IPS)
Patch Management
Policy whitelisting
Defending against attack - best practices overview
IPS and DoS policies
Antivirus techniques
Enable antivirus scanning AntiVirus
FortiGuard Antivirus
Enable antivirus scanning
To enable antivirus scanning
Enable the file quarantine
Viewing antivirus database information
Enable file filtering
1 Create a file filter list
Creating a file filter list
To create a file filter list
Creating a file pattern
Creating a file type
To enable file filtering
Enable grayware scanning
AntiVirus example
Protecting your network against malicious email attachments
Email filter
• Email filtering concepts
Email filtering concepts
Email filter techniques
Order of spam filtering
Enable email filtering
Enabling FortiGuard IP address checking
To enable FortiGuard IP address checking
Enabling FortiGuard URL checking
To enable FortiGuard URL checking
Enabling FortiGuard email checksum checking
Enabling FortiGuard spam submission
To enable FortiGuard Spam submission
Enabling IP address black/white list checking
Enabling the IP address black/white list checking
Enabling HELO DNS lookup
To enable HELO DNS lookup
Enabling email address black/white list checking
Enabling return email DNS checking
To enable return email DNS check
Enabling banned word checking
How content is evaluated
Configure the spam action
To configure the spam action
Configure the tag location
To configure the tag location
Configure the tag format
To configure the tag format
Email filter example
Blocking email from a user
Intrusion protection
• IPS concepts
IPS concepts
Anomaly-based defense
Signature-based defense
Enable IPS scanning
Creating an IPS sensor
Creating an IPS filter
Updating predefined IPS signatures
Creating an IPS signature override
Creating a custom IPS signature
Custom signature syntax and keywords
Configure protocol decoders
Enable packet logging
IPS examples
Using IPS to protect your web server
Custom signature to block access to example.com
Custom signature to block the SMTP “vrfy” command
Web filtering Web filtering concepts
Web filtering
• Web filtering concepts
Web filtering concepts
Different ways of controlling access
Order of web filtering
5 web content filter
Web content filter
Creating a web filter content list
To create a web filter content list
Configuring a web content filter list
Enabling the web content filter and setting the content threshold
URL filter
1 Create a URL filter list
Creating a URL filter list
To create a URL Filter list
Configuring a URL filter list
Web filtering example
School district
FortiGuard Web Filtering
• FortiGuard Web Filtering and your FortiGate unit
FortiGuard Web Filtering and your FortiGate unit
Order of Web Filtering
4 FortiGuard Web Filtering
Enable FortiGuard Web Filtering
Configuring FortiGuard Web Filtering settings
To configure FortiGuard Web Filtering settings
Configuring the FortiGuard Web Filtering categories
To configure the FortiGuard Web Filtering categories
FortiGuard Web Filtering Add or change FortiGuard Web Filtering ratings
Configuring the FortiGuard Web Filtering classifications
To configure the FortiGuard Web Filtering classifications
Add or change FortiGuard Web Filtering ratings
Create FortiGuard Web Filtering overrides FortiGuard Web Filtering
Create FortiGuard Web Filtering overrides
Understanding administrative and user overrides
Customize categories and ratings
Creating local categories
Customizing site ratings
FortiGuard Web Filtering example FortiGuard Web Filtering
FortiGuard Web Filtering example
To enable FortiGuard Web Filtering
Data leak prevention
• Data leak prevention concepts
Data leak prevention concepts
DLP sensor
DLP rule
DLP compound rule
Enable data leak prevention
Creating a DLP rule
Understanding default DLP rules
Creating a compound DLP rule
To create a compound DLP rule
Creating a DLP sensor
Adding rules to a DLP sensor
To add rules to a DLP sensor
Understanding default DLP sensors
DLP example
Application control
• Application control concepts
Application control concepts
Enable application control Application control
Enable application control
1 Create an application control list
Creating an application control list
To create an application control list
Adding applications to an application control list
To add applications to an application control list
Application considerations
IM applications
Skype
Application control example
No Instant Messaging
DoS policy
• DoS policy concepts
DoS policy concepts
Enable DoS
Creating and configuring a DoS sensor
Creating a DoS policy
Apply an IPS sensor to a DoS policy
DoS example
Sniffer policy
• Sniffer policy concepts
Sniffer policy concepts
The sniffer policy list
Enable one-arm sniffing
Designating a sniffer interface
Creating a sniffer policy
To create a sniffer policy
Index
0 of .
Results for:
No results containing your search query
P. 1
fortigate-utm

fortigate-utm

Ratings: (0)|Views: 5,903|Likes:
Published by Yasser Arafat

More info:

Published by: Yasser Arafat on Mar 16, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/06/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 28 are not shown in this preview.
You're Reading a Free Preview
Page 32 is not shown in this preview.
You're Reading a Free Preview
Pages 36 to 120 are not shown in this preview.
You're Reading a Free Preview
Pages 124 to 130 are not shown in this preview.

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
scorpius2k3 liked this
srilankanonline liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->