Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
3Activity

Table Of Contents

Introduction
•Before you begin
•How this chapter is organized
Before you begin
How this chapter is organized
Cautions, Notes and Tips
Typographical conventions
CLI command syntax conventions
Registering your Fortinet product
Fortinet products End User License Agreement
See the Fortinet products End User License Agreement
Training
Documentation
Fortinet Tools and Documentation CD
Fortinet Knowledge Base
Comments on Fortinet technical documentation
Customer service and technical support
UTM overview
•UTM components
UTM components
Intrusion Protection System (IPS)
Anomaly protection (DoS policies)
One-armed IDS (sniffer policies)
Web filtering
Email filtering
Data Leak Prevention (DLP)
Application Control (for example, IM and P2P)
UTM profiles/lists/sensors
UTM and Virtual domains (VDOMs)
Conserve mode
The AV proxy
Entering and exiting conserve mode
Conserve mode effects
Configuring the av-failopen command
SSL content scanning and inspection
Setting up certificates to avoid client warnings
SSL content scanning and inspection settings
Table 4: SSL content scanning and inspection settings
Viewing and saving logged packets
Configuring packet logging options
Network defense
•Blocking external probes
Monitoring
Blocking external probes
Address sweeps
Port scans
Probes using IP traffic options
Evasion techniques
Defending against DoS attacks
The “three-way handshake”
SYN flood
SYN spoofing
DDoS SYN flood
Configuring the SYN threshold to prevent SYN floods
SYN proxy
Other flood types
Traffic inspection
IPS signatures
Suspicious traffic attributes
DoS policies
DoS policy recommendations
Content inspection and filtering
FortiGuard Web Filtering
AntiVirus
•Antivirus concepts
Antivirus concepts
How antivirus scanning works
Antivirus scanning order
Antivirus databases
Antivirus techniques
FortiGuard Antivirus
Enable antivirus scanning
Viewing antivirus database information
Changing the default antivirus database
Overriding the default antivirus database
Adding the antivirus profile to a firewall policy
Configuring the scan buffer size
Configuring archive scan depth
Configuring a maximum allowed file size
Configuring client comforting
Enable the file quarantine
General configuration steps
Configuring the file quarantine
To configure the file quarantine
Viewing quarantined files
Downloading quarantined files
To download a quarantined file
Enable file filtering
1Create a file filter list
Creating a file filter list
To create a file filter list
Creating a file pattern
Creating a file type
To enable file filtering
Enable grayware scanning
AntiVirus Testing your antivirus configuration
Testing your antivirus configuration
AntiVirus examples
Configuring simple antivirus protection
Protecting your network against malicious email attachments
Email filter
•Email filter concepts
Email filter concepts
Email filter techniques
Order of spam filtering
Enable email filter
Enabling FortiGuard IP address checking
To enable FortiGuard IP address checking
Enabling FortiGuard URL checking
To enable FortiGuard URL checking
Enabling FortiGuard email checksum checking
Enabling email address black/white list checking
Enabling return email DNS checking
Enabling banned word checking
How content is evaluated
Configure the spam action
To configure the spam action
Configure the tag location
To configure the tag location
Configure the tag format
To configure the tag format
Email filter examples
Configuring simple antispam protection
Blocking email from a user
Intrusion protection
•IPS concepts
IPS concepts
Anomaly-based defense
Signature-based defense
Enable IPS scanning
1Create an IPS sensor
Creating an IPS sensor
Creating an IPS filter
Updating predefined IPS signatures
Creating an IPS signature override
To create an IPS signature override
Creating a custom IPS signature
Custom signature syntax and keywords
Custom signature syntax
Custom signature keywords
IPS processing in an HA cluster
Configure IPS options
Configuring the IPS engine algorithm
Configuring the IPS engine-count
Configuring fail-open
Configuring the session count accuracy
Configuring the IPS buffer size
Configuring protocol decoders
Configuring security processing modules
Enable IPS packet logging
IPS examples
Configuring basic IPS protection
Using IPS to protect your web server
Create and test a packet logging IPS sensor
Creating a custom signature to block access to example.com
Creating a custom signature to block the SMTP “vrfy” command
Configuring a Fortinet Security Processing module
View proxy statistics
Web filter Web filter concepts
Web filter
•Web filter concepts
Web filter concepts
Different ways of controlling access
Order of web filtering
3web content filter
Web content filter
Creating a web filter content list
To create a web filter content list
Configuring a web content filter list
Enabling the web content filter and setting the content threshold
URL filter
URL filter actions
1Create a URL filter list
Creating a URL filter list
To create a URL Filter list
Configuring a URL filter list
SafeSearch
Web filter Advanced web filter configuration
Advanced web filter configuration
ActiveX filter
Cookie filter
Java applet filter
Web resume download block
Block Invalid URLs
HTTP POST action
Web filtering example
School district
FortiGuard Web Filter
•FortiGuard Web Filter and your FortiGate unit
FortiGuard Web Filter and your FortiGate unit
Configuring FortiGuard Web Filter usage quotas
Advanced FortiGuard Web Filter configuration FortiGuard Web Filter
Checking quota usage
Advanced FortiGuard Web Filter configuration
Provide Details for Blocked HTTP 4xx and 5xx Errors
Rate Images by URL (blocked images will be replaced with blanks)
Allow Websites When a Rating Error Occurs
FortiGuard Web Filter Add or change FortiGuard Web Filter ratings
Strict Blocking
Rate URLs by Domain and IP Address
Block HTTP Redirects by Rating
Daily log of remaining quota
Add or change FortiGuard Web Filter ratings
Create FortiGuard Web Filter overrides FortiGuard Web Filter
Create FortiGuard Web Filter overrides
Understanding administrative and user overrides
Customize categories and ratings
Creating local categories
Customizing site ratings
FortiGuard Web Filter examples
Configuring simple FortiGuard Web Filter protection
Data leak prevention
•Data leak prevention concepts
Data leak prevention concepts
DLP sensor
DLP rule
DLP compound rule
Enable data leak prevention
Creating a DLP rule
Understanding the default DLP rules
Creating a compound DLP rule
To create a compound DLP rule
Creating a DLP sensor
Adding rules to a DLP sensor
To add rules to a DLP sensor
Understanding default DLP sensors
DLP archiving
DLP examples
Configuring DLP content archiving
Blocking sensitive email messages
Application control
•Application control concepts
Application control concepts
Enable application control Application control
Enable application control
1Create an application control list
Creating an application control list
To create an application control list
Adding applications to an application control list
To add applications to an application control list
Application traffic shaping Application control
Understanding the default application control lists
Application traffic shaping
Enabling application control traffic shaping
Reverse direction traffic shaping
Shaper re-use
Application control monitor Application control
Application control monitor
Enabling application control monitor
Application control Application control packet logging
Application control packet logging
Application considerations
IM applications
Skype
Application control examples
Blocking all instant messaging
Allowing only software updates
DoS policy
•DoS policy concepts
DoS policy concepts
Enable DoS
Creating and configuring a DoS sensor
Creating a DoS policy
Apply an IPS sensor to a DoS policy
DoS example
The sniffer policy list
Enable one-arm sniffing
Designating a sniffer interface
Creating a sniffer policy
To create a sniffer policy
Sniffer example
An IDS sniffer configuration
0 of .
Results for:
No results containing your search query
P. 1
fortigate-utm-40-mr2

fortigate-utm-40-mr2

Ratings: (0)|Views: 285|Likes:
Published by rcxqc2002

More info:

Published by: rcxqc2002 on Aug 03, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/21/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 5 are not shown in this preview.
You're Reading a Free Preview
Pages 9 to 64 are not shown in this preview.
You're Reading a Free Preview
Pages 68 to 125 are not shown in this preview.
You're Reading a Free Preview
Pages 129 to 165 are not shown in this preview.
You're Reading a Free Preview
Pages 169 to 182 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Minh Le Van liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->