FortiGate-100 Administration Guide
FortiGate-100 Administration Guide
FortiGate-100 Administration Guide
Administration Guide
INTERNAL
EXTERNAL
DMZ
POWER
STATUS
Contents
Table of Contents
Introduction .......................................................................................................... 13
About FortiGate Antivirus Firewalls...................................................................................
Antivirus protection .......................................................................................................
Web content filtering .....................................................................................................
Spam filtering ................................................................................................................
Firewall..........................................................................................................................
VLANs and virtual domains...........................................................................................
Intrusion Prevention System (IPS)................................................................................
VPN...............................................................................................................................
High availability .............................................................................................................
Secure installation, configuration, and management ....................................................
Document conventions .....................................................................................................
FortiGate documentation ..................................................................................................
Fortinet Knowledge Center ...........................................................................................
Comments on Fortinet technical documentation...........................................................
Related documentation .....................................................................................................
FortiManager documentation ........................................................................................
FortiClient documentation .............................................................................................
FortiMail documentation................................................................................................
FortiLog documentation ................................................................................................
Customer service and technical support...........................................................................
13
14
14
15
15
17
17
17
18
19
20
22
22
22
23
23
23
23
24
24
Web-based manager............................................................................................ 25
Button bar features ...........................................................................................................
Contact Customer Support ...........................................................................................
Online Help ...................................................................................................................
Easy Setup Wizard .......................................................................................................
Console Access ............................................................................................................
Logout ...........................................................................................................................
Web-based manager pages..............................................................................................
Web-based manager menu ..........................................................................................
Lists...............................................................................................................................
Icons .............................................................................................................................
Status bar......................................................................................................................
Organization of this manual ..............................................................................................
26
26
27
27
28
28
29
29
30
30
31
32
01-28008-0003-20050204
33
34
37
39
Contents
40
41
43
45
48
50
55
56
61
66
66
67
68
69
69
70
70
71
72
72
72
73
74
76
76
77
77
79
01-28008-0003-20050204
81
81
83
84
85
86
86
87
87
Fortinet Inc.
Contents
System Config...................................................................................................... 89
System time ...................................................................................................................... 89
Options.............................................................................................................................. 90
HA ..................................................................................................................................... 92
HA overview.................................................................................................................. 92
HA configuration ........................................................................................................... 94
Configuring an HA cluster ........................................................................................... 100
Managing an HA cluster.............................................................................................. 104
SNMP.............................................................................................................................. 107
Configuring SNMP ...................................................................................................... 108
SNMP community ....................................................................................................... 109
FortiGate MIBs............................................................................................................ 111
FortiGate traps ............................................................................................................ 112
Fortinet MIB fields ....................................................................................................... 113
Replacement messages ................................................................................................. 116
Replacement messages list ........................................................................................ 116
Changing replacement messages .............................................................................. 117
FortiManager................................................................................................................... 118
121
121
121
123
123
124
125
126
128
130
133
135
136
137
139
01-28008-0003-20050204
142
142
143
144
Contents
144
145
145
145
146
146
148
148
150
01-28008-0003-20050204
151
153
154
155
155
156
157
157
158
159
159
160
161
162
163
163
164
164
165
165
166
166
167
167
168
169
170
170
171
172
172
Fortinet Inc.
Contents
CLI configuration.............................................................................................................
get router info ospf ......................................................................................................
get router info protocols ..............................................................................................
get router info rip.........................................................................................................
config router ospf .......................................................................................................
config router static6.....................................................................................................
173
173
173
174
174
197
Firewall................................................................................................................ 199
Policy ..............................................................................................................................
How policy matching works.........................................................................................
Policy list .....................................................................................................................
Policy options..............................................................................................................
Advanced policy options .............................................................................................
Configuring firewall policies ........................................................................................
Policy CLI configuration ..............................................................................................
Address...........................................................................................................................
Address list .................................................................................................................
Address options ..........................................................................................................
Configuring addresses ................................................................................................
Address group list .......................................................................................................
Address group options ................................................................................................
Configuring address groups........................................................................................
Service ............................................................................................................................
Predefined service list.................................................................................................
Custom service list......................................................................................................
Custom service options...............................................................................................
Configuring custom services.......................................................................................
Service group list ........................................................................................................
Service group options .................................................................................................
Configuring service groups .........................................................................................
Schedule .........................................................................................................................
One-time schedule list ................................................................................................
One-time schedule options .........................................................................................
Configuring one-time schedules .................................................................................
Recurring schedule list................................................................................................
Recurring schedule options ........................................................................................
Configuring recurring schedules .................................................................................
Virtual IP .........................................................................................................................
Virtual IP list ................................................................................................................
Virtual IP options.........................................................................................................
Configuring virtual IPs.................................................................................................
01-28008-0003-20050204
200
200
201
201
204
207
208
209
210
210
211
212
212
213
213
214
217
217
219
220
220
221
221
222
222
223
223
224
224
225
226
226
227
Contents
IP pool.............................................................................................................................
IP pool list ...................................................................................................................
IP pool options ............................................................................................................
Configuring IP pools....................................................................................................
IP Pools for firewall policies that use fixed ports.........................................................
IP pools and dynamic NAT .........................................................................................
Protection profile .............................................................................................................
Protection profile list....................................................................................................
Default protection profiles ...........................................................................................
Protection profile options ............................................................................................
Configuring protection profiles ....................................................................................
Profile CLI configuration..............................................................................................
229
230
230
231
231
231
232
232
233
233
238
239
244
244
244
244
245
245
246
246
247
247
249
249
250
251
251
252
VPN...................................................................................................................... 255
Phase 1...........................................................................................................................
Phase 1 list .................................................................................................................
Phase 1 basic settings ................................................................................................
Phase 1 advanced settings.........................................................................................
Phase 2...........................................................................................................................
Phase 2 list .................................................................................................................
Phase 2 basic settings ................................................................................................
Phase 2 advanced options..........................................................................................
Manual key......................................................................................................................
Manual key list ............................................................................................................
Manual key options .....................................................................................................
01-28008-0003-20050204
256
256
257
259
260
261
261
262
263
264
265
Fortinet Inc.
Contents
01-28008-0003-20050204
Contents
10
01-28008-0003-20050204
Fortinet Inc.
Contents
327
327
328
329
329
330
330
330
331
332
01-28008-0003-20050204
11
Contents
352
352
356
357
360
360
361
361
363
364
364
365
12
01-28008-0003-20050204
Fortinet Inc.
Introduction
FortiGate Antivirus Firewalls support network-based deployment of application-level
services, including antivirus protection and full-scan content filtering. FortiGate
Antivirus Firewalls improve network security, reduce network misuse and abuse, and
help you use communications resources more efficiently without compromising the
performance of your network. FortiGate Antivirus Firewalls are ICSA-certified for
firewall, IPSec, and antivirus services.
This chapter introduces you to FortiGate Antivirus Firewalls and the following topics:
Document conventions
FortiGate documentation
Related documentation
The FortiGate Antivirus Firewall uses Fortinets Accelerated Behavior and Content
Analysis System (ABACAS) technology, which leverages breakthroughs in chip
design, networking, security, and content analysis. The unique ASIC-based
architecture analyzes content and behavior in real-time, enabling key applications to
be deployed right at the network edge, where they are most effective at protecting
your networks. The FortiGate series complements existing solutions, such as hostbased antivirus protection, and enables new applications and services while greatly
lowering costs for equipment, administration, and maintenance.
The FortiGate-100 model is an easy-todeploy and easy-to-administer solution
that delivers exceptional value and
performance for small office, home office,
and branch office applications. The
FortiGate installation wizard guides users through a simple process that enables most
installations to be up and running in minutes.
INTERNAL
EXTERNAL
DMZ
POWER
STATUS
01-28008-0003-20050204
13
Antivirus protection
Introduction
The FortiGate-100 also supports advanced features such as 802.1Q VLAN, virtual
domains, high availability (HA), and the RIP and OSPF routing protocols.
Antivirus protection
FortiGate ICSA-certified antivirus protection scans web (HTTP), file transfer (FTP),
and email (SMTP, POP3, and IMAP) content as it passes through the FortiGate unit.
FortiGate antivirus protection uses pattern matching and heuristics to find viruses. If a
virus is found, antivirus protection removes the file containing the virus from the
content stream and forwards a replacement message to the intended recipient.
For extra protection, you can configure antivirus protection to block specified file types
from passing through the FortiGate unit. You can use the feature to stop files that
might contain new viruses.
FortiGate antivirus protection can also identify and remove known grayware
programs. Grayware programs are usually unsolicited commercial software programs
that get installed on PCs, often without the users consent or knowledge. Grayware
programs are generally considered an annoyance, but these programs can cause
system performance problems or be used for malicious means.
If the FortiGate unit contains a hard disk, infected or blocked files and grayware files
can be quarantined. The FortiGate administrator can download quarantined files so
that they can be virus scanned, cleaned, and forwarded to the intended recipient. You
can also configure the FortiGate unit to automatically delete quarantined files after a
specified time.
The FortiGate unit can send email alerts to system administrators when it detects and
removes a virus from a content stream. The web and email content can be in normal
network traffic or encrypted IPSec VPN traffic.
ICSA Labs has certified that FortiGate Antivirus Firewalls:
detect 100% of the viruses listed in the current In The Wild List (www.wildlist.org),
detect viruses in email that has been encoded using uuencode format,
detect viruses in email that has been encoded using MIME encoding,
14
01-28008-0003-20050204
Fortinet Inc.
Introduction
Spam filtering
To prevent unintentionally blocking legitimate web pages, you can add URLs to an
exempt list that overrides the URL blocking and content blocking lists. The exempt list
also exempts web traffic this address from virus scanning.
Web content filtering also includes a script filter feature that can block unsecure web
content such as Java applets, cookies, and ActiveX.
Spam filtering
FortiGate spam filtering can scan all POP3, SMTP, and IMAP email content for spam.
You can configure spam filtering to filter mail according to IP address, email address,
mime headers, and content. Mail messages can be identified as spam or clear.
FortiShield is an antispam system from Fortinet that includes an IP address black list,
a URL black list, and spam filtering tools. The IP address black list contains IP
addresses of email servers known to be used to generate Spam. The URL black list
contains URLs of websites found in Spam email.
You can also add the names of known third-party DNS-based Blackhole List (DNSBL)
and Open Relay Database List (ORDBL) servers. These services contain lists of
known spam sources.
If an email message is found to be spam, the FortiGate unit adds an email tag to the
subject line of the email. The recipient can use their mail client software to filter
messages based on the email tag. Spam filtering can also be configured to delete
SMTP email messages identified as spam.
Firewall
The FortiGate ICSA-certified firewall protects your computer networks from Internet
threats. ICSA has granted FortiGate firewalls version 4.0 firewall certification,
providing assurance that FortiGate firewalls successfully screen and secure corporate
networks against a range of threats from public or other untrusted networks.
After basic installation of the FortiGate unit, the firewall allows users on the protected
network to access the Internet while blocking Internet access to internal networks.
You can configure the firewall to put controls on access to the Internet from the
protected networks and to allow controlled access to internal networks.
01-28008-0003-20050204
15
Firewall
Introduction
include traffic shaping to set access priorities and guarantee or limit bandwidth for
each policy,
include Network Address Translation (NAT) mode and Route mode policies,
NAT/Route mode
In NAT/Route mode, the FortiGate unit is a Layer 3 device. This means that each of its
interfaces is associated with a different IP subnet and that it appears to other devices
as a router. This is how a firewall is normally deployed.
In NAT/Route mode, you can create NAT mode policies and Route mode policies.
NAT mode policies use network address translation to hide the addresses in a
more secure network from users in a less secure network.
Transparent mode
In Transparent mode, the FortiGate unit does not change the Layer 3 topology. This
means that all of its interfaces are on the same IP subnet and that it appears to other
devices as a bridge. Typically, the FortiGate unit is deployed in Transparent mode to
provide antivirus and content filtering behind an existing firewall solution.
Transparent mode provides the same basic firewall protection as NAT mode. The
FortiGate unit passes or blocks the packets it receives according to firewall policies.
The FortiGate unit can be inserted in the network at any point without having to make
changes to your network or its components. However, some advanced firewall
features are available only in NAT/Route mode.
16
01-28008-0003-20050204
Fortinet Inc.
Introduction
VPN
Using FortiGate virtual private networking (VPN), you can provide a secure
connection between widely separated office networks or securely link telecommuters
or travellers to an office network.
01-28008-0003-20050204
17
High availability
Introduction
PPTP for easy connectivity with the VPN standard supported by the most popular
operating systems.
L2TP for easy connectivity with a more secure VPN standard, also supported by
many popular operating systems.
IPSec NAT traversal so that remote IPSec VPN gateways or clients behind a NAT
can connect to an IPSec VPN tunnel.
VPN hub and spoke using a VPN concentrator to allow VPN traffic to pass from
one tunnel to another through the FortiGate unit.
High availability
Fortinet achieves high availability (HA) using redundant hardware and the FortiGate
Clustering Protocol (FGCP). Each FortiGate unit in an HA cluster enforces the same
overall security policy and shares the same configuration settings. You can add up to
32 FortiGate units to an HA cluster. Each FortiGate unit in an HA cluster must be the
same model and must be running the same FortiOS firmware image.
FortiGate HA supports link redundancy and device redundancy.
FortiGate units can be configured to operate in active-passive (A-P) or active-active
(A-A) HA mode. Active-active and active-passive clusters can run in either NAT/Route
or Transparent mode.
An active-passive (A-P) HA cluster, also referred to as hot standby HA, consists of a
primary FortiGate unit that processes traffic, and one or more subordinate FortiGate
units. The subordinate FortiGate units are connected to the network and to the
primary FortiGate unit but do not process traffic.
18
01-28008-0003-20050204
Fortinet Inc.
Introduction
Active-active (A-A) HA load balances virus scanning among all the FortiGate units in
the cluster. An active-active HA cluster consists of a primary FortiGate unit that
processes traffic and one or more secondary units that also process traffic. The
primary FortiGate unit uses a load balancing algorithm to distribute virus scanning to
all the FortiGate units in the HA cluster.
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running Internet
Explorer, you can configure and manage the FortiGate unit. The web-based manager
supports multiple languages. You can configure the FortiGate unit for HTTP and
HTTPS administration from any FortiGate interface.
You can use the web-based manager to configure most FortiGate settings. You can
also use the web-based manager to monitor the status of the FortiGate unit.
Configuration changes made using the web-based manager are effective immediately
without resetting the firewall or interrupting service. Once you are satisfied with a
configuration, you can download and save it. The saved configuration can be restored
at any time.
01-28008-0003-20050204
19
Introduction
send alert email to system administrators to report virus incidents, intrusions, and
firewall or VPN events or violations.
Logs can be sent to a remote syslog server or a WebTrends NetIQ Security Reporting
Center and Firewall Suite server using the WebTrends enhanced log format. Some
models can also save logs to an optional internal hard drive. If a hard drive is not
installed, you can configure most FortiGate units to log the most recent events and
attacks detected by the IPS to the system memory.
Document conventions
This guide uses the following conventions to describe CLI command syntax.
20
01-28008-0003-20050204
Fortinet Inc.
Introduction
You enter:
execute restore config myfile.bak
<xxx_str> indicates an ASCII string that does not contain new-lines or carriage
returns.
<xxx_integer> indicates an integer string that is a decimal (base 10) number.
<xxx_octet> indicates a hexadecimal string that uses the digits 0-9 and letters
A-F.
<xxx_ipv4> indicates a dotted decimal IPv4 address.
<xxx_v4mask> indicates a dotted decimal IPv4 netmask.
<xxx_ipv4mask> indicates a dotted decimal IPv4 address followed by a dotted
decimal IPv4 netmask.
<xxx_ipv6> indicates a dotted decimal IPv6 address.
<xxx_v6mask> indicates a dotted decimal IPv6 netmask.
<xxx_ipv6mask> indicates a dotted decimal IPv6 address followed by a dotted
decimal IPv6 netmask.
Vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords.
For example:
set opmode {nat | transparent}
You can enter set opmode nat or set opmode transparent.
A space to separate options that can be entered in any combination and must be
separated by spaces.
For example:
set allowaccess {ping https ssh snmp http telnet}
You can enter any of the following:
set allowaccess ping
set allowaccess ping https ssh
set allowaccess https ping ssh
set allowaccess snmp
In most cases to make changes to lists that contain options separated by spaces,
you need to retype the whole list including all the options you want to apply and
excluding all the options you want to remove.
01-28008-0003-20050204
21
Introduction
FortiGate documentation
Information about FortiGate products is available from the following guides:
22
01-28008-0003-20050204
Fortinet Inc.
Introduction
FortiManager documentation
Related documentation
Additional information about Fortinet products is available from the following related
documentation.
FortiManager documentation
FortiClient documentation
FortiMail documentation
01-28008-0003-20050204
23
FortiLog documentation
Introduction
FortiLog documentation
For information about our priority support hotline (live support), see
http://support.fortinet.com.
When requesting technical support, please provide the following information:
24
your name
01-28008-0003-20050204
Fortinet Inc.
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running a web
browser, you can configure and manage the FortiGate unit. The web-based manager
supports multiple languages. You can configure the FortiGate unit for HTTP and
HTTPS administration from any FortiGate interface.
Figure 1: Web-based manager screen
You can use the web-based manager to configure most FortiGate settings. You can
also use the web-based manager to monitor the status of the FortiGate unit.
Configuration changes made using the web-based manager are effective immediately
without resetting the firewall or interrupting service. Once you are satisfied with a
configuration, you can back it up. The saved configuration can be restored at any
time.
For information about connecting to the web-based manager, see Connecting to the
web-based manager in the Installation Guide for your unit.
01-28008-0003-20050204
25
Web-based manager
Console Access
Logout
26
Register your FortiGate unit (Product Registration). Fortinet will email you your
username and password to log in to the customer support center.
01-28008-0003-20050204
Fortinet Inc.
Web-based manager
Online Help
Online Help
The Online Help button opens web-based help for the current web-based manager
page. There are hyperlinks to related topics and procedures related to the controls on
the current web-based manager page.
Figure 3: Online Help window
You can view other parts of the help system as you like. The help system includes a
navigation pane with table of contents, index and a text search function.
01-28008-0003-20050204
27
Console Access
Web-based manager
Console Access
An alternative to the web-based manager user interface is the text-based command
line interface (CLI). There are some options that are configurable only from the CLI.
The Console Access button opens a Java-based terminal application. The
management computer must have Java version 1.3 or higher installed.
For information on how to use the CLI, see the FortiGate CLI Reference Guide.
Figure 4: Console access
Connect
Disconnect
Clear screen
Logout
The Logout button immediately logs you out of the web-based manager. Log out
before you close the browser window. If you simply close the browser or leave the
web-based manager, you remain logged-in until the idle timeout (default 5 minutes)
expires.
28
01-28008-0003-20050204
Fortinet Inc.
Web-based manager
Tabs
Page
Button bar
Menu
Status
bar
Router
Firewall
Configure firewall policies and protection profiles that apply the network
protection features. Also configure virtual IP addresses and IP pools.
User
Configure user accounts for use with firewall policies that require user
authentication. Also configure external authentication servers.
VPN
01-28008-0003-20050204
29
Lists
Web-based manager
IPS
Antivirus
Web Filter
Spam Filter
Lists
Many of the web-based manager pages are lists. There are lists of network interfaces,
firewall policies, administrators, users, and so on.
Figure 6: Example of a web-based manager list
Delete
Edit
The list shows some information about each item and the icons in the rightmost
column enable you to take action on the item. In this example, you can select Delete
to remove the item or select Edit to modify the item.
To add another item to the list, you select Create New. This opens a dialog box in
which you define the new item. The dialog box for creating a new item is similar to the
one for editing an existing item.
Icons
The web-based manager has icons in addition to buttons to enable you to interact with
the system. There are tooltips to assist you in understanding the function of the icon.
Pause the mouse pointer over the icon to view the tooltip. The following table
describes the icons that you will see in the web-based manager.
Icon
30
Name
Description
Change
Password
Clear
Column
Settings
Delete
01-28008-0003-20050204
Fortinet Inc.
Web-based manager
Status bar
Download
or Backup
Edit
Go
Do a search.
Next page
Previous
page
Restore
View
Status bar
The status bar is at the bottom of the web-based manager screen.
Figure 7: Status bar
how long the FortiGate unit has been operating since the last time it was restarted
01-28008-0003-20050204
31
Status bar
Web-based manager
32
System Status
Router
Spam filter
System Network
Firewall
System DHCP
User
FortiGuard categories
System Config
VPN
System Admin
IPS
System Maintenance
Antivirus
Web filter
01-28008-0003-20050204
Fortinet Inc.
System Status
You can connect to the web-based manager and view the current system status of the
FortiGate unit. The status information that is displayed includes the system status, unit
information, system resources, and session log.
This chapter includes:
Status
Session list
Status
View the system status page, also known as the system dashboard, for a snap shot of
the current operating status of the FortiGate unit. All FortiGate administrators with
read access to system configuration can view system status information.
On HA clusters, the Status page shows the status of the primary unit. To view status
information for all members of the cluster, go to System > Config > HA and select
Cluster Members. For more information, see HA configuration on page 94.
FortiGate administrators whose access profiles contain system configuration write
privileges can change or update FortiGate unit information. For information on access
profiles, see Access profiles on page 123.
01-28008-0003-20050204
33
System Status
Automatic Refresh Select to control how often the web-based manager updates the system
status display.
Interval
Go
Refresh
System status
UP Time
The time in days, hours, and minutes since the FortiGate unit was last
started.
System Time
Log Disk
Displays hard disk capacity and free space if the FortiGate unit contains a
hard disk or Not Available if no hard disk is installed. The FortiGate unit uses
the hard disk to store log messages and quarantine files infected with a virus
or blocked by antivirus file blocking.
Notification
Unit Information
Admin users and administrators whose access profiles contain system configuration
read and write privileges can change or update the unit information. For information
on access profiles, see Access profiles on page 123.
34
01-28008-0003-20050204
Fortinet Inc.
System Status
Host Name
Firmware Version
Antivirus Definitions The current installed version of the FortiGate Antivirus Definitions.
Attack Definitions
Serial Number
The serial number of the current FortiGate unit. The serial number is
Operation Mode
specific to the FortiGate unit and does not change with firmware
upgrades.
Src / Dst
Service
The service from which the virus was delivered; HTTP, FTP, IMAP,
POP3, or SMTP.
Virus Detected
Content Summary
The Content Summary shows information about Content Archiving, configured in
firewall protection profiles. The Details pages provide a link to either the FortiLog unit
or to the Log & Report > Log Config > Log Setting page where you can configure
logging to a FortiLog unit.
Reset
HTTP
The number of URLs visited. Select Details to see the list of URLs, the
time they were accessed and the IP address of the host that accessed
them.
The number of email sent and received. Select Details to see the date
and time, the sender, the recipient and the subject of each email.
FTP
The number of URLs visited and the number of files uploaded and
downloaded. Select Details to see the FTP site URL, date, time, user
and lists of files uploaded and downloaded.
Interface Status
All interfaces in the FortiGate unit are listed in the table.
Interface
IP / Netmask
Status
01-28008-0003-20050204
35
System Status
System Resources
CPU Usage
The current CPU status. The web-based manager displays CPU usage
for core processes only. CPU usage for management processes (for
example, for HTTPS connections to the web-based manager) is
excluded.
Memory Usage
The current hard disk (local disk) status. The web-based manager
displays hard disk usage for core processes only. CPU usage for
management processes (for example, for HTTPS connections to the
web-based manager) is excluded.
Active Sessions
Network Utilization
The total network bandwidth being used through all FortiGate interfaces
and the percentage of the maximum network bandwidth that can be
processed by the FortiGate unit.
History
History
The history page displays 6 graphs representing the following system resources and
protection:
CPU Usage History
36
Session History
Network Utilization
History
Virus History
Intrusion History
01-28008-0003-20050204
Fortinet Inc.
System Status
Src / Dst
Service
The service from which the attack was delivered; HTTP, FTP, IMAP,
POP3, or SMTP.
Attack Name
In the Host Name field of the Unit Information section, select Change.
Select OK.
The new host name is displayed in the Host Name field, and in the CLI prompt, and is
added to the SNMP System Name.
To update the firmware version
For information on updating the firmware, see Changing the FortiGate firmware on
page 40.
To update the antivirus definitions manually
Note: For information about configuring the FortiGate unit for automatic antivirus definitions
updates, see Update center on page 128.
Download the latest antivirus definitions update file from Fortinet and copy it to the
computer that you use to connect to the web-based manager.
01-28008-0003-20050204
37
System Status
Start the web-based manager and go to System > Status > Status.
In the Antivirus Definitions field of the Unit Information section, select Update.
In the Update File field, type the path and filename for the antivirus definitions update
file, or select Browse and locate the antivirus definitions update file.
Select OK to copy the antivirus definitions update file to the FortiGate unit.
The FortiGate unit updates the antivirus definitions. This takes about 1 minute.
Go to System > Status to confirm that the Antivirus Definitions Version information
has updated.
To update the attack definitions manually
Note: For information about configuring the FortiGate unit for automatic attack definitions
updates, see Update center on page 128.
Download the latest attack definitions update file from Fortinet and copy it to the
computer that you use to connect to the web-based manager.
Start the web-based manager and go to System > Status > Status.
In the Attack Definitions field of the Unit Information section, select Update.
The Intrusion Detection System Definitions Update dialog box appears.
In the Update File field, type the path and filename for the attack definitions update
file, or select Browse and locate the attack definitions update file.
Select OK to copy the attack definitions update file to the FortiGate unit.
The FortiGate unit updates the attack definitions. This takes about 1 minute.
Go to System > Status > Status to confirm that the Attack Definitions Version
information has updated.
To change to Transparent mode
After you change the FortiGate unit from the NAT/Route mode to Transparent mode,
most of the configuration resets to Transparent mode factory defaults, except for HA
settings (see HA on page 92).
To change to Transparent mode:
38
In the Operation Mode field of the Unit Information section, select Change.
Select OK.
The FortiGate unit changes operation mode.
01-28008-0003-20050204
Fortinet Inc.
System Status
Note: If the web-based manager IP address was on a different subnet in NAT/Route mode, you
may have to change the IP address of your computer to the same subnet as the management
IP address.
In the Operation Mode field of the Unit Information section, select Change.
Select OK.
The FortiGate unit changes operation mode.
To reconnect to the web-based manager, you must connect to the interface configured
by default for management access.
By default in NAT/Route mode, you can connect to the internal interface. The default
internal interface IP address is 192.168.1.99.
Note: If the management IP address was on a different subnet in Transparent mode, you may
have to change the IP address of your computer to the same subnet as the interface configured
for management access.
Session list
The session list displays information about the communications sessions currently
being processed by the FortiGate unit. You can use the session list to view current
sessions.
Figure 10: Sample session list
From IP
From Port
To IP
To Port
Apply Filter
Virtual Domain Select a virtual domain to list the sessions being processed by that virtual
domain. Select All to view sessions being processed by all virtual domains.
01-28008-0003-20050204
39
System Status
Total Number of Total number of sessions currently being conducted through the FortiGate
unit.
Sessions
Refresh icon
Page up icon
Page down
Protocol
The service protocol of the connection, for example, udp, tcp, or icmp.
From IP
From Port
To IP
To Port
Expire
Policy ID
The number of the firewall policy allowing this session or blank if the session
involves only one FortiGate interface (admin session, for example).
Delete icon
If you are logged in as an administrative user with read and write privileges or as the
admin user, you can select Delete to stop an active session.
40
01-28008-0003-20050204
Fortinet Inc.
System Status
Description
Upgrading to a new
firmware version
Reverting to a
previous firmware
version
Installing firmware
Use this procedure to install a new firmware version or revert to a
images from a system previous firmware version. To use this procedure you must connect
to the CLI using the FortiGate console port and a null-modem
reboot using the CLI
cable. This procedure reverts the FortiGate unit to its factory
default configuration.
Testing a new
Use this procedure to test a new firmware image before installing it.
firmware image before To use this procedure you must connect to the CLI using the
FortiGate console port and a null-modem cable. This procedure
installing it
temporarily installs a new firmware image using your current
configuration. You can test the firmware image before installing it
permanently. If the firmware image works correctly you can use
one of the other procedures listed in this table to install it
permanently.
Installing and using a
backup firmware
image
If the FortiGate unit is running BIOS version v3.x, you can install a
backup firmware image. Once the backup firmware image is
installed you can switch to this backup image when required.
Type the path and filename of the firmware image file, or select Browse and locate the
file.
01-28008-0003-20050204
41
System Status
Select OK.
The FortiGate unit uploads the firmware image file, upgrades to the new firmware
version, restarts, and displays the FortiGate login. This process takes a few minutes.
Go to System > Status and check the Firmware Version to confirm that the firmware
upgrade is successfully installed.
Update antivirus and attack definitions. For information about updating antivirus and
attack definitions, see Update center on page 128.
Copy the new firmware image file to the root directory of the TFTP server.
Make sure the FortiGate unit can connect to the TFTP server.
You can use the following command to ping the computer running the TFTP server.
For example, if the IP address of the TFTP server is 192.168.1.168:
execute ping 192.168.1.168
Enter the following command to copy the firmware image from the TFTP server to the
FortiGate unit:
execute restore image <name_str> <tftp_ipv4>
Where <name_str> is the name of the firmware image file and <tftp_ip> is the IP
address of the TFTP server. For example, if the firmware image file name is
FGT_300-v280-build183-FORTINET.out and the IP address of the TFTP server
is 192.168.1.168, enter:
execute restore image FGT_300-v280-build183-FORTINET.out
192.168.1.168
The FortiGate unit responds with the message:
This operation will replace the current firmware version!
Do you want to continue? (y/n)
42
Type y.
01-28008-0003-20050204
Fortinet Inc.
System Status
The FortiGate unit uploads the firmware image file, upgrades to the new firmware
version, and restarts. This process takes a few minutes.
7
Use the procedure To update antivirus and attack definitions on page 130 to update
antivirus and attack definitions, or from the CLI, enter:
execute update_now
Type the path and filename of the firmware image file, or select Browse and locate the
file.
01-28008-0003-20050204
43
System Status
Select OK.
The FortiGate unit uploads the firmware image file, reverts to the old firmware version,
resets the configuration, restarts, and displays the FortiGate login. This process takes
a few minutes.
Go to System > Status and check the Firmware Version to confirm that the firmware
is successfully installed.
10
Back up the FortiGate unit system configuration using the command execute
backup config.
Back up the IPS custom signatures using the command execute backup
ipsuserdefsig
To use the following procedure you must have a TFTP server that the FortiGate unit
can connect to.
To revert to a previous firmware version using the CLI
1
Copy the firmware image file to the root directory of the TFTP server.
44
01-28008-0003-20050204
Fortinet Inc.
System Status
Make sure the FortiGate unit can connect to the TFTP server.
You can use the following command to ping the computer running the TFTP server.
For example, if the TFTP server's IP address is 192.168.1.168:
execute ping 192.168.1.168
Enter the following command to copy the firmware image from the TFTP server to the
FortiGate unit:
execute restore image <name_str> <tftp_ipv4>
Where <name_str> is the name of the firmware image file and <tftp_ip> is the IP
address of the TFTP server. For example, if the firmware image file name is
FGT_300-v280-build158-FORTINET.out and the IP address of the TFTP server
is 192.168.1.168, enter:
execute restore image FGT_300-v280-build158-FORTINET.out
192.168.1.168
The FortiGate unit responds with the message:
This operation will replace the current firmware version!
Do you want to continue? (y/n)
Type y.
The FortiGate unit uploads the firmware image file. After the file uploads, a message
similar to the following is displayed:
Get image from tftp server OK.
Check image OK.
This operation will downgrade the current firmware version!
Do you want to continue? (y/n)
Type y.
The FortiGate unit reverts to the old firmware version, resets the configuration to
factory defaults, and restarts. This process takes a few minutes.
To confirm that the new firmware image has been loaded, enter:
get system status
10
11
01-28008-0003-20050204
45
System Status
access the CLI by connecting to the FortiGate console port using a null-modem
cable,
install a TFTP server that you can connect to from the FortiGate internal interface.
The TFTP server should be on the same subnet as the internal interface.
If you are reverting to a previous FortiOS version (for example, reverting from FortiOS
v2.80 to FortiOS v2.50), you might not be able to restore your previous configuration
from the backup configuration file.
Note: Installing firmware replaces the current antivirus and attack definitions with the definitions
included with the firmware release that you are installing. After you install new firmware, use the
procedure To update antivirus and attack definitions on page 130 to make sure that antivirus
and attack definitions are up to date.
46
Connect to the CLI using the null-modem cable and FortiGate console port.
Copy the new firmware image file to the root directory of the TFTP server.
Make sure that the internal interface is connected to the same network as the TFTP
server.
To confirm that the FortiGate unit can connect to the TFTP server, use the following
command to ping the computer running the TFTP server. For example, if the IP
address of the TFTP server is 192.168.1.168, enter:
execute ping 192.168.1.168
01-28008-0003-20050204
Fortinet Inc.
System Status
Type y.
As the FortiGate units starts, a series of system startup messages is displayed.
When one of the following messages appears:
If you successfully interrupt the startup process, one of the following messages
appears:
Enter G,F,B,Q,or H:
8
Type G to get the new firmware image from the TFTP server.
The following message appears:
Enter TFTP server address [192.168.1.168]:
10
Type an IP address that the FortiGate unit can use to connect to the TFTP server.
The IP address can be any IP address that is valid for the network that the interface is
connected to. Make sure you do not enter the IP address of another device on this
network.
The following message appears:
Enter File Name [image.out]:
01-28008-0003-20050204
47
11
System Status
12
Type D.
The FortiGate unit installs the new firmware image and restarts. The installation might
take a few minutes to complete.
To restore the FortiGate unit configuration, see Backup and restore on page 125.
To restore IPS custom signatures, see Backing up and restoring custom signature
files on page 294.
To restore web content filtering lists, see Backup and restore on page 125.
To restore email filtering lists, see Backup and restore on page 125.
To update the virus and attack definitions to the most recent version, see Updating
antivirus and attack definitions on page 130.
If you are reverting to a previous firmware version (for example, reverting from
FortiOS v2.80 to FortiOS v2.50), you might not be able to restore your previous
configuration from the backup up configuration file.
48
01-28008-0003-20050204
Fortinet Inc.
System Status
access the CLI by connecting to the FortiGate console port using a null-modem
cable,
install a TFTP server that you can connect to from the FortiGate internal interface.
The TFTP server should be on the same subnet as the internal interface.
Connect to the CLI using a null-modem cable and FortiGate console port.
Copy the new firmware image file to the root directory of the TFTP server.
Make sure that the internal interface is connected to the same network as the TFTP
server.
You can use the following command to ping the computer running the TFTP server.
For example, if the TFTP server's IP address is 192.168.1.168:
execute ping 192.168.1.168
As the FortiGate unit reboots, press any key to interrupt the system startup.
As the FortiGate units starts, a series of system startup messages are displayed.
When one of the following messages appears:
If you successfully interrupt the startup process, one of the following messages
appears:
Enter G,F,Q,or H:
01-28008-0003-20050204
49
System Status
Type G to get the new firmware image from the TFTP server.
The following message appears:
Enter TFTP server address [192.168.1.168]:
10
Type an IP address that can be used by the FortiGate unit to connect to the FTP
server.
The IP address must be on the same network as the TFTP server, but make sure you
do not use the IP address of another device on this network.
The following message appears:
Enter File Name [image.out]:
11
12
Type R.
The FortiGate image is installed to system memory and the FortiGate unit starts
running the new firmware image but with its current configuration.
13
You can log into the CLI or the web-based manager using any administrative account.
14
To confirm that the new firmware image has been loaded, from the CLI enter:
get system status
You can test the new firmware image as required.
50
01-28008-0003-20050204
Fortinet Inc.
System Status
access the CLI by connecting to the FortiGate console port using a null-modem
cable,
install a TFTP server that you can connect to from the FortiGate as described in
the procedure Installing firmware images from a system reboot using the CLI on
page 45.
Connect to the CLI using the null-modem cable and FortiGate console port.
Copy the new firmware image file to the root directory of your TFTP server.
To confirm that the FortiGate unit can connect to the TFTP server, use the following
command to ping the computer running the TFTP server. For example, if the IP
address of the TFTP server is 192.168.1.168:
execute ping 192.168.1.168
If you successfully interrupt the startup process, the following message appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,Q,or H:
7
Type G to get the new firmware image from the TFTP server.
The following message appears:
Enter TFTP server address [192.168.1.168]:
01-28008-0003-20050204
51
System Status
Type an IP address that can be used by the FortiGate unit to connect to the FTP
server.
The IP address can be any IP address that is valid for the network that the interface is
connected to. Make sure you do not enter the IP address of another device on this
network.
The following message appears:
Enter File Name [image.out]:
10
11
Type B.
The FortiGate unit saves the backup firmware image and restarts. When the FortiGate
unit restarts it is running the previously installed firmware version.
Connect to the CLI using the null-modem cable and FortiGate console port.
52
01-28008-0003-20050204
Fortinet Inc.
System Status
If you successfully interrupt the startup process, the following message appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,Q,or H:
4
Connect to the CLI using the null-modem cable and FortiGate console port.
If you successfully interrupt the startup process, the following message appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,Q,or H:
4
01-28008-0003-20050204
53
54
System Status
01-28008-0003-20050204
Fortinet Inc.
System Network
System network settings control how the FortiGate unit connects to and interacts with
your network. Basic network settings start with configuring FortiGate interfaces to
connect to your network and configuring the FortiGate DNS settings.
More advanced network settings include adding VLAN subinterfaces and zones to the
FortiGate network configuration.
Interface
Zone
Management
DNS
VLAN overview
Interface
In NAT/Route mode, go to System > Network > Interface to configure FortiGate
interfaces and to add and configure VLAN subinterfaces.
Note: Unless stated otherwise, in this section the term interface can refer to a physical
FortiGate interface or to a FortiGate VLAN subinterface.
01-28008-0003-20050204
55
Interface settings
System Network
Figure 11: Interface list
Create New
Virtual Domain
Select a virtual domain to display the interfaces added to this virtual domain.
Only available if you have added a virtual domain.
Name
IP
Netmask
Access
Status
Interface settings
Interface settings displays the current configuration of a selected FortiGate interface
or VLAN subinterface. Use interface settings to configure a new VLAN subinterface or
to change the configuration of a FortiGate interface or VLAN subinterface.
You cannot change the name, interface or VLAN ID of an existing interface.
56
01-28008-0003-20050204
Fortinet Inc.
System Network
Interface settings
Name
The name of the Interface.
Interface
Select the name of the physical interface to add the VLAN subinterface to. All VLAN
subinterfaces must be associated with a physical interface. Once created, the VLAN is
listed below its physical interface in the Interface list.
VLAN ID
Enter the VLAN ID that matches the VLAN ID of the packets to be received by this
VLAN subinterface. You cannot change the VLAN ID of an existing VLAN
subinterface.
01-28008-0003-20050204
57
Interface settings
System Network
The VLAN ID can be any number between 1 and 4096 and must match the VLAN ID
added by the IEEE 802.1Q-compliant router or switch connected to the VLAN
subinterface.
For more information on VLANs, see VLAN overview on page 70.
Virtual Domain
Select a virtual domain to add the interface or VLAN subinterface to this virtual
domain. Virtual domain is only available if you have added a virtual domain.
For more information on virtual domains, see System Virtual Domain on page 141.
Addressing mode
Select Manual, DHCP, or PPPoE to set the addressing mode for this interface.
Manual
Select Manual and enter an IP address and netmask for the interface. The IP address
of the interface must be on the same subnet as the network the interface is connecting
to.
Note: Where you can enter both an IP address and a netmask in the same field, you can use
the short form of the netmask. For example, 192.168.1.100/255.255.255.0 can also be entered
as 192.168.1.100/24.
Two interfaces cannot have the same IP address and cannot have IP addresses on
the same subnet.
DHCP
If you configure the interface to use DHCP, the FortiGate unit automatically
broadcasts a DHCP request. You can disable Connect to server if you are configuring
the FortiGate unit offline and you do not want the FortiGate unit to send the DHCP
request.
Distance
Enter the administrative distance for the default gateway retrieved from
the DHCP server. The administrative distance, an integer from 1-255,
specifies the relative priority of a route when there are multiple routes
to the same destination. A lower administrative distance indicates a
more preferred route. The default distance for the default gateway is 1.
Retrieve default
gateway from server
Override internal DNS Enable Override internal DNS to use the DNS addresses retrieved
from the DHCP server instead of the DNS server IP addresses on the
DNS page.
You should also enable Obtain DNS server address automatically in
System > Network > DNS. See DNS on page 68.
58
Connect to server
Status
01-28008-0003-20050204
Fortinet Inc.
System Network
Interface settings
initializing
No activity.
failed
PPPoE
If you configure the interface to use PPPoE, the FortiGate unit automatically
broadcasts a PPPoE request. You can disable connect to server if you are configuring
the FortiGate unit offline and you do not want the FortiGate unit to send the PPPoE
request.
FortiGate units support many of the PPPoE RFC features (RFC 2516) including
unnumbered IPs, initial discovery timeout that times and PPPoE Active Discovery
Terminate (PADT).
Figure 13: PPPoE settings
User Name
Password
Unnumbered IP
Specify the IP address for the interface. If your ISP has assigned you a
block of IP addresses, use one of them. Otherwise, this IP address can be
the same as the IP address of another interface or can be any IP address.
Initial Disc
Timeout
Initial discovery timeout. The time to wait before retrying to start a PPPoE
discovery. Set Initial Disc to 0 to disable.
Initial PADT
timeout
Distance
Enter the administrative distance for the default gateway retrieved from the
PPPoE server. The administrative distance, an integer from 1-255,
specifies the relative priority of a route when there are multiple routes to the
same destination. A lower administrative distance indicates a more
preferred route. The default distance for the default gateway is 1.
Retrieve default
gateway from
server
Override internal Enable Override internal DNS to replace the DNS server IP addresses on
the DNS page with the DNS addresses retrieved from the PPPoE server.
DNS
01-28008-0003-20050204
59
Interface settings
System Network
Connect to server Enable Connect to Server so that the interface automatically attempts to
connect to a PPPoE server. Disable this option if you are configuring the
interface offline.
Status
initializing
No activity.
The interface retrieves an IP address, netmask, and other settings from the
PPPoE server.
failed
DDNS
Enable or disable updates to a Dynamic DNS (DDNS) service. When the FortiGate
unit has a static domain name and a dynamic public IP address, select DDNS Enable
to force the unit to update the DDNS server each time the address changes. In turn,
the DDNS service updates Internet DNS servers with the new IP address for the
domain.
Dynamic DNS is available only in NAT/Route mode.
Server
Select a DDNS server to use. The client software for these services is built into the
FortiGate firmware. The FortiGate unit can only connect automatically to a DDNS
server for the supported clients.
Domain
Username The user name to use when connecting to the DDNS server.
Password The password to use when connecting to the DDNS server.
Ping server
Add a ping server to an interface if you want the FortiGate unit to confirm connectivity
with the next hop router on the network connected to the interface. Adding a ping
server is required for routing failover. See To add a ping server to an interface on
page 64.
The FortiGate unit uses dead gateway detection to ping the Ping Server IP address to
make sure that the FortiGate unit can connect to this IP address. To configure dead
gateway detection, see To modify the dead gateway detection settings on page 92.
Administrative access
Configure administrative access to an interface to control how administrators access
the FortiGate unit and the FortiGate interfaces to which administrators can connect.
You can select the following administrative access options:
60
HTTPS
PING
If you want this interface to respond to pings. Use this setting to verify your
installation and for testing.
01-28008-0003-20050204
Fortinet Inc.
System Network
Configuring interfaces
HTTP
SSH
SNMP
TELNET
To allow Telnet connections to the CLI through this interface. Telnet connections
are not secure and can be intercepted by a third party.
MTU
To improve network performance, you can change the maximum transmission unit
(MTU) of the packets that the FortiGate unit transmits from any interface. Ideally, this
MTU should be the same as the smallest MTU of all the networks between the
FortiGate unit and the destination of the packets. If the packets that the FortiGate unit
sends are larger, they are broken up or fragmented, which slows down transmission.
Experiment by lowering the MTU to find an MTU size for best network performance.
To change the MTU, select Override default MTU value (1500) and enter the
maximum packet size. For manual and DHCP addressing mode the MTU size can be
from 576 to 1500 bytes. For PPPoE addressing mode the MTU size can be from 576
to 1492 bytes.
Note: In Transparent mode, if you change the MTU of an interface, you must change the MTU
of all interfaces to match the new MTU.
Log
Select Log to record logs for any traffic to or from the interface. To record logs you
must also enable traffic log for a logging location and set the logging severity level to
Notification or lower. Go to Log & Report > Log Config to configure logging locations
and types. For information about logging see Log & Report on page 351.
Configuring interfaces
Use the following procedures to configure FortiGate interfaces and VLAN
subinterfaces.
01-28008-0003-20050204
61
Configuring interfaces
System Network
Select Bring Down for the interface that you want to stop.
To start up an interface that is administratively down
You can start up physical interfaces and VLAN subinterfaces. Starting a physical
interface does not start the VLAN subinterfaces added to it.
Choose the zone to add the interface or VLAN subinterface to and select Edit.
Select the names of the interfaces or VLAN subinterfaces to add to the zone.
62
Choose the interface or VLAN subinterface to add to a virtual domain and select Edit.
From the Virtual Domain list, select the virtual domain that you want to add the
interface to.
Repeat these steps to add more interfaces or VLAN subinterfaces to virtual domains.
01-28008-0003-20050204
Fortinet Inc.
System Network
Configuring interfaces
Select the Retrieve default gateway and DNS from server check box if you want the
FortiGate unit to obtain a default gateway IP address and DNS server IP addresses
from the DHCP server.
Select the Connect to Server check box if you want the FortiGate unit to connect to
the DHCP server.
Select Apply.
The FortiGate unit attempts to contact the DHCP server from the interface to set the
IP address, netmask, and optionally the default gateway IP address, and DNS server
IP addresses.
Select OK.
To configure an interface for PPPoE
Use this procedure to configure any FortiGate interface to use PPPoE. See PPPoE
on page 59 for information on PPPoE settings.
Set the Initial Disc Timeout and Initial PADT Timeout if supported by your ISP.
Select the Retrieve default gateway from server check box if you want the FortiGate
unit to obtain a default gateway IP address from the PPPoE server.
Select the Override Internal DNS check box if you want the FortiGate unit to obtain a
DNS server IP address from the PPPoE server.
01-28008-0003-20050204
63
Configuring interfaces
System Network
Select the Connect to Server check box if you want the FortiGate unit to connect to
the PPPoE server.
10
Select Apply.
The FortiGate unit attempts to contact the PPPoE server from the interface to set the
IP address, netmask, and optionally default gateway IP address and DNS server IP
addresses.
11
12
Select OK.
To add a secondary IP address
You can use the CLI to add a secondary IP address to any FortiGate interface. The
secondary IP address cannot be on the same subnet as the primary interface, any
other interface or any other secondary IP address.
From the FortiGate CLI, enter the following commands:
config system interface
edit <intf_str>
config secondaryip
edit 0
set ip <second_ip> <netmask_ip>
Optionally, you can also configure management access and add a ping server to the
secondary IP address:
set allowaccess ping https ssh snmp http telnet
set gwdetect enable
Save the changes:
end
To configure support for dynamic DNS services
From the Server list, select one of the supported dynamic DNS services.
In the Domain field, type the fully qualified domain name of the FortiGate unit.
In the Username field, type the user name that the FortiGate unit must send when it
connects to the dynamic DNS server.
Select OK.
To add a ping server to an interface
64
01-28008-0003-20050204
Fortinet Inc.
System Network
Configuring interfaces
Set Ping Server to the IP address of the next hop router on the network connected to
the interface.
Enable secure administrative access to this interface using only HTTPS or SSH,
Do not change the system idle timeout from the default value of 5 minutes (see To
set the system idle timeout on page 91).
Select the Log check box to record log messages whenever a firewall policy accepts a
connection to this interface.
01-28008-0003-20050204
65
Zone settings
System Network
Zone
You can use zones to group related interfaces and VLAN subinterfaces. Grouping
interfaces and VLAN subinterfaces into zones simplifies policy creation. If you group
interfaces and VLAN subinterfaces into a zone, you can configure policies for
connections to and from this zone, rather than to and from each interface and VLAN
subinterface.
You can add zones, rename and edit zones, and delete zones from the zone list.
When you add a zone, you select the names of the interfaces and VLAN subinterfaces
to add to the zone.
Zones are added to virtual domains. If you have added multiple virtual domains to
your FortiGate configuration, make sure you are configuring the correct virtual domain
before adding or editing zones.
Figure 14: Zone list
Create New
Name
Block intra-zone
traffic
Displays Yes if traffic between interfaces in the same zone is blocked and
No if traffic between interfaces in the same zone is not blocked.
Zone settings
Figure 15: Zone options
Name
Block intra-zone
traffic
Interface members Enable check boxes to select the interfaces that are part of this zone.
66
01-28008-0003-20050204
Fortinet Inc.
System Network
Zone settings
To add a zone
1
If you have added a virtual domain, go to System > Virtual Domain > Current Virtual
Domain and select the virtual domain to which you want to add the zone.
In the New Zone dialog box, type a name for the zone.
Select the Block intra-zone traffic check box if you want to block traffic between
interfaces or VLAN subinterfaces in the same zone.
Select the names of the interfaces or VLAN subinterfaces to add to the zone.
Select OK.
To delete a zone
You can only delete zones that have the Delete icon beside them in the zone list.
If you have added a virtual domain, go to System > Virtual Domain > Current
Virtual Domain and select the virtual domain from which to delete the zone.
If you have added a virtual domain, go to System > Virtual Domain > Current
Virtual Domain and select the virtual domain in which to edit the zone.
Select the names of the interfaces or VLAN subinterfaces to add to the zone.
Clear the check box for the names of the interfaces or VLAN subinterfaces to remove
from the zone.
Select OK.
Management
Configure the management interface in Transparent mode to set the management IP
address of the FortiGate unit. Administrators connect to this IP address to administer
the FortiGate unit. The FortiGate also uses this IP address to connect to the FDN for
virus and attack updates (see Update center on page 128).
You can also configure interfaces to control how administrators connect to the
FortiGate unit for administration. See To control administrative access to an interface
on page 65.
01-28008-0003-20050204
67
Zone settings
System Network
Enable secure administrative access to this interface using only HTTPS or SSH,
Do not change the system idle timeout from the default value of 5 minutes (see To
set the system idle timeout on page 91).
Management
IP/Netmask
Default
Gateway
address for the network that you want to manage the FortiGate unit
from.
Management Select the virtual domain from which you want to perform system
Virtual Domain management.
Select Apply.
The FortiGate unit displays the following message:
Management IP address was changed. Click here to redirect.
DNS
Several FortiGate functions, including Alert E-mail and URL blocking, use DNS. You
can add the IP addresses of the DNS servers to which your FortiGate unit can
connect. DNS server IP addresses are usually supplied by your ISP.
68
01-28008-0003-20050204
Fortinet Inc.
System Network
You can configure primary and secondary DNS server addresses, or you can
configure the FortiGate unit to obtain DNS server addresses automatically. To obtain
addresses automatically, at least one interface must use the DHCP or PPPoE
addressing mode. See DHCP on page 58. See PPPoE on page 59.
If you enable DNS Forwarding on an interface, hosts on the attached network can use
the interface IP address as their DNS server. DNS requests sent to the interface are
forwarded to the DNS server addresses you configured or that the FortiGate unit
obtained automatically.
Figure 17: DNS
01-28008-0003-20050204
69
System Network
Route number.
IP
Mask
Gateway
The IP address of the next hop router to which this route directs traffic.
Distance
Move To
Destination IP Enter the destination IP address and netmask for this route.
/Mask
Gateway
Enter the IP address of the next hop router to which this route directs traffic
Distance
VLAN overview
A VLAN is group of PCs, servers, and other network devices that communicate as if
they were on the same LAN segment, even though they may not be. For example, the
workstations and servers for an accounting department could be scattered throughout
an office, connected to numerous network segments, but they can still belong to the
same VLAN.
70
01-28008-0003-20050204
Fortinet Inc.
System Network
Internet
Untagged
packets
Esc
Enter
Firewall or
Router
VLAN trunk
VLAN 1
VLAN 2
POWER
VLAN 1
VLAN 1 network
VLAN 2
VLAN 2 network
01-28008-0003-20050204
71
System Network
Using VLANs, a single FortiGate unit can provide security services and control
connections between multiple security domains. Traffic from each security domain is
given a different VLAN ID. The FortiGate unit can recognize VLAN IDs and apply
security policies to secure network and IPSec VPN traffic between security domains.
The FortiGate unit can also apply authentication, protection profiles, and other firewall
policy features for network and VPN traffic that is allowed to pass between security
domains.
72
01-28008-0003-20050204
Fortinet Inc.
System Network
VLAN switch
Esc
POWER
Fa0/3
Fa0/9
Enter
Internal
192.168.110.126
Fa0/24
External
172.16.21.2
802.1Q Trunk
VLAN 100
VLAN 200
Internet
10.1.1.2
10.1.2.2
You add VLAN subinterfaces to the physical interface that receives VLAN-tagged
packets.
To add a VLAN subinterface in NAT/Route mode
1
Select the physical interface that receives the VLAN packets intended for this VLAN
subinterface.
Enter the VLAN ID that matches the VLAN ID of the packets to be received by this
VLAN subinterface.
01-28008-0003-20050204
73
System Network
Select the name of a zone if you want this VLAN subinterface to belong to a zone.
You can only select a zone that has been added to the virtual domain selected in the
previous step. See Zone on page 66 for information about zones.
Configure the VLAN subinterface settings as you would for any FortiGate interface.
See Interface settings on page 56.
Select Create New to add firewall addresses that match the source and destination IP
addresses of VLAN packets.
See Address on page 209.
74
01-28008-0003-20050204
Fortinet Inc.
System Network
When the FortiGate unit receives a VLAN tagged packet at an interface, the packet is
directed to the VLAN subinterface with matching VLAN ID. The VLAN subinterface
removes the VLAN tag and assigns a destination interface to the packet based on its
destination MAC address. The firewall policies for this source and destination VLAN
subinterface pair are applied to the packet. If the packet is accepted by the firewall,
the FortiGate unit forwards the packet to the destination VLAN subinterface. The
destination VLAN ID is added to the packet by the FortiGate unit and the packet is
sent to the VLAN trunk.
Figure 22: FortiGate unit with two virtual domains in Transparent mode
VLAN Switch or router
FortiGate unit
VLAN1
VLAN2
Internal
VLAN1
VLAN2
VLAN3
VLAN trunk
VLAN1
External
VLAN1
VLAN2
VLAN3 VLAN Switch
VLAN trunk or router
Internet
VLAN3
Figure 23 shows a FortiGate unit operating in Transparent mode and configured with
three VLAN subinterfaces. In this configuration the FortiGate unit could be added to
this network to provide virus scanning, web content filtering, and other services to
each VLAN.
01-28008-0003-20050204
75
System Network
Figure 23: FortiGate unit in Transparent mode
VLAN 1
VLAN ID = 100
VLAN 2
VLAN ID = 200
VLAN
switch
VLAN 3
VLAN ID = 300
POWER
VLAN
Trunk
FortiGate unit
operating in
Transparent mode
VLAN 1
VLAN 2
VLAN 3
Internal
Esc
Enter
External
VLAN 1
VLAN VLAN 2
Trunk VLAN 3
VLAN
switch
POWER
Untagged
packets
Router
Internet
76
01-28008-0003-20050204
Fortinet Inc.
System Network
Create New
Virtual Domain Select a virtual domain to display the VLAN interfaces added to this virtual
domain.
Name
Access
Status
Delete icon
01-28008-0003-20050204
77
System Network
Select the physical interface that receives the VLAN packets intended for this VLAN
subinterface.
Enter the VLAN ID that matches the VLAN ID of the packets to be received by this
VLAN subinterface.
Enable or disable using a Dynamic DNS service (DDNS). If the FortiGate unit uses a
dynamic IP address, you can arrange with a DDNS service provider to use a domain
name to provide redirection of traffic to your network whenever the IP address
changes.
Configure the administrative access, MTU, and log settings as you would for any
FortiGate interface.
See Interface settings on page 56 for more descriptions of these settings.
10
78
Select Create New to add firewall addresses that match the source and destination IP
addresses of VLAN packets.
See Address on page 209.
01-28008-0003-20050204
Fortinet Inc.
System Network
CLI Command
IPv6 tunneling
01-28008-0003-20050204
79
80
System Network
01-28008-0003-20050204
Fortinet Inc.
System DHCP
You can configure DHCP server or DHCP relay agent functionality on any FortiGate
interface or VLAN subinterface.
A FortiGate interface can act as either a DHCP server or as a DHCP relay agent. An
interface cannot provide both functions at the same time.
Note: To configure DHCP server or DHCP relay functionality on an interface, the FortiGate unit
must be in NAT/Route mode and the interface must have a static IP address.
Service
Server
Exclude range
IP/MAC binding
Dynamic IP
Service
Go to System > DHCP > Service to configure the DHCP service provided by each
FortiGate interface. You can configure each interface to be a DHCP relay or a DHCP
server or you can turn off DHCP services.
Figure 26: DHCP service list
Interface
Service
The DHCP service provided by the interface (none, DHCP Relay, or DHCP
Server).
01-28008-0003-20050204
81
System DHCP
Figure 27: View or edit DHCP service settings for an interface
Interface
None
DHCP Relay Agent Select to configure the interface to be a DHCP relay agent.
Type
IPSEC
Configure the interface to be a DHCP relay agent only for remote VPN
clients with an IPSec VPN connection to this interface that uses DHCP
over IPSec.
DHCP Server IP
If you select DHCP Relay Agent, enter the IP address of the DHCP server
used by the computers on the network connected to the interface.
DHCP Server
Select DHCP Server if you want the FortiGate unit to be the DHCP server.
See To configure an interface to be a DHCP server on page 82.
Select Edit for the interface that you want to be a DHCP relay agent.
Select OK.
To configure an interface to be a DHCP server
You can configure a DHCP server for any FortiGate interface. As a DHCP server, the
interface dynamically assigns IP addresses to hosts on the network connected to the
interface. You can also configure a DHCP server for more than one FortiGate
interface.
82
01-28008-0003-20050204
Fortinet Inc.
System DHCP
Select Edit beside the interface to which you want to add a DHCP server.
Select OK.
Server
You can configure one or more DHCP servers for any FortiGate interface. As a DHCP
server, the interface dynamically assigns IP addresses to hosts on a network
connected to the interface.
You can add more than one DHCP server to a single interface to be able to provide
DHCP services to multiple networks. For more information, see To configure multiple
DHCP servers for an interface on page 85.
Figure 28: DHCP Server list
Create New
Name
Interface
Default Gateway
Delete
Edit/View icon
01-28008-0003-20050204
83
System DHCP
Name
Interface
Domain
Enter the domain that the DHCP server assigns to DHCP clients.
Default Gateway
Enter the IP address of the default gateway that the DHCP server
assigns to DHCP clients.
IP Range
Enter the starting IP and ending IP for the range of IP addresses that this
DHCP server assigns to DHCP clients.
Network Mask
Enter the netmask that the DHCP server assigns to DHCP clients.
Lease Time
Select Unlimited for an unlimited lease time or enter the interval in days,
hours, and minutes after which a DHCP client must ask the DHCP server
for new settings. The lease time can range from 5 minutes to 100 days.
DNS Server
WINS Server
Add the IP addresses of one or two WINS servers that the DHCP server
assigns to DHCP clients.
Option
Up to three custom DHCP options that can be sent by the DHCP server.
Code is the DHCP option code in the range 1 to 255. Option is an even
number of hexadecimal characters and is not required for some option
codes. For detailed information about DHCP options, see RFC 2132,
DHCP Options and BOOTP Vendor Extensions.
84
01-28008-0003-20050204
Fortinet Inc.
System DHCP
Add multiple DHCP servers to the interface, one for each subnet.
When a computer on one of the connected subnets sends a DHCP request it is
relayed to the FortiGate interface by the router, using DHCP relay. The FortiGate unit
selects the DHCP server configuration with an IP range that matches the subnet
address from which the DHCP request was received and uses this DHCP server to
assign an IP configuration to the computer that made the DHCP request. The DHCP
configuration packets are sent back to the router and the router relays them to the
DHCP client.
Exclude range
Add up to 16 exclude ranges of IP addresses that FortiGate DHCP servers cannot
assign to DHCP clients. Exclude ranges apply to all FortiGate DHCP servers.
Figure 30: Exclude range list
Create New
Starting IP
Ending IP
Delete
Edit/View icon
01-28008-0003-20050204
85
System DHCP
Starting IP
Ending IP
IP/MAC binding
If you have added DHCP servers, you can use DHCP IP/MAC binding to reserve an
IP address for a particular device on the network according to the MAC address of the
device. When you add the MAC address and an IP address to the IP/MAC binding list,
the DHCP server always assigns this IP address to the MAC address. IP/MAC binding
pairs apply to all FortiGate DHCP servers.
Figure 32: IP/MAC binding list
Create New
Name
IP Address
The IP address for the IP and MAC address pair. The IP address must be
within the configured IP range.
86
01-28008-0003-20050204
Fortinet Inc.
System DHCP
Name
IP Address
Enter the IP address for the IP and MAC address pair. The IP address must
be within the configured IP range.
MAC Address
Dynamic IP
You can view the list of IP addresses that the DHCP server has assigned, their
corresponding MAC addresses, and the expiry time and date for these addresses.
Interface
IP
MAC
Expire
The expiry time and date for the dynamic IP addresses and their corresponding
MAC addresses.
Select the interface for which you want to view the list.
01-28008-0003-20050204
87
88
System DHCP
01-28008-0003-20050204
Fortinet Inc.
System Config
Use the System Config page to make any of the following changes to the FortiGate
system configuration:
System time
Options
HA
SNMP
Replacement messages
FortiManager
System time
Go to System > Config > Time to set the FortiGate system time.
For effective scheduling and logging, the FortiGate system time must be accurate.
You can either manually set the FortiGate system time or you can configure the
FortiGate unit to automatically keep its system time correct by synchronizing with a
Network Time Protocol (NTP) server.
Figure 34: System time
System Time
Refresh
Select Refresh to update the display of the current FortiGate system date
and time.
Time Zone
01-28008-0003-20050204
89
System Config
Automatically
adjust clock for
daylight saving
changes
Select the Automatically adjust clock for daylight saving changes check
box if you want the FortiGate system clock to be adjusted automatically
when your time zone changes to daylight saving time and back to
standard time.
Set Time
Select Set Time to set the FortiGate system date and time to the correct
date and time.
Synchronize with
NTP Server
Server
Enter the IP address or domain name of the NTP server that the
FortiGate unit can use to set its time and date.
Syn Interval
Specify how often the FortiGate unit should synchronize its time with the
NTP server. A typical Syn Interval would be 1440 minutes for the
FortiGate unit to synchronize its time once a day.
Select Refresh to display the current FortiGate system date and time.
Optionally, select Automatically adjust clock for daylight saving changes check box.
Select Set Time and set the FortiGate system date and time.
Set the hour, minute, second, month, day, and year as required.
Select Apply.
To use NTP to set the FortiGate date and time
Select Synchronize with NTP Server to configure the FortiGate unit to use NTP to
automatically set the system time and date.
Enter the IP address or domain name of the NTP server that the FortiGate unit can
use to set its time and date.
Specify how often the FortiGate unit should synchronize its time with the NTP server.
Select Apply.
Options
Go to System > Config > Options to set the following options:
90
01-28008-0003-20050204
Fortinet Inc.
System Config
Idle Timeout
Set the idle time out to control the amount of inactive time before the
administrator must log in again. The maximum admintimeout is 480
minutes (8 hours). To improve security keep the idle timeout at the
default value of 5 minutes.
Auth Timeout
Language
Detection Interval
Fail-over Detection Set the ping server dead gateway detection failover number. Enter the
number of times that ping fails before the FortiGate unit assumes that the
gateway is no longer functioning.
Select Apply.
To set the Auth timeout
Select Apply.
To select a language for the web-based manager
From the Languages list, select a language for the web-based manager to use.
Select Apply.
01-28008-0003-20050204
91
HA overview
System Config
Note: You should select the language that the management computer operating system uses.
For Detection Interval, type a number in seconds to specify how often the FortiGate
unit tests the connection to the ping target.
For Fail-over Detection, type a number of times that the connection test fails before
the FortiGate unit assumes that the gateway is no longer functioning.
Select Apply.
HA
Go to System > Config > HA to configure the FortiGate unit for High Availability (HA)
mode operation.
HA overview
HA configuration
Configuring an HA cluster
Managing an HA cluster
HA overview
FortiGate HA consists of two or more FortiGate units operating as an HA cluster. To
the network, the HA cluster appears to function as a single FortiGate unit, processing
network traffic and providing normal security services such as firewalling, VPN, IPS,
virus scanning, web filtering, and spam filtering services.
Inside the cluster the individual FortiGate units are called cluster units. These cluster
units share state and configuration information. If one cluster unit fails, the other units
in the cluster automatically replace that unit, taking over the work that the failed unit
was doing. The cluster continues to process network traffic and provide normal
FortiGate services with virtually no interruption.
Every cluster contains one primary cluster unit (also called primary units) and one or
more subordinate cluster units (also called subordinate units). The primary unit
controls how the cluster operates. The roles that the primary and subordinate units
play in the cluster depend on the mode in which the cluster operates. See HA modes
on page 93.
The ability of an HA cluster to continue providing firewall services after a failure, is
called failover. FortiGate HA failover means that your network does not have to rely on
one FortiGate unit to continue functioning. You can install additional units and form an
HA cluster. Other units in the cluster will take over if one of the units fails.
92
01-28008-0003-20050204
Fortinet Inc.
System Config
HA overview
If one of the links to a FortiGate unit in an HA cluster fails, all functions, all
established firewall connections, and all IPSec VPN sessionsa are maintained
by the other FortiGate units in the HA cluster. For information about link
failover, see Monitor priorities on page 99.
Device failover If one of the FortiGate units in an HA cluster fails, all functions, all established
firewall connections, and all IPSec VPN sessions are maintained by the other
FortiGate units in the HA cluster.
HA heartbeat
failover
a.HA does not provide session failover for PPPoE, DHCP, PPTP, and L2TP services.
HA modes
FortiGate units can be configured to operate in active-passive (A-P) or active-active
(A-A) HA mode. Active-active and active-passive clusters can run in either NAT/Route
or Transparent mode.
An active-passive (A-P) HA cluster, also referred to as failover HA, consists of a
primary unit that processes traffic, and one or more subordinate units. The
subordinate units are connected to the network and to the primary unit but do not
process traffic.
Active-active (A-A) HA load balances network traffic to all of the cluster units. An
active-active HA cluster consists of a primary unit that processes traffic and one or
more subordinate units that also process traffic. The primary unit uses a load
balancing algorithm to distribute processing to all of the cluster units in the HA cluster.
01-28008-0003-20050204
93
HA configuration
System Config
HA configuration
Go to System > Config > HA and use the options described below to configure HA.
94
Standalone Mode
High Availability
Cluster Members
Mode
Group ID
Unit Priority
Override Master
Password
Schedule
Monitor priorities
01-28008-0003-20050204
Fortinet Inc.
System Config
HA configuration
Figure 36: HA configuration
Standalone Mode
Standalone mode is the default operation mode. If Standalone mode is selected the
FortiGate unit is not operating in HA mode.
Select Standalone Mode if you want to stop a cluster unit from operating in HA mode.
High Availability
Select High Availability to operate the FortiGate unit in HA mode. After selecting High
Availability, complete the remainder of the HA configuration.
Cluster Members
When the cluster is operating, you can select Cluster Members to view the status of all
FortiGate units in the cluster. Status information includes the cluster ID, status, up
time, weight, and monitor information. For more information, see To view the status of
each cluster member on page 105.
Mode
All members of the HA cluster must be set to the same HA mode.
Active-Active
Load balancing and failover HA. Each cluster unit actively processes
connections and monitors the status of the other cluster units. The primary unit
controls load balancing among all of the cluster units.
Active-Passive Failover HA. The primary unit processes all connections. All other cluster units
passively monitor the cluster status and remain synchronized with the primary
unit.
01-28008-0003-20050204
95
HA configuration
System Config
Group ID
The group ID range is from 0 to 63. All cluster units must have the same group ID.
When the FortiGate units are switched to HA mode, all of the interfaces of all of the
cluster units acquire the same virtual MAC address. This virtual MAC address is set
according to the group ID. Table 3 lists the virtual MAC address set for each group ID.
Table 3: HA group ID and MAC address
Group ID
MAC Address
00-09-0f-06-ff-00
00-09-0f-06-ff-01
00-09-0f-06-ff-02
00-09-0f-06-ff-03
...
63
00-09-0f-06-ff-3f
If you have more than one HA cluster on the same network, each cluster should have
a different group ID. If two clusters on the same network have the same group ID, the
duplicate MAC addresses can cause addressing conflicts on the network.
Unit Priority
Optionally set the unit priority of the cluster unit. Each cluster unit can have a different
unit priority. The unit priority is not synchronized among cluster members. Each
cluster unit can have a different unit priority. During HA negotiation, the unit with the
highest unit priority becomes the primary unit. The unit priority range is 0 to 255. The
default unit priority is 128.
You can use the unit priority to control the order in which cluster units become the
primary unit when a cluster unit fails. For example, if you have three FortiGate units in
a cluster you can set the unit priorities as shown in Table 4. Cluster unit A will always
be the primary unit because it has the highest priority. If cluster unit A fails, cluster
unit B becomes the primary unit because cluster unit B has a higher unit priority than
cluster unit C.
Table 4: Example unit priorities for a cluster of three cluster units
Cluster unit
Unit priority
200
100
50
In a functioning cluster, if you change the unit priority of the current primary unit to a
lower priority, when the cluster renegotiates a different cluster unit becomes the
primary unit.
96
01-28008-0003-20050204
Fortinet Inc.
System Config
HA configuration
Override Master
Configure a cluster unit to always override the current primary unit and become the
primary unit. Enable override master for the cluster unit that you have given the
highest unit priority. Enabling override master means that this cluster unit always
becomes the primary unit.
In a typical FortiGate cluster configuration, the primary unit is selected automatically.
In some situations, you might want to control which unit becomes the primary unit.
You can configure a FortiGate unit as the permanent primary unit by setting a high
unit priority and by selecting override master. With this configuration, the same cluster
unit always becomes the primary unit.
If override master is enabled and the primary unit fails, another cluster unit becomes
the primary unit. When the cluster unit with override master enabled rejoins the cluster
it overrides the current primary unit and becomes the new primary unit. When this
override occurs, all communication sessions through the cluster are lost and must be
re-established.
Override master is not synchronized to all cluster units.
In a functioning cluster, if you select override master for a cluster unit the cluster renegotiates and may select a new primary cluster unit.
Password
Enter a password for the HA cluster. The password must be the same for all cluster
units. The maximum password length is 15 characters.
If you have more than one FortiGate HA cluster on the same network, each cluster
must have a different password.
Schedule
If you are configuring an active-active cluster, select a load balancing schedule.
None
No load balancing. Select None when the cluster interfaces are connected
to load balancing switches.
Hub
LeastConnection
Least connection load balancing. If the cluster units are connected using
switches, select Least Connection to distribute network traffic to the cluster
unit currently processing the fewest connections.
Round-Robin
Round robin load balancing. If the cluster units are connected using
switches, select Round-Robin to distribute network traffic to the next
available cluster unit.
Weighted
Round-Robin
Weighted round robin load balancing. Similar to round robin, but weighted
values are assigned to each of the units in a cluster based on their capacity
and on how many connections they are currently processing. For example,
the primary unit should have a lower weighted value because it handles
scheduling and forwards traffic. Weighted round robin distributes traffic
more evenly because units that are not processing traffic will be more likely
to receive new connections than units that are very busy. To configure
weighted round robin weights, see To configure weighted-round-robin
weights on page 103.
01-28008-0003-20050204
97
HA configuration
System Config
Random
Random load balancing. If the cluster units are connected using switches,
select Random to randomly distribute traffic to cluster units.
IP
IP Port
Load balancing according to IP address and port. If the cluster units are
connected using switches, select IP Port to distribute traffic to cluster units
based on the source IP, source port, destination IP, and destination port of
the packet.
98
01-28008-0003-20050204
Fortinet Inc.
System Config
HA configuration
Default priority
FortiGate-100
External
50
DMZ
100
Change the heartbeat device priorities as required to control the interface that is used
for heartbeat traffic and the interface to which heartbeat traffic reverts if the interface
with the highest heartbeat priority fails or is disconnected.
Setting the heartbeat priority for more interfaces increases the reliability of the cluster.
To optimize bandwidth use, you can route most heartbeat traffic to interfaces that
handle less network traffic. You can also create a failover path by setting heartbeat
priorities so that you can control the order in which interfaces are used for heartbeat
traffic.
Monitor priorities
Enable or disable monitoring a FortiGate interface to verify that the interface is
functioning properly and connected to its network. If a monitored interface fails or is
disconnected from its network the interface leaves the cluster. The cluster reroutes
the traffic being processed by that interface to the same interface of another cluster
unit that still has a connection to the network. This other cluster unit becomes the new
primary cluster unit.
01-28008-0003-20050204
99
Configuring an HA cluster
System Config
If you can re-establish traffic flow through the interface (for example, if you re-connect
a disconnected network cable) the interface rejoins the cluster. If Override Master is
enabled for this FortiGate unit (see Override Master on page 97), this FortiGate unit
becomes the primary unit in the cluster again.
Note: Only monitor interfaces that are connected to networks.
Note: You can monitor physical interfaces, but not VLAN subinterfaces.
Configuring an HA cluster
Managing an HA cluster
Configuring an HA cluster
Use the following procedures to create an HA cluster consisting of two or more
FortiGate units. These procedures describe how to configure each of the FortiGate
units for HA operation and then how to connect the FortiGate units to form a cluster.
Once the cluster is connected you can configure it in the same way as you would
configure a standalone FortiGate unit.
To switch between load balancing virus scanning sessions and all sessions
100
01-28008-0003-20050204
Fortinet Inc.
System Config
Configuring an HA cluster
Select HA.
10
11
12
Select Apply.
The FortiGate unit negotiates to establish an HA cluster. When you select apply you
may temporarily lose connectivity with the FortiGate unit as the HA cluster negotiates
and because the FGCP changes the MAC address of the FortiGate unit interfaces
(see Group ID on page 96). To be able to reconnect sooner, you can update the ARP
table of your management PC by deleting the ARP table entry for the FortiGate unit.
13
If you are configuring a NAT/Route mode cluster, power off the FortiGate unit and
then repeat this procedure for all the FortiGate units in the cluster. Once all of the units
are configured, continue with To connect a FortiGate HA cluster on page 101.
14
15
16
Select Change to Transparent Mode and select OK to switch the FortiGate unit to
Transparent mode.
17
18
Repeat this procedure for all of the FortiGate units in the cluster then continue with To
connect a FortiGate HA cluster on page 101.
To connect a FortiGate HA cluster
Use the following procedure to connect a cluster operating in NAT/Route mode or
Transparent mode. Connect the cluster units to each other and to your network. You
must connect all matching interfaces in the cluster to the same hub or switch. Then
you must connect these interfaces to their networks using the same hub or switch.
Fortinet recommends using switches for all cluster connections for the best
performance.
01-28008-0003-20050204
101
Configuring an HA cluster
System Config
Connect the internal interfaces of each cluster unit to a switch or hub connected to
your internal network.
Connect the external interfaces of each cluster unit to a switch or hub connected to
your external network.
Connect the DMZ interfaces of the cluster units to another switch or hub.
Internal Network
Internal
External
INTERNAL
EXTERNAL
DMZ
POWER
STATUS
DMZ
Hub or
Switch
Hub or
Switch
DMZ
Router
INTERNAL
EXTERNAL
DMZ
POWER
STATUS
Internal
External
Internet
102
01-28008-0003-20050204
Fortinet Inc.
System Config
Configuring an HA cluster
Configure the new cluster unit for HA operation with the same HA configuration as the
other units in the cluster.
If the cluster is running in Transparent mode, change the operating mode of the new
cluster unit to Transparent mode.
Weight
config system ha
set weight 0 1
set weight 1 3
set weight 2 3
end
This command has the following results:
The next three connections are processed by the first subordinate unit (priority 1,
weight 3)
The next three connections are processed by the second subordinate unit (priority
2, weight 3)
01-28008-0003-20050204
103
Managing an HA cluster
System Config
The subordinate units process more connections than the primary unit, and both
subordinate units, on average, process the same number of connections.
To switch between load balancing virus scanning sessions and all sessions
By default a FortiGate HA cluster load balances virus scanning sessions among all of
the cluster units. All other traffic is processed by the primary unit. Using the CLI, you
can configure the cluster to load balance all network traffic among all cluster units.
To configure load balancing all communication sessions, enter the command:
config system ha
set load-balance-all enable
end
Managing an HA cluster
The configurations of all of the FortiGate units in the cluster are synchronized so that
the FortiGate units can function as a cluster. Because of this synchronization, you
manage the HA cluster instead of managing the individual cluster units. You manage
the cluster by connecting to the web-based manager using any cluster interface
configured for HTTPS administrative access. You can also manage the cluster by
connecting to the CLI using any cluster interface configured for SSH administrative
access.
You can also use SNMP to manage the cluster by configuring a cluster interface for
SNMP administrative access. Using an SNMP manager you can get cluster
configuration information and receive traps. For a list of HA MIB fields, see HA MIB
fields on page 114 and FortiGate HA traps on page 113.
You can change the cluster configuration by connecting to the cluster and changing
the configuration of the primary unit. The cluster automatically synchronizes all
configuration changes to the subordinate units in the cluster as the changes are
made.
The only configuration change that is not synchronized is the FortiGate host name.
You can give each cluster unit a unique host name to help to identify cluster members.
Individual cluster units are also identified by their serial number.
You can use the web-based manager to monitor the status and logs of individual
cluster members. See To view the status of each cluster member on page 105 and
To view and manage logs for individual cluster units on page 106.
You can manage individual cluster units by using SSH to connect to the CLI of the
cluster. From the CLI you can use the execute ha manage command to connect to
the CLI of each unit in the cluster. You can also manage individual cluster units by
using a null-modem cable to connect to the primary cluster unit. From there you can
also use the execute ha manage command to connect to the CLI of each unit in the
cluster. See To manage individual cluster units on page 107 for more information.
104
01-28008-0003-20050204
Fortinet Inc.
System Config
Managing an HA cluster
Refresh every
Select to control how often the web-based manager updates the system
status display.
Go
Back to HA
Close the cluster members list and return to the HA configuration page.
configuration page
Cluster ID
Use the cluster ID to identify each FortiGate unit in the cluster. The
cluster ID matches the FortiGate unit serial number.
Status
Indicates the status of each cluster unit. A green check mark indicates
that the cluster unit is operating normally. A red X indicates that the
cluster unit cannot communicate with the primary unit.
Up Time
The time in days, hours, minutes, and seconds since the cluster unit was
last started.
Monitor
CPU Usage
The current CPU status of each cluster unit. The web-based manager
displays CPU usage for core processes only. CPU usage for
management processes (for example, for HTTPS connections to the
web-based manager) is excluded.
Memory Usage
The current memory status of each cluster unit. The web-based manager
displays memory usage for core processes only. Memory usage for
management processes (for example, for HTTPS connections to the
web-based manager) is excluded.
Active Sessions
Total Packets
The number of packets that have been processed by the cluster unit
since it last started up.
Virus Detected
01-28008-0003-20050204
105
Managing an HA cluster
System Config
Network Utilization The total network bandwidth being used by all of the cluster unit
interfaces.
Total Bytes
The number of bytes that have been processed by the cluster unit since it
last started up.
Intrusion Detected The number of intrusions or attacks detected by the cluster unit.
Select the serial number of one of the cluster units to display the logs for that cluster
unit.
You can view, search and manage logs saved to memory or logs saved to the hard
disk, depending on the configuration of the cluster unit.
To monitor cluster units for failover
If the primary unit in the cluster fails, the units in the cluster renegotiate to select a new
primary unit. Failure of the primary unit results in the following:
If SNMP is enabled, the new primary FortiGate unit sends the trap message HA
switch. This trap indicates that the primary unit in an HA cluster has failed and has
been replaced with a new primary unit.
The cluster contains fewer FortiGate units. The failed primary unit no longer
appears on the Cluster Members list.
The host name and serial number of the primary cluster unit changes.
The new primary unit logs the following messages to the event log:
HA slave became master
Detected HA member dead
The cluster contains fewer FortiGate units. The failed unit no longer appears on the
Cluster Members list.
The master unit logs the following message to the event log:
Detected HA member dead
106
01-28008-0003-20050204
Fortinet Inc.
System Config
Managing an HA cluster
Use SSH to connect to the cluster and log into the CLI.
Connect to any cluster interface configured for SSH administrative access to log into
the cluster.
You can also use a direct cable connection to log into the primary unit CLI. To do this
you must know which unit is the primary unit.
Enter the following command followed by a space and type a question mark (?):
execute ha manage
The CLI displays a list of all the subordinate units in the cluster. Each cluster unit is
numbered, starting at 1. The information displayed for each cluster unit includes the
unit serial number and the host name of the unit.
Complete the command with the number of the subordinate unit to log into. For
example, to log into subordinate unit 1, enter the following command:
execute ha manage 1
Press Enter to connect to and log into the CLI of the selected subordinate unit. If this
subordinate unit has a different host name, the CLI prompt changes to this host name.
You can use CLI commands to manage this subordinate unit.
SNMP
You can configure the FortiGate SNMP agent to report system information and send
traps (alarms or event messages) to SNMP managers. Using an SNMP manager, you
can access SNMP traps and data from any FortiGate interface or VLAN subinterface
configured for SNMP management access.
The FortiGate SNMP implementation is read-only. SNMP v1 and v2c compliant SNMP
managers have read-only access to FortiGate system information and can receive
FortiGate traps. To monitor FortiGate system information and receive FortiGate traps
you must compile Fortinet proprietary MIBs as well as Fortinet-supported standard
MIBs into your SNMP manager.
RFC support includes support for most of RFC 2665 (Ethernet-like MIB) and most of
RFC 1213 (MIB II) (for more information, see FortiGate MIBs on page 111).
01-28008-0003-20050204
107
Configuring SNMP
System Config
Configuring SNMP
SNMP community
FortiGate MIBs
FortiGate traps
Configuring SNMP
Go to System > Config > SNMP v1/v2c to configure the SNMP agent.
Figure 39: Configuring SNMP
108
SNMP Agent
Description
Location
Enter the physical location of the FortiGate unit. The system location
description can be up to 35 characters long.
Contact
Enter the contact information for the person responsible for this FortiGate
unit. The contact information can be up to 35 characters long.
Apply
Create New
Communities
Name
Queries
The status of SNMP queries for each SNMP community. The query
status can be enabled or disabled.
Traps
The status of SNMP traps for each SNMP community. The trap status
can be enabled or disabled.
Enable
Delete icon
Edit/View icon
01-28008-0003-20050204
Fortinet Inc.
System Config
SNMP community
SNMP community
An SNMP community is a grouping of equipment for network administration purposes.
Add SNMP communities so that SNMP managers can connect to the FortiGate unit to
view system information and receive SNMP traps. You can add up to three SNMP
communities. Each community can have a different configuration for SNMP queries
and traps. Each community can be configured to monitor the FortiGate unit for a
different set of events. You can also add the IP addresses of up to 8 SNMP managers
to each community.
Figure 40: SNMP community options (part 1)
Community Name
Hosts
Identify the SNMP managers that can use the settings in this SNMP
community to monitor the FortiGate unit.
01-28008-0003-20050204
109
SNMP community
System Config
IP Address
The IP address of an SNMP manager than can use the settings in this
SNMP community to monitor the FortiGate unit. You can also set the IP
address to 0.0.0.0 to so that any SNMP manager can use this SNMP
community.
Interface
Optionally select the name of the interface that this SNMP manager uses
to connect to the FortiGate unit. You only have to select the interface if
the SNMP manager is not on the same subnet as the FortiGate unit. This
can occur if the SNMP manager is on the Internet or behind a router.
Add
Select Add to add more SNMP managers. You can add up to 8 SNMP
managers to a single community. Select the Delete icon to remove an
SNMP manager.
Queries
Enter the Port number (161 by default) that the SNMP managers in this
community use for SNMP v1 and SNMP v2c queries to receive
configuration information from the FortiGate unit. Select the Enable
check box to activate queries for each SNMP version.
Traps
Enter the Local and Remote port numbers (162 by default) that the
FortiGate unit uses to send SNMP v1 and SNMP v2c traps to the SNMP
managers in this community. Select the Enable check box to activate
traps for each SNMP version.
SNMP Event
Enable each SNMP event for which the FortiGate unit should send traps
to the SNMP managers in this community.
Select OK.
To configure SNMP access to an interface in Transparent mode
Before a remote SNMP manager can connect to the FortiGate agent, you must
configure one or more FortiGate interfaces to accept SNMP connections. See To
configure the management interface on page 68.
Choose an interface that the SNMP manager connects to and select SNMP.
Select Apply.
To enable SNMP and configure basic SNMP settings
110
Select the Enable check box to enable the FortiGate SNMP Agent.
Select Apply.
01-28008-0003-20050204
Fortinet Inc.
System Config
FortiGate MIBs
Select OK.
FortiGate MIBs
The FortiGate SNMP agent supports FortiGate proprietary MIBs as well as standard
RFC 1213 and RFC 2665 MIBs. RFC support includes support for the parts of RFC
2665 (Ethernet-like MIB) and the parts of RFC 1213 (MIB II) that apply to FortiGate
unit configuration.
The FortiGate MIBs are listed in Table 7. You can obtain these MIB files from Fortinet
technical support. To be able to communicate with the SNMP agent, you must compile
all of these MIBs into your SNMP manager.
Your SNMP manager might already include standard and private MIBs in a compiled
database that is ready to use. You must add the Fortinet proprietary MIBs to this
database. If the standard MIBs used by the Fortinet SNMP agent are already
compiled into your SNMP manager you do not have to compile them again.
Table 7: FortiGate MIBs
MIB file name or RFC Description
fortinet.2.80.mib
fortinet.trap.2.80.mib
The Fortinet trap MIB is a proprietary MIB that is required for your
SNMP manager to receive traps from the FortiGate SNMP agent. For
more information about FortiGate traps, see FortiGate traps on
page 112.
The FortiGate SNMP agent supports MIB II groups with the following
exceptions.
No support for the EGP group from MIB II (RFC 1213, section 3.11
and 6.10).
Protocol statistics returned for MIB II groups (IP/ICMP/TCP/UDP/etc.)
do not accurately capture all FortiGate traffic activity. More accurate
information can be obtained from the information reported by the
Fortinet MIB.
01-28008-0003-20050204
111
FortiGate traps
System Config
FortiGate traps
The FortiGate agent can send traps to SNMP managers that you have added to
SNMP communities. For SNMP managers to receive traps, you must load and
compile the Fortinet trap MIB (file name fortinet.trap.2.80.mib) onto the SNMP
manager.
All traps include the trap message as well as the FortiGate unit serial number.
Table 8: Generic FortiGate traps
Trap message
Description
ColdStart
WarmStart
LinkUp
LinkDown
Description
Disk low
<FortiGate_serial_no>
<interface_name>
HA state
HA state changes. The trap message includes the previous state, the
new state and a flag indicating whether the unit is the master.
HA switch
Memory low
(SysMemLow)
The <interface_name>
Interface IP is changed
to <new_IP>
(Serial No.:
<FortiGate_serial_no>)
(IntfIpChange)
112
Trap message
Description
VPN tunnel is up
(VpnTunnelUp)
01-28008-0003-20050204
Fortinet Inc.
System Config
Description
Description
Virus detected
(AvVirus)
The FortiGate unit detects a virus and removes the infected file from an
HTTP or FTP download or from an email message.
Description
Log full
(SysLogFull)
On a FortiGate unit with a hard drive, hard drive usage exceeds 90%. On a
FortiGate unit without a hard drive, log to memory usage has exceeds 90%.
Description
Primary unit
switch
(HaSwitch)
01-28008-0003-20050204
113
System Config
Description
model
serial
version
versionAv
versionNids
haMode
opMode
cpuUsage
memUsage
sesCount
Description
groupId
HA group ID.
priority
override
autoSync
schedule
stats
serial
cpuUsage
114
netUsage
sesCount
pktCount
byteCount
idsCount
avCount
01-28008-0003-20050204
Fortinet Inc.
System Config
Description
index
The index number of the administrator account added to the FortiGate unit.
name
addr
mask
perm
Description
index
The index number of the local user added to the FortiGate unit.
name
The user name of the local user added to the FortiGate unit.
auth
The authentication type of for the local user. Can be password, LDAP, or
RADIUS.
state
Description
index
name
The name of the virtual domain added to the FortiGate unit. Each FortiGate
unit includes at least one virtual domain named root.
auth
The authentication type of for the local user. Can be password, LDAP, or
RADIUS.
state
Description
index
proto
fromAddr
fromPort
toPort
toAddr
expiry
01-28008-0003-20050204
115
System Config
Replacement messages
Change replacement messages to customize alert email and information that the
FortiGate unit adds to content streams such as email messages, web pages, and FTP
sessions. The FortiGate unit adds replacement messages to a variety of content
streams. For example, if a virus is found in an email message, the file is removed from
the email and replaced with a replacement message. The same applies to pages
blocked by web filtering and email blocked by spam filtering.
Name
The type of replacement message. You can change messages added to email,
web pages in http traffic, messages that are displayed to ftp users, alert mail
messages, messages added to smtp email, and messages added to web
pages blocked by web filter category blocking.
Description
116
Select the category of replacement message to edit by clicking on the blue triangle for
that category.
For the replacement message that you want to change, select Edit.
01-28008-0003-20050204
Fortinet Inc.
System Config
Replacement messages can be text or HTML messages. You can add HTML code to
HTML messages. In addition, replacement messages can include replacement
message tags. When users receive the replacement message, the replacement
message tag is replaced with content relevant to the message. Table 21 lists the
replacement message tags that you can add.
Table 21: Replacement message tags
Tag
Description
%%FILE%%
The name of a file that has been removed from a content stream.
This could be a file that contained a virus or was blocked by
antivirus file blocking. %%FILE%% can be used in virus and file block
messages.
%%VIRUS%%
The name of a virus that was found in a file by the antivirus system.
%%VIRUS%% can be used virus messages
%%QUARFILENAME%%
The name of a file that has been removed from a content stream
and added to the quarantine. This could be a file that contained a
virus or was blocked by antivirus file blocking.
%%QUARFILENAME%% can be used in virus and file block messages.
Quarantining is only available on FortiGate units with a local disk.
%%URL%%
The URL of a web page. This can be a web page that is blocked by
web filter content or URL blocking. %%URL%% can also be used in
http virus and file block messages to be the URL of the web page
from which a user attempted to download a file that is blocked.
The protocol (http, ftp, pop3, imap, or smtp) in which a virus was
detected. %%PROTOCOL%% is added to alert email virus messages.
%%SOURCE_IP%%
%%DEST_IP%%
01-28008-0003-20050204
117
System Config
Description
%%EMAIL_FROM%%
The email address of the sender of the message from which the file
was removed.
%%EMAIL_TO%%
%%NIDSEVENT%%
%%SERVICE%%
%%CATEGORY%%
%%FORTINET%%
FortiManager
Configure the FortiGate unit for IPSec communication between the FortiGate unit and
a FortiManager server. When you enable this feature, all communication between the
FortiGate unit and the FortiManager server takes place using VPN.
Figure 44: FortiManager configuration
Enable FortiManager Enable secure IPSec VPN communication between the FortiGate unit
and a FortiManager Server.
118
FortiManager ID
FortiManager IP
01-28008-0003-20050204
Fortinet Inc.
System Admin
When the FortiGate unit is first installed, it is configured with a single administrator
account with the user name admin. From this administrator account, you can add and
edit administrator accounts. You can also control the access level of each of these
administrator accounts and control the IP address from which the administrator
account can connect to the FortiGate unit.
Each administrator account belongs to an access profile. The access profile
separates FortiGate features into access control categories for which you can enable
read and/or write access. The following table lists the web-based manager pages that
each access control category controls:
Table 22: Access profile control of access to Web-based manager pages
Access control
System Configuration
Security Policy
Router
Firewall
VPN
IPS
Anti-Virus
Web Filter
Auth Users
User
Admin Users
FortiProtect Update
System Shutdown
Read access enables the administrator to view the web-based manager page. The
administrator needs write access to change the settings on the page.
The access profile has a similar effect on administrator access to CLI commands. The
following table shows which commands are available in each access control category
with read and write permission. If the get command is listed, the show command is
also available.
01-28008-0003-20050204
119
System Admin
120
Access
control
System
Configuration
get system
except accprofile, admin
and autoupdate
get router
execute enter
execute ping
execute ping-options
execute ping6
execute traceroute
config system
except accprofile, admin
and autoupdate
config router
execute date
execute dhcpclear
execute enter
execute ha
execute ping
execute ping-options
execute ping6
execute restore
execute router
execute time
execute traceroute
get alertemail
get log
execute enter
config alertemail
config log
execute enter
Security
Policy
get antivirus
get firewall
get ips
get spamfilter
get vpn
get webfilter
execute enter
execute vpn
config antivirus
config firewall
config ips
config spamfilter
config vpn
config webfilter
execute enter
execute vpn
Auth Users
get user
execute enter
config user
exec enter
Admin Users
FortiProtect
Update
System
Shutdown
execute enter
execute
execute
execute
execute
execute
execute
01-28008-0003-20050204
enter
factoryreset
formatlogdisk
reboot
restore
shutdown
Fortinet Inc.
System Admin
Administrators list
Administrators
Access profiles
Administrators
Use the admin account or an account with system configuration read and write
privileges to add new administrator accounts and control their permission levels.
Administrators list
Figure 45: Administrators list
Create New
Name
Trusted hosts
The trusted host IP address and netmask from which the administrator
can log in.
Permission
Delete icon
Change Password Select to change the password for the administrator account.
icon
Administrators options
Figure 46: Administrator account configuration
01-28008-0003-20050204
121
Administrators options
System Admin
Administrator
Password
Confirm
Password
Type the password for the administrator account a second time to confirm
that you have typed it correctly.
Trusted Host #1 Optionally, type the trusted host IP address and netmask from which the
Trusted Host #2 administrator can log in to the FortiGate unit. You can specify up to three
Trusted Host #3 trusted hosts.
Setting trusted hosts for all of your administrators can enhance the security of
your system. For more information, see Using trusted hosts on page 122.
Access Profile The access profile for the administrator. For more information on access
profiles, see Access profile list on page 123.
Select Create New to add an administrator account or select the Edit icon to make
changes to an existing administrator account.
Optionally type a Trusted Host IP address and netmask from which the administrator
can log into the web-based manager.
Select OK.
Figure 47: Change an administrator password
Select the Change Password icon next to the administrator account you want to
change the password for.
Select OK.
122
01-28008-0003-20050204
Fortinet Inc.
System Admin
When you set trusted hosts for all administrators, the FortiGate unit does not respond
to administrative access attempts from any other hosts. This provides the highest
security. If you leave even one administrator unrestricted, the unit accepts
administrative access attempts on any interface that has administrative access
enabled, potentially exposing the unit to attempts to gain unauthorized access.
The trusted hosts you define apply both to the web-based manager and to the CLI
when accessed through telnet or SSH. CLI access through the console connector is
not affected.
Note: If you set trusted hosts and want to use the Console Access feature of the web-based
manager, you must also set 127.0.0.1/255.255.255.255 as a trusted host. For more
information on the Console Access feature, see Console Access on page 28.
Access profiles
Go to System > Admin > Access Profile to add access profiles for FortiGate
administrators. Each administrator account belongs to an access profile. You can
create access profiles that deny access or allow read-only or both read and write
access to FortiGate features.
When an administrator has only read access to a feature, the administrator can
access the web-based manager page for that feature but cannot make changes to the
configuration. There are no Create or Apply buttons and lists display only the
View (
) icon instead of icons for Edit, Delete or other modification commands.
Create New
Profile Name
Delete icon
Edit icon
01-28008-0003-20050204
123
System Admin
Profile Name
Access Control Access Control lists the items that can be controlled by the access profile.
Allow Read All
Select Allow Read All to give an administrator read privilege on all the items
under Access Control.
Select Allow Write All to give an administrator write privilege on all the items
under Access Control.
System
Configuration
Select Read to allow an administrator to view log setting, log access, and
alert email features. To allow an administrator to modify these features,
enable both Read and Write.
Security Policy Select Read to allow an administrator to view the firewall, VPN, IPS, and
antivirus features. To allow an administrator to modify these features, enable
both Read and Write.
Auth Users
Admin Users
FortiProtect
Update
System
Shutdown
Select both Read and Write to allow an administrator to access the system
shutdown, reboot and reset to factory default functions.
124
Select Create New to add an access profile, or select Edit to modify an existing
access profile.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
Use the web-based manager to maintain the FortiGate unit.
Category
Latest Backup
01-28008-0003-20050204
125
System Maintenance
System settings
System
Configuration
Debug Log
Web Filtering
Web Content
Block
Web URL
Exempt List
Spam Filtering
IP Address
Email Address
MIME Headers
Banned Word
IPS Signatures
IPS User-Defined Upload or download IPS signatures.
Signatures
VPN certificates
All Certificates
Restore or back up all VPN certificates in a single passwordprotected file. See To restore VPN certificates and To back up
VPN certificates on page 127.
Enter a password.
Select OK .
126
Enter the password you used when backing up All Configuration Files.
Enter the path and filename of the configuration file, or select Browse and locate the
file.
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
Reconnect to the web-based manager and review your configuration to confirm that
the uploaded configuration files have taken effect.
To back up individual categories
Select the Backup icon for the type of file you want to back up.
Select the Restore icon for the type of file you want to restore.
Enter the path and filename of the file, or select Browse and locate the file.
Select OK.
If you restore the system configuration, the FortiGate unit restarts, loading the new
system settings. You should then reconnect to the web-based manager and review
your configuration to confirm that the uploaded system settings have taken effect.
Select Return. (This step does not apply if you restore the system configuration.)
To back up VPN certificates
Enter the path and filename of the backup file, or select Browse and locate the file.
Select OK.
01-28008-0003-20050204
127
System Maintenance
Update center
You can configure the FortiGate unit to connect to the FortiProtect Distribution
Network (FDN) to update the antivirus (including grayware), Spam Filter and attack
definitions and engines.
Before the FortiGate unit can receive antivirus and attack updates, it must be able to
connect to the FortiProtect Distribution Network (FDN). The FortiGate unit uses
HTTPS on port 443 to connect to the FDN. The FortiGate unit must be able to route
packets to the Internet using port 443. For information about configuring scheduled
updates, see To enable scheduled updates on page 131.
You can also configure the FortiGate unit to allow push updates. Push updates are
provided to the FortiGate unit from the FDN using HTTPS on UDP port 9443. To
receive push updates, the FDN must be able to route packets to the FortiGate unit
using UDP port 9443. For information about configuring push updates, see To enable
push updates on page 133.
The FDN is a world-wide network of FortiProtect Distribution Servers (FDSs). When
the FortiGate unit connects to the FDN it connects to the nearest FDS. To do this, all
FortiGate units are programmed with a list of FDS addresses sorted by nearest time
zone according to the time zone configured for the FortiGate unit.
The FortiGate unit supports the following antivirus and attack definition update
features:
Hourly, daily, or weekly scheduled antivirus and attack definition and antivirus
engine updates from the FDN,
Update status including version numbers, expiry dates, and update dates and
times,
To receive scheduled updates and push updates, you must register the FortiGate unit
on the Fortinet support web page.
128
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
FortiProtect
Distribution
Network
Push Update
A green indicator means that the FDN can connect to the FortiGate unit to
send push updates. You can configure the FortiGate unit to receive push
updates. See To enable push updates on page 133.
A red-yellow flashing indicator means that the FDN cannot connect to the
FortiGate unit to send push updates. Push updates may not be available if
you have not registered the FortiGate unit (see To register a FortiGate unit
on page 138), if there is a NAT device installed between the FortiGate unit
and the FDN (see Enabling push updates through a NAT device on
page 134), or if your FortiGate unit connects to the Internet using a proxy
server (see To enable scheduled updates through a proxy server on
page 132).
Refresh
When you select Refresh, the FortiGate unit tests its connection to the FDN.
The test results are displayed at the top of the System Update page.
Use override
If you cannot connect to the FDN or if your organization provides antivirus
server address and attack updates using their own FortiProtect server, you can configure an
override server.
Select the Use override server address check box and enter the IP address
of a FortiProtect server.
If after applying the override server address, the FortiProtect Distribution
Network setting changes to available, the FortiGate unit has successfully
connected to the override server. If the FortiProtect Distribution Network
stays set to not available, the FortiGate unit cannot connect to the override
server. Check the FortiGate configuration and the network configuration to
make sure you can connect to the override FortiProtect server from the
FortiGate unit.
Update
The antivirus (including grayware), Spam filter, and attack definitions and
engines for which update information is displayed.
01-28008-0003-20050204
129
System Maintenance
Version
The version numbers of the definition files and engines currently installed on
the FortiGate unit.
Expiry date
The expiry date of your license for definition and engine updates.
Last update
attempt
The date and time on which the FortiGate unit last attempted to download
definition and engine updates.
Last update
status
The result of the last update attempt. No updates means the last update
attempt was successful but no new updates were available. Update
succeeded or similar messages mean the last update attempt was
successful and new updates were installed. Other messages can indicate
that the FortiGate was not able to connect to the FDN and other error
conditions.
Allow Push
Update
Select this check box to allow automatic updates of the FortiGate unit.
Use override
push IP
Select this check box and enter the override IP address and port number.
Override push IP addresses and ports are used when there is a NAT device
between the FortiGate Unit and the FDN.
The FortiGate unit sends the override push IP address and Port to the FDN.
The FDN will now use this IP address and port for push updates to the
FortiGate unit on the internal network. If the External IP Address or External
Service Port change, add the changes to the Use override push configuration
and select Apply to update the push information on the FDN. For more
information, see Enabling push updates through a NAT device on page 134.
Scheduled
Update
Every
Daily
Attempt to update once a day. You can specify the hour of the day to check
for updates. The update attempt occurs at a randomly determined time within
the selected hour.
Weekly
Attempt to update once a week. You can specify the day of the week and the
hour of the day to check for updates. The update attempt occurs at a
randomly determined time within the selected hour.
Update Now
Apply
Go to System > Config > Time and make sure the time zone is set to the time zone
for the region in which your FortiGate unit is located.
Select Refresh.
The FortiGate unit tests its connection to the FDN. The test results are displayed at
the top of the System Update page.
To update antivirus and attack definitions
130
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
Select Update Now to update the antivirus and attack definitions and engines.
If the connection to the FDN or override server is successful, the web-based manager
displays a message similar to the following:
Your update request has been sent. Your database will be updated
in a few minutes. Please check your update page for the status
of the update.
After a few minutes, if an update is available, the System Update Center page lists
new version information for antivirus definitions, the antivirus engine, attack definitions
or the attack engine. The System Status page also displays new dates and version
numbers for antivirus and attack definitions. Messages are recorded to the event log
indicating whether the update was successful or not.
Note: Updating antivirus and attack definitions can cause a very short disruption in traffic
currently being scanned while the FortiGate unit applies the new signature database. To
minimize this possibility, schedule updates for times of light traffic.
Every
Once every 1 to 23 hours. Select the number of hours and minutes between
each update request.
Daily
Once a day. You can specify the time of day to check for updates.
Weekly
Once a week. You can specify the day of the week and the time of day to check
for updates.
Select Apply.
The FortiGate unit starts the next scheduled update according to the new update
schedule.
Whenever the FortiGate unit runs a scheduled update, the event is recorded in the
FortiGate event log.
To add an override server
If you cannot connect to the FDN, or if your organization provides antivirus and attack
updates using their own FortiProtect server, you can use the following procedure to
add the IP address of an override FortiProtect server.
01-28008-0003-20050204
131
System Maintenance
Select Apply.
The FortiGate unit tests the connection to the override server.
If the FortiProtect Distribution Network setting changes to available, the FortiGate unit
has successfully connected to the override server.
If the FortiProtect Distribution Network stays set to not available, the FortiGate unit
cannot connect to the override server. Check the FortiGate configuration and network
configuration for settings that would prevent the FortiGate unit from connecting to the
override FortiProtect server.
To enable scheduled updates through a proxy server
If your FortiGate unit must connect to the Internet through a proxy server, you can use
the config system autoupdate tunneling command to allow the FortiGate
unit to connect (or tunnel) to the FDN using the proxy server. Using this command you
can specify the IP address and port of the proxy server. As well, if the proxy server
requires authentication, you can add the user name and password required for the
proxy server to the autoupdate configuration. The full syntax for enabling updates
through a proxy server is:
config system autoupdate tunneling
set address <proxy-address_ip>
set port <proxy-port>
set username <username_str>
set password <password_str>
set status enable
end
For example, if the IP address of the proxy server is 67.35.50.34, its port is 8080, the
user name is proxy_user and the password is proxy_pwd, enter the following
command:
config system autoupdate tunneling
set address 67.35.50.34
set port 8080
set username proxy_user
set password proxy_pwd
set status enable
end
For more information about the config system autoupdate tunneling
command, see the FortiGate CLI Reference Guide.
The FortiGate unit connects to the proxy server using the HTTP CONNECT method,
as described in RFC 2616. The FortiGate unit sends an HTTP CONNECT request to
the proxy server (optionally with authentication information) specifying the IP address
and port required to connect to the FDN. The proxy server establishes the connection
to the FDN and passes information between the FortiGate unit and the FDN.
The CONNECT method is used mostly for tunneling SSL traffic. Some proxy servers
restrict the CONNECT to well known ports for HTTPS and perhaps some other similar
services. FortiGate autoupdates use the standard HTTPS port 443 to connect to the
FDN, so your proxy server should not need additional configuration to allow the
connection.
132
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
There are no special tunneling requirements if you have configured an override server
address to connect to the FDN.
Select Apply.
01-28008-0003-20050204
133
System Maintenance
The FortiGate unit sends the SETUP message if you change the external IP address
manually or if you have set the external interface addressing mode to DHCP or
PPPoE and your DHCP or PPPoE server changes the IP address.
If you have redundant connections to the Internet, the FortiGate unit also sends the
SETUP message when one Internet connection goes down and the FortiGate unit
fails over to the other Internet connection.
In Transparent mode if you change the management IP address, the FortiGate unit
also sends the SETUP message to notify the FDN of the address change.
General procedure
Use the following steps to configure the FortiGate NAT device and the FortiGate unit
on the internal network so that the FortiGate unit on the internal network can receive
push updates:
1
Add a firewall policy to the FortiGate NAT device that includes the port forwarding
virtual IP.
Configure the FortiGate unit on the internal network with an override push IP and port.
Note: Before completing the following procedure, you should register the internal network
FortiGate unit so that it can receive push updates.
134
In the External Interface section, select the external interface that the FDN connects
to.
In the External IP Address section, type the external IP address that the FDN
connects to.
Type the External Service Port that the FDN connects to.
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
In the Map to IP section, type the IP address of the FortiGate unit on the internal
network.
If the FortiGate unit is operating in NAT/Route mode, enter the IP address of the
external interface.
If the FortiGate unit is operating in Transparent mode, enter the management IP
address.
10
Select OK.
To add a firewall policy to the FortiGate NAT device
Source
External_All
Destination
Schedule
Always
Service
ANY
Action
Accept
NAT
Selected.
Select OK.
To configure the FortiGate unit on the internal network
Set Port to the external service port added to the virtual IP.
Select Apply.
The FortiGate unit sends the override push IP address and port to the FDN. The FDN
now uses this IP address and port for push updates to the FortiGate unit on the
internal network.
If the external IP address or external service port changes, add the changes to the
Use override push configuration and select Apply to update the push information on
the FDN.
You can select Refresh to make sure that push updates work.
Push Update changes to Available.
Support
You can use the Support page to report problems with the FortiGate unit to Fortinet
Support or to register your FortiGate unit with the FortiProtect Distribution Server
(FDS).
01-28008-0003-20050204
135
System Maintenance
Figure 52: Support
Report Bug
Select Report Bug to submit problems with the FortiGate unit to Fortinet
Support.
FDS Registration Select FDS Registration to register the FortiGate unit with FortiNet.
Contact
Information
Enter the contact information so that FortiNet support can reply to your bug
report. Items marked with an * are required.
Bug Description* Enter a description of the problem you have encountered with the FortiGate
unit.
Send diagnostic Send diagnostic information about the FortiGate unit, including its current
configuration, to Fortinet for analysis.
information
Send email by
Submit the bug report using the default mail relay.
default mail-relay
Test
Send email by
Submit the bug report using a customized mail relay.
customized mailrelay
SMTP Server
User Name
Password
Authentication
Select No if the SMTP server does not require authentication. Select Yes if
the SMTP server does require authentication.
To report a bug
1
136
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
Select Submit.
To configure a customized mail relay
Enter the SMTP server information, user name, whether or not to use authentication,
and the password if required.
Add or change FortiCare Support Contract numbers for each FortiGate unit
All registration information is stored in the Fortinet Customer Support database. This
information is used to make sure that your registered FortiGate units can be kept up to
date. All information is strictly confidential. Fortinet does not share this information
with any third-party organizations for any reason.
Owners of a new FortiGate unit are entitled to 90 days of technical support services.
To continue receiving support services after the 90-day expiry date, you must
purchase a FortiCare Support Contract from an authorized Fortinet reseller or
distributor. Different levels of service are available so you can purchase the support
that you need. For maximum network protection, Fortinet strongly recommends that
all customers purchase a service contract that covers antivirus and attack definition
updates. See your Fortinet reseller or distributor for details of packages and pricing.
01-28008-0003-20050204
137
System Maintenance
To activate the FortiCare Support Contract, you must register the FortiGate unit and
add the FortiCare Support Contract number to the registration information. You can
also register the FortiGate unit without purchasing a FortiCare Support Contract. In
that case, when you purchase a FortiCare Support Contract you can update the
registration information to add the support contract number.
A single FortiCare Support Contract can cover multiple FortiGate units. You must
enter the same service contract number for each of the FortiGate models covered by
the service contract.
To register a FortiGate unit
Before registering a FortiGate unit, you require the following information:
The product model and serial number for each FortiGate unit that you want to
register.
The serial number is located on a label on the bottom of the FortiGate unit.
You can view the Serial number from the web-based manager by going to
System > Status.
The serial number is also available from the CLI using the get system status
command.
138
If you have purchased a FortiCare Support Contract for this FortiGate unit, enter the
support contract number.
01-28008-0003-20050204
Fortinet Inc.
System Maintenance
Select Finish.
If you have not entered a FortiCare Support Contract number (SCN) you can return to
the previous page to enter the number. If you do not have a FortiCare Support
Contract, you can select Continue to complete the registration.
If you have entered a support contract number, a real-time validation is performed to
verify that the SCN information matches the FortiGate unit. If the information does not
match you can try entering it again.
A web page is displayed that contains detailed information about the Fortinet technical
support services available to you for the registered FortiGate unit.
Your Fortinet support user name and password is sent to the email address provided
with your contact information.
Shutdown
You can use the Maintenance page to log out, restart and shut down the FortiGate
unit.
Figure 54: System shut down
Select Logout.
Select Apply.
The FortiGate unit logs out.
To restart the system
Select Reboot.
Select Apply.
The FortiGate unit restarts.
To shut down the system
You can restart the FortiGate unit after shutdown only by turning the power off and
then on.
Select Shutdown.
Select Apply.
01-28008-0003-20050204
139
System Maintenance
The FortiGate unit shuts down and all traffic flow stops.
To reset the FortiGate unit to factory defaults
Use the following procedure to reset system settings to the values set at the factory.
This procedure does not change the firmware version or the antivirus or attack
definitions.
140
Caution: This procedure deletes all changes that you have made to the FortiGate configuration
and reverts the system to its original configuration, including resetting interface addresses.
Select Apply.
The FortiGate unit restarts with the configuration that it had when it was first powered
on.
Reconnect to the web-based manager and review the system configuration to confirm
that it has been reset to the default settings.
01-28008-0003-20050204
Fortinet Inc.
Virtual domains
01-28008-0003-20050204
141
System settings
Routing configuration
142
Firewall settings
IPSec
PPTP
L2TP
Certificates
01-28008-0003-20050204
Fortinet Inc.
Unit configuration
Network configuration
Host Name
Firmware Version
Antivirus Definitions and engine
Attack Definitions and engine
Serial Number
Operation Mode
DNS settings
DHCP configuration
DHCP settings are applied per interface no matter which virtual domain the
interface has been added to
System Config
Time
Options
HA
SNMP v1/v2c
Replacement messages
FortiManager configuration
System Admin
Administrators
Access profiles
System Maintenance
Firewall
Update Center
Services (predefined and custom) but not service groups
Schedules
Protection Profiles
IPS
Antivirus
Web filter
Spam filter
01-28008-0003-20050204
143
Virtual domains
Go to System > Virtual domain > Virtual domains to view and add virtual domains.
Figure 55: Virtual domain list
144
Create New
Current
The name of the current virtual domain. Select Change to choose a different
domain. The default virtual domain is root.
Management
The name of the virtual domain used for system management. Select Change
to choose a different domain.
Max. Virtual
Domains
Shows the maximum number of virtual domains for this FortiGate unit.
Name
Current
A check mark icon in this column indicates that this is the current domain.
Management
A check mark icon in this column indicates that this is the domain used for
system management.
Delete icon
Select to delete a virtual domain. You cannot delete the root virtual domain or a
domain that is used for system management.
01-28008-0003-20050204
Fortinet Inc.
Select OK.
Select Change following the current virtual domain name above the table.
Select OK.
The footer of the web-based manager page displays the selected virtual domain name
if the information and configuration options on the page are exclusive to the virtual
domain. Otherwise, the footer displays Virtual Domain: all. See Exclusive virtual
domain properties on page 142.
01-28008-0003-20050204
145
Select Apply.
The FortiGate unit displays the following message:
Management IP address was changed. Click here to redirect.
146
01-28008-0003-20050204
Fortinet Inc.
Set Virtual domain to All or to the name of the virtual domain that currently contains
the interface.
Select OK.
The physical interface moves to the virtual domain. Firewall IP pools and virtual IP
added for this interface are deleted. You should manually delete any routes that
include this interface.
To add VLAN subinterfaces to a virtual domain
A virtual domain must contain at least two interfaces. These can be physical
interfaces or VLAN interfaces. VLAN subinterfaces are usually not in the same virtual
domain as the physical interfaces that they are added to.
To add a new VLAN to a virtual domain in NAT/Route mode, see To add a VLAN
subinterface in NAT/Route mode on page 73. To add a new VLAN to a virtual domain
in Transparent mode, see To add a VLAN subinterface in Transparent mode on
page 78.
The following procedure describes how to move a VLAN subinterface from one virtual
domain to another. You cannot remove a VLAN subinterface from a virtual domain if
firewall policies have been added for it. Delete the firewall policies or remove the
VLAN subinterface from the firewall policies first. If the VLAN subinterface has been
added to a zone, it is removed from the zone when you move it to a different virtual
domain.
Set Virtual domain to All or to the name of the virtual domain that currently contains
the VLAN subinterface.
Select OK.
The VLAN subinterface moves to the virtual domain. Firewall IP pools and virtual IP
added for this VLAN subinterface are deleted. You should manually delete any routes
that include this VLAN subinterface.
To view the interfaces in a virtual domain
Select Change following the current virtual domain name above the table.
01-28008-0003-20050204
147
Select OK.
Select Change following the current virtual domain name above the table.
Select OK.
Go to Router.
Select Change following the current virtual domain name above the table.
Select OK.
Configure the routing table for the current virtual domain as required.
See Routing table (Transparent Mode) on page 69. Network traffic entering this
virtual domain is routed only by the static routes added to the current virtual domain.
148
Select Change following the current virtual domain name above the table.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Select Create new to add firewall policies to the current virtual domain.
See Policy on page 200. You can only add firewall policies for the physical
interfaces, VLAN subinterfaces, or zones added to the current virtual domain. The
firewall policies that you add are only visible when you are viewing the current virtual
domain. Network traffic accepted by the interfaces and VLAN subinterfaces added to
this virtual domain is controlled by the firewall policies added to this virtual domain
To add firewall addresses to a virtual domain
The following procedure applies to NAT/Route and Transparent mode.
Select Change following the current virtual domain name above the table.
Select OK.
Add new firewall addresses, address ranges, and address groups to the current virtual
domain. See Address on page 209.
To add IP pools to a virtual domain
The following procedure applies to NAT/Route mode.
Select Change following the current virtual domain name above the table.
Select OK.
Add new IP pools as required for the current virtual domain. See IP pool on
page 229.
To add Virtual IPs to a virtual domain
The following procedure applies to NAT/Route mode.
Select Change following the current virtual domain name above the table.
Select OK.
Add new virtual IPs as required for the current virtual domain. See Virtual IP on
page 225.
01-28008-0003-20050204
149
150
Select Change following the current virtual domain name above the table.
Select OK.
Go to VPN.
Configure IPSec VPN, PPTP, L2TP, and certificates as required. See VPN on
page 255.
01-28008-0003-20050204
Fortinet Inc.
Router
This chapter describes how to configure FortiGate routing and RIP. It contains the
following sections:
Static
Policy
RIP
Router objects
Monitor
CLI configuration
Static
A static route specifies where to forward packets that have a particular destination IP
address. Static routes control traffic exiting the FortiGate unityou can specify
through which interface the packet will leave and to which device the packet should be
routed.
You configure routes by defining the destination IP address and netmask of packets
that the FortiGate unit is intended to intercept, and specifying a (gateway) IP address
for those packets. The gateway address specifies the next hop router to which traffic
will be routed.
You can decrease the distance value of a static route to indicate that the route is
preferable compared to another static route that specifies a different gateway to the
same destination network. Routes having lower administrative distances are
preferable and are selected first when two or more routes to the same destination
network are available.
The FortiGate unit routes packets using a best match algorithm (the order of static
routes in the list is ignored). To select a route for a packet, the FortiGate unit checks
the destination address of the packet and searches through the routing table for the
best matching destination address. If a match is found, the packet is forwarded to the
specified gateway. If no match is found, the FortiGate unit routes the packet to the
gateway specified in the default route. The value 0.0.0.0/0.0.0.0 (all destinations) is
reserved for the default route. To route packets according to the default route, you
must specify a gateway address and outbound interface for the default route.
01-28008-0003-20050204
151
Router
For example, consider Figure 56, which shows a FortiGate unit connected to a router.
To ensure that all outbound packets destined to any network beyond the router are
routed to the correct destination, you must edit the default configuration and make the
router the default gateway for the FortiGate unit.
Figure 56: Making a router the default gateway
Internet
Router
192.168.10.1
external
FortiGate_1
Esc
Enter
Internal network
192.168.20.0/24
To route outbound packets from the internal network to destinations that are not on
network 192.168.20.0/24, you would edit the default static route and include the
following settings:
Gateway: 192.168.10.1
Distance: 10
The Gateway setting specifies the IP address of the next hop router interface to the
FortiGate external interface. The interface behind the router (192.168.10.1) is
the default gateway for FortiGate_1.
In some cases, there may be routers behind the FortiGate unit. If the destination IP
address of a packet is not on the local network but is on a network behind one of those
routers, the FortiGate routing table must include a static route to that network. For
example, in Figure 57, the FortiGate unit must be configured with static routes to
interfaces 192.168.10.1 and 192.168.10.2 in order to forward packets to Network_1
and Network_2 respectively.
152
01-28008-0003-20050204
Fortinet Inc.
Router
Internet
FortiGate_1
Esc
Enter
internal
Router_1
192.168.10.1
Network_1
192.168.20.0/24
dmz
Router_2
192.168.10.2
Network_2
192.168.30.0/24
01-28008-0003-20050204
153
Router
IP
Mask
Gateway
The IP address of the first next hop router to which this route directs traffic.
Device
Distance
Destination
IP/Mask
Enter the destination IP address and netmask for this route. The value
0.0.0.0/0.0.0.0 is reserved for the default route.
Gateway
Enter the IP address of the first next hop router to which this route directs
traffic.
Device
Select the name of the FortiGate interface through which to route traffic.
Distance
Enter the administrative distance for the route. Using administrative distance
you can specify the relative priorities of different routes to the same
destination. A lower administrative distance indicates a more preferred route.
Distance can be an integer from 1-255.
Select Create New to add a new route or select the edit icon beside an existing route
to edit that route.
For Device, select the FortiGate interface through which to route traffic for this route.
Select OK.
To move static routes
154
01-28008-0003-20050204
Fortinet Inc.
Router
Select the Move to icon beside the route you want to move.
Current Order shows the existing number for this route.
Figure 60: Move a static route
For Move to, select either Before or After and type the number that you want to place
this route before or after.
Select OK.
The route is displayed in the new location on the static route list.
Policy
Using policy routing you can configure the FortiGate unit to route packets based on:
Source address
The FortiGate unit starts at the top of the policy routing list and attempts to match the
packet with a policy. The policy route supplies the next hop gateway as well as the
FortiGate interface to be used by the traffic. If no policy route matches the packet, the
FortiGate unit routes the packet using the regular routing table.
Incoming
Outgoing
Source
The policy route matches packets that have this source IP address and netmask.
Destination The policy route matches packets that have this destination IP address and
netmask.
Delete and Delete or edit a policy route.
Edit icons
01-28008-0003-20050204
155
Router
Protocol
Destination
Address / Mask
Destination Ports
Match packets that have this destination port range. To match a single
port, enter the same port number for both From and To.
Outgoing Interface Send packets that match this policy route, out this interface.
Gateway Address
Send packets that match this policy route to this next hop router.
156
Select Create New to add a new policy route or select the edit icon beside an existing
policy route to edit that policy route.
Enter the Source Address / Mask and the Destination Address / Mask.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Router
General
RIP
The FortiGate implementation of the Routing Information Protocol (RIP) supports both
RIP version 1 as defined by RFC 1058, and RIP version 2 as defined by RFC 2453.
RIP version 2 enables RIP messages to carry more information, and to support simple
authentication and subnet masks.
RIP is a distance-vector routing protocol intended for small, relatively homogeneous,
networks. RIP uses hop count as its routing metric. Each network is usually counted
as one hop. The network diameter is limited to 15 hops.
General
Figure 63: RIP General settings
RIP Version
Default Metric
For non-default routes in the static routing table and directly connected
networks the default metric is the metric that the FortiGate unit advertises
to adjacent routers. This metric is added to the metrics of learned routes.
The default metric can be a number from 1 to 16.
Enable Defaultinformationoriginate
RIP Timers:
RIP timer defaults are effective in most configurations. All routers and
access servers in the network should have the same RIP timer settings.
Update
Garbage
The time in seconds that must elapse after the timeout interval for a route
expires, before RIP deletes the route. If RIP receives an update for the
route after the timeout timer expires but before the garbage timer expires
then the entry is switched back to reachable.
01-28008-0003-20050204
157
Networks list
Router
Timeout
Redistribute:
Connected
Metric
Route-map
Enter the name of the route map to use for the redistributed connected
routes. For information on how to configure route maps, see Route-map
list on page 167.
Static
Metric
Route-map
Enter the name of the route map to use for the redistributed static routes.
For information on how to configure route maps, Route-map list on
page 167.
Select Apply.
To configure RIP route redistribution
Select Apply.
Networks list
Identify the networks for which to send and receive RIP updates. If a network is not
specified, interfaces in that network will not be advertised in RIP updates.
158
01-28008-0003-20050204
Fortinet Inc.
Router
Networks options
Networks options
Figure 65: RIP Networks configuration
Select Create New to add a new RIP network definition or select the Edit icon to edit
an existing RIP network definition.
Select OK.
Interface list
Configure RIP version 2 authentication, RIP version send and receive for the specified
interface, and configure and enable split horizon.
Authentication is only available for RIP version 2 packets sent and received by an
interface. Set authentication to None if Send Version or Receive Version are set to 1
or 1 2.
Figure 66: RIP interface list
Create New
Interface
Send Version
Receive Version
Split-Horizon
01-28008-0003-20050204
159
Interface options
Router
Authentication
Interface options
Figure 67: RIP interface configuration
160
Interface
Send Version
RIP routing messages are UDP packets that use port 520.
Select 1 to configure RIP to send RIP version 1 messages from an
interface.
Select 2 to configure RIP to send RIP version 2 messages from an
interface.
Select Both to configure RIP to send both RIP version 1 and RIP version
2 messages from an interface.
Setting the Send Version here overrides the default RIP version for this
interface.
Receive Version
RIP routing messages are UDP packets that use port 520.
Select 1 to configure RIP to listen for RIP version 1 messages on an
interface.
Select 2 to configure RIP to listen for RIP version 2 messages on an
interface.
Select Both to configure RIP to listen for both RIP version 1 and RIP
version 2 messages on an interface.
Setting the Receive Version here overrides the default RIP version for
this interface.
Split-Horizon
01-28008-0003-20050204
Fortinet Inc.
Router
Distribute list
Authentication
Select the authentication used for RIP version 2 packets sent and
received by this interface. If you select None, no authentication is used. If
you select Text, the authentication key is sent as plain text. If you select
MD5, the authentication key is used to generate an MD5 hash.
Both text mode and MD5 mode only guarantee the authenticity of the
update packet, not the confidentiality of the routing information in the
packet.
In text mode the key is sent in clear text over the network. Text mode is
usually used only to prevent network problems that can occur if an
unwanted or misconfigured router is mistakenly added to the network.
Password
Key-chain
Enter the name of the key chain to use for authentication for RIP version
2 packets sent and received by this interface. Use key chains when you
want to configure multiple keys. For information on how to configure key
chains, see Key chain list on page 170.
Select a Send Version if you want to override the default send version for this
interface.
Select a Receive Version if you want to override the default receive version for this
interface.
Select either Regular or Poisoned reverse to set the split horizon type.
Select Password and enter a password (key) if this interface is using RIP version 2
and if you are configuring only one key for this interface and do not want to use a key
chain.
Select Key-chain and select the key chain to use if this interface is using RIP version 2
and you want to use key chains for authentication for this interface.
10
Select OK.
Distribute list
Use distribute lists to filter incoming or outgoing updates using an access list or a
prefix list. If you do not specify an interface, the filter will be applied to all interfaces in
the current virtual domain.
Note: By default, all distribute lists for the root virtual domain are displayed. If you create
additional virtual domains, the distribute lists belonging to the current virtual domain only are
displayed. To view the settings associated with a different virtual domain, go to System > Virtual
Domain > Virtual Domains and select the virtual domain.
You must configure the access list or prefix list that you want the distribute list to use
before you configure the distribute list. For more information on configuring access
lists and prefix lists, see Access list on page 164 and Prefix list on page 166.
01-28008-0003-20050204
161
Router
Create New
Direction
Filter
Interface
The interface to use this filter on. If no interface name is displayed, this
distribute list is used for all interfaces.
Enable
Direction
Set the direction for the filter. Select In to filter incoming packets. Select
Out to filter outgoing packets.
prefix-list
Select prefix-list to use a prefix list for this distribute list. Select the name
of the prefix list to use for this distribute list.
access-list
Select access-list to use an access list for this distribute list. Select the
name of the access list to use for this distribute list.
Interface
Select the name of the interface to apply this distribute list to. If you do
not specify an interface, this distribute list will be used for all interfaces.
Enable
162
Select Create New to add a new distribute list or select the edit icon beside an existing
distribute list to edit that distribute list.
Select the prefix list or access list to use for this distribute list.
Select an interface to apply this distribute list to, or select the blank entry to apply this
distribute list to all interfaces.
01-28008-0003-20050204
Fortinet Inc.
Router
Offset list
Select or clear the Enable check box to enable or disable this distribute list.
Select OK.
Offset list
Use offset lists to add the specified offset to the metric of a route.
Note: By default, all offset lists for the root virtual domain are displayed. If you create additional
virtual domains, the offset lists belonging to the current virtual domain only are displayed. To
view the settings associated with a different virtual domain, go to System > Virtual Domain >
Virtual Domains and select the virtual domain.
Figure 70: RIP Offset list
Create New
Direction
Access-list
Offset
The offset number to add to the metric for this offset list.
Interface
Enable
Direction
Select In to apply the offset to the metrics of incoming routes. Select out
to apply the offset to the metrics of outgoing routes.
Access-list
Select the access list to use for this offset list. The access list is used to
determine which routes to add the metric to.
Offset
Enter the offset number to add to the metric. Enter a number from 1 to 16.
Interface
Enable
01-28008-0003-20050204
163
Access list
Router
Select Create New to add a new offset list or select the edit icon beside an existing
offset list to edit that offset list.
Check or clear the Enable check box to enable or disable this offset list.
Select OK.
Router objects
Router objects are a set of tools used by routing protocols and features.
Access list
Access lists are filters used by FortiGate routing features.
Each rule in an access list consists of a prefix (IP address and netmask), the action to
take for this prefix (permit or deny), and whether to match the prefix exactly or to
match the prefix and any more specific prefix.
The FortiGate unit attempts to match a packet against the rules in an access list
starting at the top of the list. If it finds a match for the prefix it takes the action specified
for that prefix. If no match is found the default action is deny.
For an access list to take effect it must be called by another FortiGate routing feature
such as RIP or OSPF.
Figure 72: Access list
164
Create New
Add a new access list name. An access list and a prefix list cannot have
the same name.
Name
Action
Prefix
Delete, Add
access-list entry,
and Edit icons
01-28008-0003-20050204
Fortinet Inc.
Router
Select OK.
list Entry
Action
Prefix
Select Match any to match any prefix. Select Match a network address
and enter the prefix (IP address and netmask) for this access list rule.
Exact match
By default, access list rules are matched on the prefix or any more
specific prefix. Enable Exact match to match only the configured prefix.
Select the Add access-list entry icon to add a new access list entry or select the edit
icon beside an existing access list entry to edit that entry.
Select Permit or Deny for the Action to take for the prefix in this access list entry.
If you selected Match a network address, enter the IP address and netmask that
define the prefix for this access list entry.
Select OK.
01-28008-0003-20050204
165
Prefix list
Router
Prefix list
A prefix list is an enhanced version of an access list that allows you to control the
length of the prefix netmask.
Each rule in a prefix list consists of a prefix (IP address and netmask), the action to
take for this prefix (permit or deny), and maximum and minimum prefix length settings.
The FortiGate unit attempts to match a packet against the rules in a prefix list starting
at the top of the list. If it finds a match for the prefix, it takes the action specified for that
prefix. If no match is found the default action is deny.
For a prefix list to take effect it must be called by another FortiGate routing feature
such as RIP or OSPF.
Figure 75: Prefix list
Create New
Add a new prefix list name. An access list and a prefix list cannot have
the same name.
Name
Action
Prefix
GE
LE
166
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Router
list Entry
Action
Prefix
Select Match any to match any prefix. Select Match a network address
and enter the prefix (IP address and netmask) for this prefix list entry. The
length of the netmask should be less than the setting for Greater or equal
to.
Greater or equal to Match prefix lengths that are greater than or equal to this number. The
setting for Greater or equal to should be less than the setting for Less or
equal to. The setting for Greater or equal to should be greater than the
netmask set for Prefix.The number can be from 0 to 32.
Less or equal to
Match prefix lengths that are less than or equal to this number. The
setting for Less or equal to should be greater than the setting for Greater
or equal to. The number can be from 0 to 32.
Select the Add prefix-list entry icon to add a new prefix list entry or select the edit icon
beside an existing prefix list entry to edit that entry.
Select Permit or Deny for the Action to take for the prefix in this prefix list entry.
If you selected Match a network address, enter the IP address and netmask that
define the prefix for this prefix list entry.
Select Greater or equal to and enter a number from 0 to 32 to match prefix lengths
that are greater than or equal to this number.
Select Less or equal to and enter a number from 0 to 32 to match prefix lengths that
are less than or equal to this number.
Select OK.
Route-map list
Route maps are a specialized form of filter. Route maps are similar to access lists, but
have enhanced matching criteria, and in addition to permit or deny actions can be
configured to make changes as defined by set statements.
01-28008-0003-20050204
167
New Route-map
Router
The FortiGate unit attempts to match the rules in a route map starting at the top of the
list. If it finds a match it makes the changes defined in the set statements and then
takes the action specified for the rule. If no match is found in the route map the default
action is deny. If no match statements are defined in a rule, the default action is to
match everything. If multiple match statements are defined in a rule, all the match
statements must match before the set statements can be used.
For a route map to take effect it must be called by another FortiGate routing feature
such as RIP.
Figure 78: Route map list
Create New
Name
Action
Route-map rules
New Route-map
Figure 79: Route map name configuration
168
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Router
Route-map entry
The route map name and the ID number of this route map entry.
Action
Select Permit to permit routes that match this entry. Select Deny to deny
routes that match this entry.
Match:
Interface
Address
Next-hop
Match a route that has a next hop router address included in the selected
access list or prefix list.
Metric
Match a route with the specified metric. The metric can be a number from
1 to 16.
Route Type
Tag
Set:
Next-hop
Metric
Metric Type
Tag
Select the Add route-map entry icon to add a new route map entry or select the edit
icon beside an existing route map entry to edit that entry.
Select Permit or Deny for the Action to take for this route map entry.
01-28008-0003-20050204
169
Router
Select OK.
Create New
Key-chain
Accept Lifetime
Send Lifetime
Start End
The start and end times for the accept and send lifetimes.
170
01-28008-0003-20050204
Fortinet Inc.
Router
Select OK.
Key-chain entry
The key chain name and the ID number for this key chain entry.
Key
Accept Lifetime
Set the time period during which the key can be received.
Send Lifetime
Set the time period during which the key can be sent.
Start
For both accept and send lifetimes, set the start time and date for this
entry in the key chain.
End
For both accept and send lifetimes, set the end time. The end time can be
a specified date and time, a duration in seconds (1 to 2147483646), or
infinite for a key that never expires.
Select the Add key-chain entry icon to add a new key chain entry or select the Edit
icon beside an existing key chain entry to edit that entry.
Enter a key.
Under Accept Lifetime, select the required hour, minute, second, year, month and day
to start using this key for received routing updates.
01-28008-0003-20050204
171
Router
If you selected Duration, enter the time in seconds that this key should be active.
If you selected End time, select the required hour, minute, second, year, month
and day to stop using this key for received routing updates.
Under Send Lifetime, select the required hour, minute, second, year, month and day
to start using this key for sending routing updates.
If you selected Duration, enter the time in seconds that this key should be active.
If you selected End time, select the required hour, minute, second, year, month
and day to stop using this key for sending routing updates.
Select OK.
Monitor
Display the FortiGate routing table.
Type
Network
Gateway
Apply Filter
Type
The type of route. Type refers to how the FortiGate unit learned the route.
Subtype
Network
Distance
Metric
Gateway
Interface
Up Time
172
Select a type of route to display or select all to display routes of all types.
For example, select Connected to display all the directly connected routes, or select
RIP to display all the routes learned from RIP.
01-28008-0003-20050204
Fortinet Inc.
Router
CLI configuration
This guide only covers Command Line Interface (CLI) commands, keywords, or
variables (in bold) that are not represented in the web-based manager. For complete
descriptions and examples of how to use CLI commands see the FortiGate CLI
Reference Guide.
Command syntax
get router info ospf <keyword>
Description
Show OSPF routing table entries that have an Area
Border Router (ABR) or Autonomous System
Boundary Router (ASBR) as a destination.
Show the entries in the OSPF routing database.
Show the status of the FortiGate interfaces and
whether OSPF is enabled for each interface.
Show information about OSPF neighbors.
Show the OSPF routing table.
Show the status of the OSPF process.
Show information about OSPF virtual links.
Availability
All models.
All models.
All models.
All models.
All models.
All models.
All models.
Examples
get router info ospf database
get router info ospf interface
Command syntax
get router info protocols
01-28008-0003-20050204
173
Router
Command syntax
get router info rip <keyword>
Description
Show the entries in the RIP routing database.
Show the status of the FortiGate interfaces and
whether RIP is enabled for each interface.
Availability
All models.
All models.
Examples
get router info rip database
get router info rip interface
174
01-28008-0003-20050204
Fortinet Inc.
Router
config summary-address
Note: In the following table, only the router-id keyword is required. All other keywords are
optional.
database-overflow
{disable | enable}
database-overflowmax-lsas
<lsas_integer>
database-overflowtime-to-recover
<seconds_integer>
defaultinformation-metric
<metric_integer>
defaultinformationmetric-type {1 | 2}
defaultinformationoriginate {always
| disable |
enable}
defaultinformation-routemap <name_str>
Description
Default
Availability
cisco
All models.
disable
All models.
10000
All models.
300
All models.
10
All models.
All models.
disable
All models.
01-28008-0003-20050204
All models.
175
Router
Description
Default
Availability
10
All models.
110
All models.
No
default.
All models.
disable
All models.
0.0.0.0
All models.
5 10
All models.
Example
This example shows how to set the OSPF router ID to 1.1.1.1:
config router ospf
set router-id 1.1.1.1
end
176
01-28008-0003-20050204
Fortinet Inc.
Router
config area
Access the config area subcommand using the config router ospf
command. Use this command to set OSPF area related parameters.
Routers in an OSPF autonomous system (AS) or routing domain are organized into
logical groupings called areas. Areas are linked together by area border routers
(ABRs). There must be a backbone area that all areas can connect to. You can use a
virtual link to connect areas that do not have a physical connection to the backbone.
Routers within an OSPF area maintain link state databases for their own areas.
config area
edit <id_ipv4>
set <keyword> <variable>
end
config area
edit <id_ipv4>
unset <keyword> <variable>
end
config area
delete <id_ipv4>
end
config area
edit <id_ipv4>
get
end
config area
edit <id_ipv4>
show
end
The config area command has 3 subcommands.
config filter-list
config range
config virtual-link
01-28008-0003-20050204
177
Router
178
01-28008-0003-20050204
Default
Availability
none
All models.
10
All models.
disable
All models.
10
All models.
All models.
enable
All models.
Fortinet Inc.
Router
shortcut {default
| disable |
enable}
stub-type
{no-summary |
summary}
type
{nssa | regular |
stub}
Description
Default
Availability
All models.
All models.
Example
This example shows how to configure a stub area with the id 15.1.1.1, a stub type of
summary, a default cost of 20, and MD5 authentication.
config router ospf
config area
edit 15.1.1.1
set type stub
set stub-type summary
set default-cost 20
set authentication md5
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
01-28008-0003-20050204
179
Router
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
config filter-list
Access the config filter-list subcommand using the config area
subcommand.
Use filter lists to control the import and export of LSAs into and out of an area. You can
use access or prefix lists for OSPF area filter lists. For more information, see Access
list on page 164 and Prefix list on page 166.
180
Description
Default Availability
01-28008-0003-20050204
All models.
All models.
Fortinet Inc.
Router
Example
This example shows how to use an access list named acc_list1 to filter packets
entering area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
config filter-list
edit 1
set direction in
set list acc_list1
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
config range
Access the config range subcommand using the config area command.
Use the area range command to summarize routes at an area boundary. If the
network numbers in an area are contiguous, the ABR advertises a summary route that
includes all the networks within the area that are within the specified range.
01-28008-0003-20050204
181
Router
config range
edit <id_integer>
get
end
config range
edit <id_integer>
show
end
Note: Only the prefix keyword is required. All other keywords are optional.
Description
Default
Availability
All models.
Example
This example shows how to set the prefix for range 1 of area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
config range
edit 1
set prefix 1.1.0.0 255.255.0.0
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
182
01-28008-0003-20050204
Fortinet Inc.
Router
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
config virtual-link
Access the config virtual-link subcommand using the config area
command.
Use virtual links to connect an area to the backbone when the area has no direct
connection to the backbone. A virtual link allows traffic from the area to transit a
directly connected area to reach the backbone. The transit area cannot be a stub
area. Virtual links can only be set up between two area border routers (ABRs).
01-28008-0003-20050204
183
Router
Description
184
01-28008-0003-20050204
Default
Availability
none
All models.
No
default.
All models.
authentication
must be set to
text.
40
All models.
10
All models.
No
default.
All models.
authentication
must be set to md5.
Fortinet Inc.
Router
transmit-delay
<seconds_integer>
Description
Default
Availability
Example
This example shows how to configure a virtual link.
config router ospf
config area
edit 15.1.1.1
config virtual-link
edit vlnk1
set peer 1.1.1.1
end
end
This example shows how to display the settings for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
get
end
This example shows how to display the configuration for area 15.1.1.1.
config router ospf
config area
edit 15.1.1.1
show
end
01-28008-0003-20050204
185
Router
config distribute-list
Access the config distribute-list subcommand using the config router
ospf command.
Use this command to use an access list to filter the networks in routing updates.
Routes not matched by any of the distribute lists will not be advertised.
You must configure the access list that you want the distribute list to use before you
configure the distribute list. For more information on configuring access lists, see
Access list on page 164.
186
Description
Default
Availability
null
All models.
01-28008-0003-20050204
All models.
Fortinet Inc.
Router
Example
This example shows how to configure a distribute list numbered 2 to use an access
list named acc_list1 for all static routes.
config router ospf
config distribute-list
edit 2
set access-list acc_list1
set protocol static
end
end
This example shows how to display the settings for distribute list 2.
config router ospf
config distribute-list
edit 2
get
end
This example shows how to display the configuration for distribute list 2.
config router ospf
config distribute-list
edit 2
show
end
config neighbor
Access the config neighbor subcommand using the config router ospf
command.
Use this command to manually configure an OSPF neighbor on nonbroadcast
networks. OSPF packets are unicast to the specified neighbor address. You can
configure multiple neighbors.
01-28008-0003-20050204
187
Router
config neighbor
edit <id_integer>
get
end
config neighbor
edit <id_integer>
show
end
Note: Only the ip keyword is required. All other keywords are optional.
Description
Default
Availability
10
All models.
All models.
Example
This example shows how to manually add a neighbor.
config router ospf
config neighbor
edit 1
set ip 192.168.21.63
end
end
This example shows how to display the settings for neighbor 1.
config router ospf
config neighbor
edit 1
get
end
188
01-28008-0003-20050204
Fortinet Inc.
Router
config network
Access the config network subcommand using the config router ospf
command.
Use this command to identify the interfaces to include in the specified OSPF area. The
prefix keyword can define one or multiple interfaces.
Description
Default
Availability
0.0.0.0
All models.
0.0.0.0
0.0.0.0
All models.
01-28008-0003-20050204
189
Router
Example
Use the following command to enable OSPF for the interfaces attached to networks
specified by the IP address 10.0.0.0 and the netmask 255.255.255.0 and to add these
interfaces to area 10.1.1.1.
config router ospf
config network
edit 2
set area 10.1.1.1
set prefix 10.0.0.0 255.255.255.0
end
end
This example shows how to display the settings for network 2.
config router ospf
config network
edit 2
get
end
This example shows how to display the configuration for network 2.
config router ospf
config network
edit 2
show
end
config ospf-interface
Access the config ospf-interface subcommand using the config router
ospf command.
Use this command to change interface related OSPF settings.
config ospf-interface
edit <interface-name_str>
set <keyword> <variable>
end
config ospf-interface
edit <interface-name_str>
unset <keyword>
end
190
01-28008-0003-20050204
Fortinet Inc.
Router
config ospf-interface
delete <interface-name_str>
end
config ospf-interface
edit <interface-name_str>
get
end
config ospf-interface
edit <interface-name_str>
show
end
Note: The interface and ip keywords are required. All other keywords are optional.
authentication-key
<password_str>
Description
Default
Use the authentication
none
keyword to define the
authentication used for OSPF
packets sent and received by
this interface. If you select
none, no authentication is
used. If you select text, the
authentication key is sent as
plain text. If you select md5,
the authentication key is used
to generate an MD5 hash.
Both text mode and MD5
mode only guarantee the
authenticity of the update
packet, not the confidentiality
of the routing information in the
packet.
In text mode the key is sent in
clear text over the network.
Text mode is usually used only
to prevent network problems
that can occur if an unwanted
or misconfigured router is
mistakenly added to the
network.
If you configure authentication
for the interface, authentication
for areas is not used.
All routers on the network must
use the same authentication
type.
Enter the password to use for No default.
text authentication.
The authentication-key
must be the same on all
neighboring routers.
The maximum length for the
authentication-key is 15
characters.
01-28008-0003-20050204
Availability
All models.
All models.
authentication
must be set to
text.
191
Router
Description
Default
Specify the cost (metric) of the 10
link. The cost is used for
shortest path first calculations.
Enable or disable flooding
disable
LSAs out of this interface.
192
01-28008-0003-20050204
Availability
All models.
All models.
40
All models.
10
All models.
null
All models.
0.0.0.0
All models.
1500
All models.
Fortinet Inc.
Router
network-type
{broadcast | nonbroadcast
| point-tomultipoint
| point-to-point}
priority
<priority_integer>
retransmit-interval
<seconds_integer>
Description
Use this command to control
the way OSPF behaves when
the MTU in the sent and
received database description
packets does not match.
When mtu-ignore is
enabled, OSPF will stop
detecting mismatched MTUs
and go ahead and form an
adjacency.
When mtu-ignore is
disabled, OSPF will detect
mismatched MTUs and not
form an adjacency.
mtu-ignore should only be
enabled if it is not possible to
reconfigure the MTUs so that
they match.
Specify the type of network to
which the interface is
connected.
OSPF supports four different
types of network. This
command specifies the
behavior of the OSPF interface
according to the network type.
If you specify the nonbroadcast keyword, you
must also configure neighbors
using config neighbor on
page 187.
Set the router priority for this
interface.
Router priority is used during
the election of a designated
router (DR) and backup
designated router (BDR).
An interface with router priority
set to 0 can not be elected DR
or BDR. The interface with the
highest router priority wins the
election. If there is a tie for
router priority, router ID is
used.
Point-to-point networks do not
elect a DR or BDR; therefore,
this setting has no effect on a
point-to-point network.
The valid range for
priority_integer is 0 to
255.
The time, in seconds, to wait
before sending a LSA
retransmission. The value for
the retransmit interval must be
greater than the expected
round-trip delay for a packet.
The valid range for
seconds_integer is 1 to
65535.
01-28008-0003-20050204
Default
disable
Availability
All models.
All models.
All models.
193
Router
Description
Enable or disable OSPF on
this interface.
Default
enable
Availability
All models.
All models.
Example
This example shows how to assign an OSPF interface configuration named test to
the interface named internal and how to configure text authentication for this
interface.
config router ospf
config ospf-interface
edit test
set interface internal
set ip 192.168.20.3
set authentication text
set authentication-key a2b3c4d5e
end
end
This example shows how to display the settings for the OSPF interface configuration
named test.
config router ospf
config ospf-interface
edit test
get
end
This example shows how to display the configuration for the OSPF interface
configuration named test.
config router ospf
config ospf-interface
edit test
show
end
194
01-28008-0003-20050204
Fortinet Inc.
Router
config redistribute
Access the config redistribute subcommand using the config router
ospf command.
Use the config redistribute command to advertise routes learned from RIP,
static routes, or a direct connection to the destination network.
Default
10
Availability
All models.
All models.
null
All models.
All models.
Example
This example shows how to enable route redistribution from RIP, using a metric of 3
and a route map named rtmp2.
config router ospf
config redistribute rip
set metric 3
set routemap rtmp2
set status enable
end
end
This example shows how to display the OSPF settings.
get router ospf
01-28008-0003-20050204
195
Router
config summary-address
Access the config summary-address subcommand using the config router
ospf command.
Use this command to summarize external routes for redistribution into OSPF. This
command works only for summarizing external routes on an Autonomous System
Boundary Router (ASBR). For information on summarization between areas, see
config range on page 181. By replacing the LSAs for each route with one aggregate
route, you reduce the size of the OSPF link-state database.
196
Description
Default
Availability
All models.
Enter the prefix (IP address and netmask) 0.0.0.0 All models.
to use for the summary route. The prefix 0.0.0.0
0.0.0.0 0.0.0.0 is not allowed.
Specify a tag for the summary route.
0
All models.
The valid range for tag_integer is 0 to
4294967295.
01-28008-0003-20050204
Fortinet Inc.
Router
Example
This example shows how to summarize routes using the prefix 10.0.0.0 255.0.0.0.
config router ospf
config summary-address
edit 5
set prefix 10.0.0.0 255.0.0.0
end
end
This example shows how to display the OSPF settings.
get router ospf
This example shows how to display the OSPF configuration.
show router ospf
01-28008-0003-20050204
197
Router
Default Availability
All models.
null
NAT/Route
mode only.
::/0
All models.
NAT/Route
mode only.
::
All models.
NAT/Route
mode only.
Example
This example shows how to add an IPV6 static route that has the sequence number 2.
config router static6
edit 2
set dev internal
set dst 12AB:0:0:CD30::/60
set gateway 12AB:0:0:CD30:123:4567:89AB:CDEF
end
This example shows how to display the list of IPV6 static route numbers.
get router static6
This example shows how to display the settings for IPV6 static route 2.
get router static6 2
This example shows how to display the IPV6 static route configuration.
show router static6
This example shows how to display the configuration for IPV6 static route 2.
show router static6 2
198
01-28008-0003-20050204
Fortinet Inc.
Firewall
Firewall policies control all traffic passing through the FortiGate unit. Firewall policies
are instructions that the FortiGate unit uses to decide what to do with a connection
request. When the firewall receives a connection request in the form of a packet, it
analyzes the packet to extract its source address, destination address, and service
(by port number).
For the packet to be connected through the FortiGate unit, the source address,
destination address, and service of the packet must match a firewall policy. The policy
directs the firewall action on the packet. The action can be to allow the connection,
deny the connection, require authentication before the connection is allowed, or
process the packet as an IPSec VPN packet.
Each policy can be individually configured to route connections or apply network
address translation (NAT) to translate source and destination IP addresses and ports.
You can add IP pools to use dynamic NAT when the firewall translates source
addresses. You can use policies to configure port address translation (PAT) through
the FortiGate.
You can add protection profiles to firewall policies to apply different protection settings
for traffic that is controlled by firewall policies. You can use protection profiles to:
Configure antivirus protection for HTTP, FTP, IMAP, POP3, and SMTP policies
You can also enable traffic logging for a firewall policy so that the FortiGate unit logs
all connections that use this policy.
This chapter describes:
Policy
Address
Service
Schedule
Virtual IP
IP pool
Protection profile
01-28008-0003-20050204
199
Firewall
Policy
Go to Firewall > Policy to add firewall policies to control connections and traffic
between FortiGate interfaces, zones, and VLAN subinterfaces.
The firewall matches policies by searching for a match starting at the top of the policy
list and moving down until it finds the first match. You must arrange policies in the
policy list from more specific to more general. For example, the default policy is a very
general policy because it matches all connection attempts. When you create
exceptions to that policy, you must add them to the policy list above the default policy.
No policy below the default policy will ever be matched.
This section describes:
Policy list
Policy options
200
01-28008-0003-20050204
Fortinet Inc.
Firewall
Policy list
Policy list
You can add, delete, edit, re-order, enable, and disable policies in the policy list.
Figure 85: Sample policy list
ID
The policy identifier. Policies are numbered in the order they are
added to the policy list.
Source
Dest
Schedule
The schedule that controls when the policy should be active. See
Schedule on page 221.
Service
Action
Enable
source -> destination (n) Policy list headings indicating the traffic to which the policy
applies. The list heading is in the format Source -> Destination (n)
where n is the number of policies in the list.
Insert Policy before
Add a new policy above the corresponding policy (the New Policy
screen appears).
Move to
Policy options
Policy options are configurable when creating or editing a firewall policy.
01-28008-0003-20050204
201
Policy options
Firewall
Interface / Zone
Select the source and destination interface or zone for the firewall policy. Interfaces
and zones are listed and configured in System > Network. See Interface on page 55
for information about interfaces. See Zone on page 66 for information about zones.
Source
Select the name of the source interface or zone for the policy. The source
interface or zone receives the packets to be matched by the policy.
Destination
Select the name of the destination interface or zone for the policy. Packets
matched by the policy exit the FortiGate unit from the destination interface
or zone.
Address Name
Select the source and destination firewall addresses for the firewall policy. Before
adding addresses to a policy, you must add them to the FortiGate firewall
configuration. To add firewall addresses, see Address on page 209.
Source
Select the name of a firewall address or address group that matches the
source address of the packets to be matched with this policy.
Destination
Select the name of a firewall address or address group that matches the
destination address of the packets to be matched with this policy.
For NAT/Route mode policies where the address on the destination network is hidden
from the source network using NAT, the destination can also be a virtual IP that maps
the destination address of the packet to a hidden destination address. See Virtual IP
on page 225.
Schedule
Select a schedule that controls when the policy is available to be matched with
connections. See Schedule on page 221.
202
01-28008-0003-20050204
Fortinet Inc.
Firewall
Policy options
Service
Select the name of a service or service group that matches the service or protocol of
the packets to be matched with this policy. You can select from a wide range of
predefined services or add custom services and service groups. See Service on
page 213.
Action
Select how you want the firewall to respond when the policy matches a connection
attempt.
ACCEPT
Accept connections matched by the policy. You can also configure NAT,
protection profiles, log traffic, traffic shaping, authentication, and differentiated
services. You can also add a comment to the policy.
DENY
Select deny to reject connections matched by the policy. The only other policy
options that you can configure are log traffic (to log the connections denied by
this policy) and differentiated services. You can also add a comment to the
policy.
ENCRYPT
Select encrypt to make this policy an IPSec VPN policy. An IPSec VPN policy
causes the FortiGate unit to accept IPSec packets. When encrypt is selected
the VPN Tunnel Options appear. You can also configure protection profiles, log
traffic, traffic shaping, and differentiated services. You can also add a comment
to the policy. You cannot configure NAT or add authentication to an encrypt
policy. For more information, see Adding firewall policies for IPSec VPN
tunnels on page 277.
VPN Tunnel
Select a VPN tunnel for an ENCRYPT policy. You can select an AutoIKE key or
Manual Key tunnel.
Allow Inbound
Select Allow inbound so that traffic from the remote network or host can start
the IPSec VPN tunnel.
Allow outbound Select Allow outbound if traffic from the local network can start the tunnel.
Inbound NAT
Outbound NAT Select Outbound NAT to translate the source address of outgoing packets to
the FortiGate external IP address.
NAT
Select NAT to enable Network Address Translation for the policy. NAT translates the
source address and port of packets accepted by the policy. If you select NAT, you can
also select Dynamic IP Pool and Fixed Port. NAT is not available in Transparent
mode.
01-28008-0003-20050204
203
Firewall
Dynamic IP Pool Select Dynamic IP Pool to translate the source address to an address
randomly selected from an IP Pool. An IP Pool can be a single IP address or
an IP address range. An IP pool list appears if IP Pool addresses have been
added to the destination interface or zone.
Select ANY IP Pool to cause the FortiGate unit to select any IP address in
any IP Pool added to the destination interface or zone.
Select the name of an IP Pool added to the destination interface or zone
cause the FortiGate unit to translate the source address to one of the
addresses defined by this IP Pool.
You cannot select Dynamic IP Pool if the destination interface, VLAN
subinterface or if one of the interfaces or VLAN subinterfaces in the
destination zone is configured using DHCP or PPPoE.
For information about adding IP Pools, see IP pool on page 229.
Fixed Port
Select Fixed Port to prevent NAT from translating the source port.
Some applications do not function correctly if the source port is changed. In
most cases, if you select Fixed Port, you would also select Dynamic IP pool.
If you do not select Dynamic IP pool, a policy with Fixed Port selected can
only allow one connection at a time.
Protection Profile
Select a protection profile to configure how antivirus, web filtering, web category
filtering, spam filtering, IPS, and content archiving are applied to a firewall policy. For
information about adding and configuring Protection profiles, see Protection profile
on page 232.
If you are configuring authentication in the advanced settings, you do not need to
choose a protection profile since the user group chosen for authentication are already
tied to protection profiles. For more information about adding authentication to firewall
policies, see Authentication on page 205.
Log Traffic
Select Log Traffic to record messages to the traffic log whenever the policy processes
a connection. You must also enable traffic log for a logging location (syslog,
WebTrends, local disk if available, memory, or FortiLog) and set the logging severity
level to Notification or lower. For information about logging see Log & Report on
page 351.
Advanced
Select advanced to show advanced policy options.
204
01-28008-0003-20050204
Fortinet Inc.
Firewall
Authentication
You must add users and a firewall protection profile to a user group before you can
select Authentication. For information about adding and configuring user groups, see
User group on page 249.
Select Authentication and select one or more user groups to require users to enter a
user name and password before the firewall accepts the connection.
Figure 89: Selecting user groups for authentication
You can select Authentication for any service. Users can authenticate with the firewall
using HTTP, Telnet, or FTP. For users to be able to authenticate you must add an
HTTP, Telnet, or FTP policy that is configured for authentication. When users attempt
to connect through the firewall using this policy they are prompted to enter a firewall
username and password.
If you want users to authenticate to use other services (for example POP3 or IMAP)
you can create a service group that includes the services for which you want to
require authentication, as well as HTTP, Telnet, and FTP. Then users could
authenticate with the policy using HTTP, Telnet, or FTP before using the other
service.
01-28008-0003-20050204
205
Firewall
In most cases you should make sure that users can use DNS through the firewall
without authentication. If DNS is not available users cannot connect to a web, FTP, or
Telnet server using a domain name.
Note: Policies that require authentication must be added to the policy list above matching
policies that do not; otherwise, the policy that does not require authentication is selected first.
Traffic Shaping
Traffic Shaping controls the bandwidth available to and sets the priority of the traffic
processed by the policy. Traffic Shaping makes it possible to control which policies
have the highest priority when large amounts of data are moving through the
FortiGate device. For example, the policy for the corporate web server might be given
higher priority than the policies for most employees computers. An employee who
needs unusually high-speed Internet access could have a special outgoing policy set
up with higher bandwidth.
If you set both guaranteed bandwidth and maximum bandwidth to 0 (zero), the policy
does not allow any traffic.
Guaranteed
Bandwidth
Maximum
Bandwidth
Traffic Priority
You can use traffic shaping to guarantee the amount of bandwidth available
through the firewall for a policy. Guarantee bandwidth (in Kbytes) to make
sure that there is enough bandwidth available for a high-priority service.
You can also use traffic shaping to limit the amount of bandwidth available
through the firewall for a policy. Limit bandwidth to keep less important
services from using bandwidth needed for more important services.
Select High, Medium, or Low. Select Traffic Priority so that the FortiGate unit
manages the relative priorities of different types of traffic. For example, a
policy for connecting to a secure web server needed to support e-commerce
traffic should be assigned a high traffic priority. Less important services
should be assigned a low priority. The firewall provides bandwidth to lowpriority connections only when bandwidth is not needed for high-priority
connections.
Differentiated Services
Differentiated Services describes a set of end-to-end Quality of Service (QoS)
capabilities. End-to-end QoS is the ability of a network to deliver service required by
specific network traffic from one end of the network to another. By configuring
differentiated services you configure your network to deliver particular levels of service
for different packets based on the QoS specified by each packet.
Differentiated Services (also called DiffServ) is defined by RFC 2474 and 2475 as
enhancements to IP networking to enable scalable service discrimination in the IP
network without the need for per-flow state and signalling at every hop. Routers that
can understand differentiated services sort IP traffic into classes by inspecting the DS
field in IPv4 header or the Traffic Class field in the IPv6 header.
You can use the FortiGate Differentiated Services feature to change the DSCP
(Differentiated Services Code Point) value for all packets accepted by a policy. The
network uses these DSCP values to classify, mark, shape, and police traffic, and to
perform intelligent queuing. DSCP features are applied to traffic by configuring the
routers on your network to apply different service levels to packets depending on the
DSCP value of the packet.
206
01-28008-0003-20050204
Fortinet Inc.
Firewall
You can configure policies to apply DSCP values for both original (or forward) traffic
and reverse (or reply) traffic. These values are optional and may be enabled
independently from each other. When both are disabled, no changes to the DS field
are made.
Original
(forward) DSCP
value
Reverse (reply)
DSCP value
Set the DSCP value for packets accepted by the policy. For example, for an
Internal->External policy the value is applied to outgoing packets as they
exit the external interface and are forwarded to their destination.
Set the DSCP value for reply packets. For example, for an
Internal->External policy the value is applied to incoming reply packets
before they exit the internal interface and returned to the originator.
Comments
You can add a description or other information about the policy. The comment can be
up to 63 characters long, including spaces.
Arrange policies in the policy list so that they have the results that you expect.
For information about arranging policies in a policy list, see How policy matching
works on page 200.
To delete a policy
Select the Delete icon beside the policy you want to delete.
Select OK.
To edit a policy
Select the Edit icon beside the policy you want to edit.
Select OK.
01-28008-0003-20050204
207
Firewall
Select the Move To icon beside the policy you want to move.
Select OK.
To disable a policy
Disable a policy to temporarily prevent the firewall from selecting the policy. Disabling
a policy does not stop active communications sessions that have been allowed by the
policy.
Clear the Enable check box beside the policy you want to disable.
To enable a policy
Select Enable.
208
01-28008-0003-20050204
Fortinet Inc.
Firewall
Availability
All models.
Address
You can add, edit, and delete firewall addresses as required. You can also organize
related addresses into address groups to simplify policy creation.
A firewall address can be configured with a name, an IP address, and a netmask, or a
name and IP address range.
You can enter an IP address and netmask using the following formats.
01-28008-0003-20050204
209
Address list
Firewall
Address list
Address options
Configuring addresses
Address list
You can add addresses to the list and edit existing addresses. The FortiGate unit
comes configured with the default All address which represents any IP address on
the network.
Figure 90: Sample address list
Name
Address
Address options
Add an address representing an IP address and subnet mask or an IP address range.
Figure 91: Address options
Type
Select the type of address. Each type reveals the corresponding fields to
configure.
IP Range/Subnet Enter the firewall IP address, forward slash, and subnet mask or enter an IP
address range separated by a hyphen
210
01-28008-0003-20050204
Fortinet Inc.
Firewall
Configuring addresses
The netmask corresponds to the type of address that you are adding. For example:
Note: IP address: 0.0.0.0 and Netmask: 255.255.255.255 is not a valid firewall address.
Configuring addresses
To add an address
1
Select OK.
To edit an address
Edit an address to change its IP information. You cannot edit the address name.
Select the Edit icon beside the address you want to edit.
Select OK.
01-28008-0003-20050204
211
Firewall
To delete an address
Deleting an address removes it from the address list. To delete an address that has
been added to a policy, you must first remove the address from the policy.
1
Select the Delete icon beside the address you want to delete.
You cannot delete default addresses.
Select OK.
The address group list has the following icons and features.
Create New
Group Name
Members
212
01-28008-0003-20050204
Fortinet Inc.
Firewall
Enter a name to identify the address group. Addresses, address groups, and
virtual IPs must all have unique names to avoid confusion in firewall policies.
Available
Addresses
The list of configured and default firewall addresses. Use the arrows to move
addresses between the lists.
Members
The list of addresses in the group. Use the arrows to move addresses
between the lists.
Select an address from the Available Addresses list and select the right arrow to move
the address into the group.
Select OK.
To delete an address group
If an address group is included in a policy, it cannot be deleted unless it is first
removed from the policy.
Select the Delete icon beside the address group you want to delete.
Select OK.
To edit an address group
Select the Edit icon beside the address group you want to modify.
Select OK.
Service
Use services to determine the types of communication accepted or denied by the
firewall. You can add any of the predefined services to a policy. You can also create
custom services and add services to service groups.
01-28008-0003-20050204
213
Firewall
The predefined services list has the following icons and features.
Name
Detail
Table 24 lists the FortiGate predefined firewall services. You can add these services to
any policy.
Table 24: FortiGate predefined services
214
Service name
Description
ANY
all
GRE
47
AH
51
01-28008-0003-20050204
Protocol
Port
Fortinet Inc.
Firewall
Description
ESP
AOL
tcp
5190-5194
BGP
tcp
179
DHCP
67
DNS
tcp
53
udp
53
FINGER
tcp
79
FTP
tcp
21
GOPHER
tcp
70
H323
tcp
1720, 1503
HTTP
tcp
80
HTTPS
443
IKE
udp
500
IMAP
tcp
143
389
IRC
6660-6669
L2TP
1701
LDAP
389
NetMeeting
1720
NFS
01-28008-0003-20050204
Protocol
Port
50
tcp
tcp
111, 2049
215
Firewall
Table 24: FortiGate predefined services (Continued)
Service name
Description
Protocol
Port
NNTP
tcp
119
NTP
tcp
123
OSPF
PC-Anywhere
ICMP_ANY
PING
TIMESTAMP
udp
5632
icmp
icmp
13
icmp
15
icmp
17
POP3
tcp
110
PPTP
tcp
1723
QUAKE
udp
26000,
27000,
27910,
27960
RAUDIO
udp
7070
RLOGIN
tcp
513
RIP
udp
520
SIPMSNmessenger
SMTP
25
SNMP
tcp
161-162
udp
161-162
tcp
22
udp
22
SYSLOG
udp
514
TALK
517-518
TCP
0-65535
SSH
216
89
01-28008-0003-20050204
tcp
Fortinet Inc.
Firewall
Description
Protocol
Port
TELNET
tcp
23
TFTP
udp
69
UDP
udp
0-65535
UUCP
540
VDOLIVE
tcp
7000-7010
WAIS
tcp
210
WINFRAME
tcp
1494
X-WINDOWS
tcp
6000-6063
The custom services list has the following icons and features.
Create New
Service Name
Detail
01-28008-0003-20050204
217
Firewall
Name
Protocol Type
Select the protocol type of the service you are adding: TCP or UDP. TCP
and UDP options are the same.
Source Port
Specify the Source Port number range for the service by entering the low
and high port numbers. If the service uses one port number, enter this
number in both the low and high fields.
Destination Port Specify the Destination Port number range for the service by entering the
low and high port numbers. If the service uses one port number, enter this
number in both the low and high fields.
Name
Protocol Type
Select the protocol type of the service you are adding (ICMP).
Type
Code
218
01-28008-0003-20050204
Fortinet Inc.
Firewall
Name
Protocol Type
Select the protocol type of the service you are adding: IP.
Specify Source and Destination Port number ranges for the service by entering the
low and high port numbers. If the service uses one port number, enter this number in
both the low and high fields.
Select OK.
You can now add this custom service to a policy.
To add a custom ICMP service
Enter the ICMP type number and code number for the service.
Select OK.
You can now add this custom service to a policy.
To add a custom IP service
Select OK.
You can now add this custom service to a policy.
To delete a custom service
Select the Delete icon beside the service you want to delete.
Select OK.
01-28008-0003-20050204
219
Firewall
Select the Edit icon beside the service you want to edit.
Select OK.
The service group list has the following icons and features.
Create New
Group Name
Members
220
01-28008-0003-20050204
Fortinet Inc.
Firewall
Available
Services
The list of configured and predefined services. Use the arrows to move
services between the lists.
Members
The list of services in the group. Use the arrows to move services between
the lists.
Select a service from the Available Services list and select the right arrow to move the
service into the group.
Select OK.
To delete a service group
If a service group is included in a policy, it cannot be deleted unless it is first removed
from the policy.
Select the Delete icon beside the service group you want to delete.
Select OK.
To edit a service group
Select the Edit icon beside the service group you want to modify.
Select OK.
Schedule
Use schedules to control when policies are active or inactive. You can create one-time
schedules and recurring schedules.
You can use one-time schedules to create policies that are effective once for the
period of time specified in the schedule. Recurring schedules repeat weekly. You can
use recurring schedules to create policies that are effective only at specified times of
the day or on specified days of the week.
01-28008-0003-20050204
221
Firewall
The one-time schedule list has the following icons and features.
Create New
Name
Start
Stop
222
Name
Start
Stop
01-28008-0003-20050204
Fortinet Inc.
Firewall
Select OK.
To delete a one-time schedule
Select the Delete icon beside the one-time schedule you want to delete.
Select OK.
To edit a one-time schedule
Select the Edit icon beside the one-time schedule you want to modify.
01-28008-0003-20050204
223
Firewall
The recurring schedule list has the following icons and features.
Create New
Name
Day
The initials of the days of the week on which the schedule is active.
Start
Stop
Select
Select the days of the week that you want the schedule to be active.
Start
Stop
Select the days of the week that you want the schedule to be active.
Set the Start and Stop time for the recurring schedule.
Recurring schedules use a 24-hour clock.
Select OK.
To delete a recurring schedule
224
Select the Delete icon beside the recurring schedule you want to delete.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Firewall
Select the Edit icon beside the recurring schedule you want to modify.
Select OK.
Virtual IP
Use virtual IPs to access IP addresses on a destination network that are hidden from
the source network by NAT security policies. To allow connections between these
networks, you must create a mapping between an address on the source network and
the real address on the destination network. This mapping is called a virtual IP.
For example, if the computer hosting your web server is located on your DMZ
network, it could have a private IP address such as 10.10.10.3. To get packets from
the Internet to the web server, you must have an external address for the web server
on the Internet. You must then add a virtual IP to the firewall that maps the external IP
address of the web server to the actual address of the web server on the DMZ
network. To allow connections from the Internet to the web server, you must then add
an External->DMZ firewall policy and set Destination to the virtual IP.
You can create three types of virtual IPs:
Static NAT
Port Forwarding
Dynamic port
forwarding
Virtual IP list
Virtual IP options
01-28008-0003-20050204
225
Virtual IP list
Firewall
Virtual IP list
Figure 105:Sample virtual IP list
Name
IP
Service Port
Map to IP
Map to Port
The port number added to packets when they are forwarded (not required).
Virtual IP options
Different options appear depending on the type of virtual IP you want to define.
Choose from Static NAT or port forwarding.
Figure 106:Virtual IP options; static NAT
226
01-28008-0003-20050204
Fortinet Inc.
Firewall
Enter the name to identify the virtual IP. Addresses, address groups, and
virtual IPs must all have unique names to avoid confusion in firewall
policies.
External Interface Select the virtual IP external interface from the list.
Type
External IP
Address
Enter the external IP address that you want to map to an address on the
destination network. To configure dynamic port forwarding, set the external
IP address to 0.0.0.0.
External Service
Port
Enter the external service port number that you want to configure port
forwarding for. (Port forwarding only.)
Map to IP
Map to Port
Enter the port number to be added to packets when they are forwarded.
(Port forwarding only.)
Protocol
Select the protocol (TCP or UDP) that you want the forwarded packets to
use. (Port forwarding only.)
Enter the External IP Address that you want to map to an address on the destination
network.
For example, if the virtual IP provides access from the Internet to a web server on a
destination network, the external IP address must be a static IP address obtained
from your ISP for your web server. This address must be a unique address that is not
used by another host and cannot be the same as the IP address of the external
interface selected in step 4. However, the external IP address must be routed to the
selected interface. The virtual IP address and the external IP address can be on
different subnets.
Enter the Map to IP address to which to map the external IP address. For example,
the IP address of a web server on an internal network.
Note: The firewall translates the source address of outbound packets from the host with the
Map to IP address to the virtual IP External IP Address, instead of the firewall external address.
Select OK.
01-28008-0003-20050204
227
Firewall
external
Enter the External IP Address that you want to map to an address on the destination
interface.
You can set the external IP address to the IP address of the external interface
selected in step 4 or to any other address.
For example, if the virtual IP provides access from the Internet to a server on your
internal network, the external IP address must be a static IP address obtained from
your ISP for this server. This address must be a unique address that is not used by
another host. However, this address must be routed to the external interface selected
in step 4. The virtual IP address and the external IP address can be on different
subnets.
Enter the External Service Port number for which you want to configure port
forwarding.
The external service port number must match the destination port of the packets to be
forwarded. For example, if the virtual IP provides access from the Internet to a web
server, the external service port number is 80 (the HTTP port).
Enter the Map to IP address to which to map the external IP address. For example,
the IP address of a web server on an internal network.
Enter the Map to Port number to be added to packets when they are forwarded.
If you do not want to translate the port, enter the same number as the External Service
Port.
10
Select OK.
To add a dynamic port forwarding virtual IP
228
01-28008-0003-20050204
Fortinet Inc.
Firewall
Enter the External Service Port number for which you want to configure dynamic port
forwarding.
The external service port number must match the destination port of the packets to be
forwarded. For example, if the virtual IP provides PPTP passthrough access from the
Internet to a PPTP server, the external service port number should be 1723 (the PPTP
port).
Enter the Map to IP address to which to map the external IP address. For example,
the IP address of a PPTP server on an internal network.
Enter the Map to Port number to be added to packets when they are forwarded.
If you do not want to translate the port, enter the same number as the External Service
Port.
10
Select OK.
To delete a virtual IP
Select the Delete icon beside the virtual IP you want to delete.
Select OK.
To edit a virtual IP
Select the Edit icon beside the virtual IP you want to modify.
Select OK.
IP pool
An IP pool (also called a dynamic IP pool) is a range of IP addresses added to a
firewall interface. You can enable Dynamic IP Pool in a firewall policy to translate the
source address of outgoing packets to an address randomly selected from the IP pool.
An IP pool list appears when the policy destination interface is the same as the IP pool
interface.
You can add an IP pool if you want to add NAT mode policies that translate source
addresses to addresses randomly selected from the IP pool rather than being limited
to the IP address of the destination interface.
01-28008-0003-20050204
229
IP pool list
Firewall
For example, if you add an IP pool to the internal interface, you can select Dynamic IP
pool for External->Internal and DMZ->Internal policies.
You can add multiple IP pools to any interface and select the IP pool to use when
configuring a firewall policy.
You can enter an IP address range using the following formats.
IP pool list
IP pool options
Configuring IP pools
IP pool list
Figure 108:Sample IP pool list
Start IP
End IP
IP pool options
Figure 109:IP pool options
Name
230
01-28008-0003-20050204
Fortinet Inc.
Firewall
Configuring IP pools
Configuring IP pools
To add an IP pool
1
Select OK.
To delete an IP pool
Select the Delete icon beside the IP pool you want to delete.
Select OK.
To edit a IP pool
For the IP pool that you want to edit, select Edit beside it.
01-28008-0003-20050204
231
Firewall
If you want connections to originate from all your Internet IP addresses, you can add
this address range to an IP pool for the external interface. Then you can select
Dynamic IP Pool for all policies with the external interface as the destination. For each
connection, the firewall dynamically selects an IP address from the IP pool to be the
source address for the connection. As a result, connections to the Internet appear to
be originating from any of the IP addresses in the IP pool.
Protection profile
Use protection profiles to apply different protection settings for traffic that is controlled
by firewall policies. You can use protection profiles to:
Configure antivirus protection for HTTP, FTP, IMAP, POP3, and SMTP policies
Configure content archiving for HTTP, FTP, IMAP, POP3, and SMTP policies
Using protection profiles, you can customize types and levels of protection for different
firewall policies.
For example, while traffic between internal and external addresses might need strict
protection, traffic between trusted internal addresses might need moderate protection.
You can configure policies for different traffic services to use the same or different
protection profiles.
You can add Protection profiles to NAT/Route mode and Transparent mode policies.
This section describes:
232
01-28008-0003-20050204
Fortinet Inc.
Firewall
The Protection Profile list has the following icons and features.
Create New
Delete
Edit
Note: You cannot delete a protection profile (the Delete icon is not visible) if it is selected in a
firewall policy or included in a user group.
To apply maximum protection to HTTP, FTP, IMAP, POP3, and SMTP traffic.
You may not wish to use the strict protection profile under normal
circumstances but it is available if you have extreme problems with viruses
and require maximum screening.
Scan
To apply virus scanning to HTTP, FTP, IMAP, POP3, and SMTP traffic.
Web
To apply virus scanning and web content blocking to HTTP traffic. You can
add this protection profile to firewall policies that control HTTP traffic.
Unfiltered
You can configure the following options when creating or editing a protection profile.
Profile Name
Anti-Virus
Web Filtering
Spam Filtering
IPS
Content Archive
01-28008-0003-20050204
233
Firewall
The following options are available for antivirus through the protection profile. See
Antivirus on page 299 for more antivirus configuration options.
Virus Scan
Enable or disable virus scanning (for viruses and worms) for each
protocol (HTTP, FTP, IMAP, POP3, SMTP). Grayware, if enabled in
Antivirus > Config > Grayware, is included with the Virus Scan.
Heuristic, if enabled in the CLI, is also included with the Virus Scan.
File Block
Enable or disable file pattern blocking for each protocol. You can
block files by name, by extension, or any other pattern, giving you
the flexibility to block files that may contain harmful content.
Pass fragmented emails Enable or disable passing fragmented email for mail protocols
(IMAP, POP3, SMTP). Fragmented email cannot be scanned for
viruses.
Oversized file/email
Select block or pass for files and email that exceed configured
thresholds for each protocol. To configure the oversized file
threshold, go to Antivirus > Config > Config. The maximum
threshold for scanning in memory is 10% of the FortiGate unit RAM.
Note: For email scanning, the oversize threshold refers to the final
size of the email after encoding by the email client, including
attachments. Email clients may use a variety of encoding types and
some encoding types translate into larger file sizes than the original
attachment. The most common encoding, base64, translates 3
bytes of binary data into 4 bytes of base64 data. So a file may be
blocked or logged as oversized even if the attachment is several
megabytes less than the configured oversize threshold.
Add signature to
outgoing emails
234
01-28008-0003-20050204
Fortinet Inc.
Firewall
The following options are available for web filtering through the protection profile. See
Web filter on page 319 for more web filter configuration options.
Web Content Block
Enable or disable web page blocking for HTTP traffic based on the
banned words and patterns in the content block list.
Enable or disable web page filtering for HTTP traffic based on the
URL block list.
Enable or disable web page filtering for HTTP traffic based on the
URL exempt list. Exempt URLs are not scanned for viruses.
Enable or disable blocking scripts from web pages for HTTP traffic.
The following options are available for web category filtering through the protection
profile. See Category block on page 327 for more category blocking configuration
options.
Enable category block (HTTP Enable FortiGuard category blocking.
only)
Block unrated websites
(HTTP only)
Block any web pages that have not been rated by the web
filtering service.
Rate images by URL (blocked Enable using FortiGuard to rate images based on the image
images will be replaced with URL. Images that should be blocked are replaced with a blank
image on the original web page. FortiGuard has ratings for gif,
blanks) (HTTP only)
jpeg, tiff, png, and bmp images.
01-28008-0003-20050204
235
Firewall
Allow websites when a rating Allow web pages that return a rating error from the web
filtering service.
error occurs (HTTP only)
Category
The following options are available for spam filtering through the protection profile.
See Spam filter on page 333 for more spam filter configuration options.
236
IP address FortiShield
check
01-28008-0003-20050204
Fortinet Inc.
Firewall
Return e-mail DNS check Enable or disable checking that the domain specified in the reply-to
or from address has an A or MX record.
MIME headers check
Spam Action
The action for the spam filter to take. Tagged allows you to append
a custom tag to the subject or header of email identified as spam.
For SMTP, if you have virus scan or splice (CLI) enabled, you will
only be able to discard spam email. (Note that splice is enabled
automatically when you enable virus scanning.) Discard
immediately drops the connection. Without splice or scanning
enabled, you can chose to tag or discard SMTP spam.
You can tag email by adding a custom word or phrase to the subject
or inserting a MIME header and value into the email header. You
can choose to log any spam action in the event log.
Append to
Append with
Note: Some popular email clients cannot filter messages based on the MIME header. Check
your email client features before deciding how to tag spam.
The following options are available for IPS through the protection profile. See IPS on
page 287 for more IPS configuration options.
IPS Signature
IPS Anomaly
01-28008-0003-20050204
237
Firewall
The following options are available for content archive through the protection profile.
Display content metainformation on the system
dashboard
Archive content
meta-information
Select OK.
Note: If both Virus Scan and File Block are enabled, the FortiGate unit blocks files that match
enabled file patterns before they are scanned for viruses.
Select the Delete icon beside the protection profile you want to delete.
Select OK.
To edit a protection profile
Select the Edit icon beside the protection profile you want to modify.
238
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Firewall
Select Create New to add a policy or select Edit for the policy you want to modify.
Select OK.
Repeat this procedure for any policies for which you want to enable network
protection.
Use this command to add, edit or delete protection profiles. Use protection profiles to
apply different protection settings for traffic controlled by firewall policies.
01-28008-0003-20050204
239
Firewall
http
{bannedword block
catblock
chunkedbypass
content-archive
no-content-summary
oversize
quarantine
rangeblock scan
scriptfilter
urlblock
urlexempt}
240
Description
Default
Availability
01-28008-0003-20050204
Fortinet Inc.
Firewall
Description
Default
Availability
This example shows how to display the settings for the firewall profile
command.
get firewall profile
This example shows how to display the settings for the spammail profile.
get firewall profile spammail
This example shows how to display the configuration for the firewall profile
command.
show firewall profile
This example shows how to display the configuration for the spammail profile.
show firewall profile spammail
01-28008-0003-20050204
241
242
Firewall
01-28008-0003-20050204
Fortinet Inc.
User
You can control access to network resources by defining lists of authorized users,
called user groups. To use a particular resource, such as a network or a VPN tunnel,
the user must belong to one of the user groups that is allowed access. The user then
must correctly enter a user name and password to prove his or her identity. This is
called authentication.
You can configure authentication in:
When the user attempts to access the resource, the FortiGate unit requests a user
name and password. The FortiGate unit can verify the users credentials locally or
using an external LDAP or RADIUS server.
Authentication expires if the user leaves the connection idle for longer than the
authentication timeout period.
You need to determine the number and membership of your user groups appropriate
to your authentication needs.
To set up user groups
1
Configure local user identities in User > Local. For each user, you can choose
whether the password is verified by the FortiGate unit, by a RADIUS server or by an
LDAP server. See Local on page 244.
Create user groups in User > User Group. Add local users as appropriate. See User
group on page 249.
You can also add a RADIUS or LDAP server to a user group. In this case, all users in
the external servers database can authenticate.
This chapter describes:
Local
RADIUS
LDAP
User group
01-28008-0003-20050204
243
User
Local
Go to User > Local to add local user names and configure authentication.
Create New
User Name
Type
244
User Name
Disable
Password
01-28008-0003-20050204
Fortinet Inc.
User
LDAP
Radius
Select Create New to add a new user name or select the Edit icon to edit an existing
configuration.
Select OK.
To delete a user name from the internal database
You cannot delete user names that have been added to user groups. Remove user
names from user groups before deleting them.
Select the Delete icon for the user name that you want to delete.
Select OK.
Note: Deleting the user name deletes the authentication configured for the user.
RADIUS
If you have configured RADIUS support and a user is required to authenticate using a
RADIUS server, the FortiGate unit contacts the RADIUS server for authentication. The
default port for RADIUS traffic is 1812. If your RADIUS server is using port 1645 you
can use the CLI to change the default RADIUS port. For more information see the
config system global command entry in the FortiGate CLI Reference Guide.
Create New
01-28008-0003-20050204
245
User
Name
Name
Server Name/IP Enter the domain name or IP address of the RADIUS server.
Server Secret
Select Create New to add a new RADIUS server or select the Edit icon to edit an
existing configuration.
Select OK.
To delete a RADIUS server
You cannot delete a RADIUS server that has been added to a user group.
Select the Delete icon beside the RADIUS server name that you want to delete.
Select OK.
LDAP
If you have configured LDAP support and a user is required to authenticate using an
LDAP server, the FortiGate unit contacts the LDAP server for authentication. To
authenticate with the FortiGate unit, the user enters a user name and password. The
FortiGate unit sends this user name and password to the LDAP server. If the LDAP
server can authenticate the user, the user is successfully authenticated with the
FortiGate unit. If the LDAP server cannot authenticate the user, the connection is
refused by the FortiGate unit.
246
01-28008-0003-20050204
Fortinet Inc.
User
The FortiGate unit supports LDAP protocol functionality defined in RFC2251 for
looking up and validating user names and passwords. FortiGate LDAP supports all
LDAP servers compliant with LDAP v3.
FortiGate LDAP support does not extend to proprietary functionality, such as
notification of password expiration, that is available from some LDAP servers.
FortiGate LDAP support does not supply information to the user about why
authentication failed.
Create New
Common Name The common name identifier for the LDAP server. 20 characters maximum.
The common name identifier for most LDAP servers is cn. However some
Identifier
servers use other common name identifiers such as uid.
Distinguished
Name
Name
Server Name/IP Enter the domain name or IP address of the LDAP server.
Server Port
01-28008-0003-20050204
247
User
Common Name Enter the common name identifier for the LDAP server.
Identifier
The common name identifier for most LDAP servers is cn. However some
servers use other common name identifiers such as uid.
Distinguished
Name
Enter the distinguished name used to look up entries on the LDAP server.
Enter the base distinguished name for the server using the correct X.500 or
LDAP format. The FortiGate unit passes this distinguished name unchanged
to the server.
For example, you could use the following base distinguished name:
ou=marketing,dc=fortinet,dc=com
where ou is organization unit and dc is domain component.
You can also specify multiple instances of the same field in the distinguished
name, for example, to specify multiple organization units:
ou=accounts,ou=marketing,dc=fortinet,dc=com
Select Create New to add a new LDAP server, or select the Edit icon to edit an
existing configuration.
Enter the distinguished name used to look up entries on the LDAP server.
Select OK.
To delete an LDAP server
You cannot delete an LDAP server that has been added to a user group.
248
Select Delete beside the LDAP server name that you want to delete.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
User
User group
To enable authentication, you must add user names, RADIUS servers, and LDAP
servers to one or more user groups. You can then assign a firewall protection profile
to the user group. You can configure authentication as follows:
When you add user names, RADIUS servers, and LDAP servers to a user group, the
order in which they are added determines the order in which the FortiGate unit checks
for authentication. If user names are first, then the FortiGate unit checks for a match
with these local users. If a match is not found, the FortiGate unit checks the RADIUS
or LDAP server. If a RADIUS or LDAP server is added first, the FortiGate unit checks
the server and then the local users.
Create New
Group Name
Members
Protection Profile The protection profile associated with this user group.
01-28008-0003-20050204
249
User
Group Name
Available Users
The list of users, RADIUS servers, or LDAP servers that can be added to
a user group.
Members
Protection Profile
250
Select Create New to add a new user group, or select the Edit icon to edit an existing
configuration.
To add users to the user group, select a user from the Available Users list and select
the right arrow to add the name to the Members list.
To add a RADIUS server to the user group, select a RADIUS server from the
Available Users list and select the right arrow to add the RADIUS server to the
Members list.
To add an LDAP server to the user group, select an LDAP server from the Available
Users list and select the right arrow to add the LDAP server to the Members list.
To remove users, RADIUS servers, or LDAP servers from the user group, select a
user, RADIUS server, or LDAP server from the Members list and select the left arrow
to remove the name, RADIUS server, or LDAP server from the group.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
User
peer
Select Delete beside the user group that you want to delete.
Select OK.
CLI configuration
This guide only covers Command Line Interface (CLI) commands that are not
represented in the web-based manager. For complete descriptions and examples of
how to use CLI commands see the FortiGate CLI Reference Guide.
peer
Use this command to add or edit the peer certificate information.
Description
Enter the peer Certificate Authority
(CA).
Enter the peer certificate common
name.
Enter the peer certificate common
name type.
Enter the peer certificate name
constraints.
01-28008-0003-20050204
Default
Availability
No default. All models.
No default. All models.
string
All models.
251
peergrp
User
Example
This example shows how to add the branch_office peer.
config user peer
edit branch_office
set ca
set cn
set cn-type
end
This example shows how to display the list of configured peers.
get user peer
This example shows how to display the settings for the peer branch_office.
get user peer branch_office
This example shows how to display the configuration for all the peers.
show user peer
This example shows how to display the configuration for the peer branch_office.
show user peer branch_office
peergrp
Use this command to add or edit a peer group.
252
Description
Enter the names of peers to add
to the peer group. Separate
names by spaces. To add or
remove names from the group
you must re-enter the whole list
with the additions or deletions
required.
01-28008-0003-20050204
Default
Availability
No default. All models.
Fortinet Inc.
User
peergrp
Example
This example shows how to add peers to the peergrp EU_branches.
config user peergrp
edit EU_branches
set member Sophia_branch Valencia_branch
Cardiff_branch
end
This example shows how to display the list of configured peer groups.
get user peergrp
This example shows how to display the settings for the peergrp EU_branches.
get user peergrp EU_branches
This example shows how to display the configuration for all the peers groups.
show user peergrp
This example shows how to display the configuration for the peergrp EU_branches.
show user peergrp EU_branches
01-28008-0003-20050204
253
peergrp
254
User
01-28008-0003-20050204
Fortinet Inc.
VPN
FortiGate units support the following protocols to authenticate and encrypt traffic:
Phase 1
Phase 2
Manual key
Concentrator
Ping Generator
Monitor
PPTP
L2TP
Certificates
CLI configuration
01-28008-0003-20050204
255
Phase 1 list
VPN
Phase 1
The basic phase 1 settings associate IPSec phase 1 parameters with a remote
gateway and determine:
whether the various phase 1 parameters will be exchanged in multiple rounds with
encrypted authentication information (main mode) or in a single message with
authentication information that is not encrypted (aggressive mode)
In phase 1, the two VPN peers exchange keys to establish a secure communication
channel between them. The advanced P1 Proposal parameters select the encryption
and authentication algorithms that are used to generate the keys. Additional advanced
phase 1 settings can be selected to ensure the smooth operation of phase 1
negotiations.
To configure phase 1 settings
1
For information about how to choose the correct phase 1 settings for your particular
situation, refer to the FortiGate VPN Guide.
Note: The procedures in this section assume that you want the FortiGate unit to generate
unique IPSec encryption and authentication keys automatically. In situations where a remote
VPN peer requires a specific IPSec encryption and/or authentication key, you must configure
the FortiGate unit to use manual keys instead. For more information, see Manual key on
page 263.
Phase 1 list
Figure 126:IPSec VPN Phase 1 list
256
Create New
Gateway Name
Gateway IP
Mode
Main or Aggressive.
01-28008-0003-20050204
Fortinet Inc.
VPN
Encryption
Algorithm
Gateway Name Type a name for the remote VPN peer or client. Enter a name that reflects the
origination of the remote connection.
Remote
Gateway
IP Address
Dynamic DNS
If Dynamic DNS is selected, type the domain name of the remote peer.
Mode
01-28008-0003-20050204
257
VPN
Pre-shared Key If Preshared Key is selected, type the preshared key that the FortiGate unit
will use to authenticate itself to the remote peer during phase 1 negotiations.
You must define the same value at the remote peer. The key must contain at
least 6 printable characters and should only be known by network
administrators. For optimum protection against currently known attacks, the
key should consist of a minimum of 16 randomly chosen alphanumeric
characters.
258
Certificate
Name
If RSA Signature is selected, select the name of the digital certificate that the
FortiGate unit will use to authenticate itself to the remote peer during phase 1
negotiations.
Peer Options
If the remote peer has a domain name and subscribes to a dynamic DNS
service, select Accept this peer ID and type the fully qualified domain
name of the remote peer. This value must be identical to the value in the
Local ID field of the phase 1 remote gateway configuration on the remote
peer.
01-28008-0003-20050204
Fortinet Inc.
VPN
P1 Proposal
01-28008-0003-20050204
259
VPN
DH Group
When the VPN peer or client has a dynamic IP address and uses
aggressive mode, select up to three DH groups on the FortiGate unit and
one DH group on the remote peer or dialup client. The setting on the
remote peer or client must be identical to one of the selections on the
FortiGate unit.
If the VPN peer or client employs main mode, you can select multiple DH
groups. At least one of the settings on the remote peer or client must be
identical to the selections on the FortiGate unit.
Keylife
Type the amount of time (in seconds) that will be allowed to pass before the
IKE encryption key expires. When the key expires, a new key is generated
without interrupting service. The keylife can be from 120 to 172800 seconds.
Local ID
If you are using peer IDs for authentication, enter the peer ID that the local
FortiGate unit will use to authenticate itself to remote VPN peers.
If you are using certificates for authentication, select the distinguished name
(DN) of the local certificate.
XAuth
If you select Enable as Client, type the user name and password that the
FortiGate unit will need to authenticate itself to the remote peer.
To select Enable as Server, you must first create user groups to identify the
remote peers and dialup clients that need access to the network behind the
FortiGate unit. You must also configure the FortiGate unit to forward
authentication requests to an external RADIUS or LDAP authentication
server. For information about these topics, see the Users and Authentication
chapter of the FortiGate Administration Guide. Select a Server Type setting to
determine the type of encryption method to use between the FortiGate unit,
the XAuth client and the external authentication server, and then select the
user group from the User Group list.
Nat-traversal
Enable this option if a NAT device exists between the local FortiGate unit and
the VPN peer or client. The local FortiGate unit and the VPN peer or client
must have the same NAT traversal setting (both selected or both cleared).
Keepalive
Frequency
If you enabled NAT traversal, enter a keepalive frequency setting. The value
represents an interval from 0 to 900 seconds.
Dead Peer
Detection
Enable this option to reestablish VPN tunnels on idle connections and clean
up dead IKE peers if required.
Phase 2
You configure phase 2 settings to specify the parameters for creating and maintaining
a VPN tunnel between the FortiGate unit and the remote peer or client. In most cases,
you only need to configure the basic phase 2 settings.
To configure phase 2 settings
1
260
01-28008-0003-20050204
Fortinet Inc.
VPN
Phase 2 list
For information about how to choose the correct phase 2 settings for your particular
situation, refer to the FortiGate VPN Guide.
Note: The procedures in this section assume that you want the FortiGate unit to generate
unique IPSec encryption and authentication keys automatically. In situations where a remote
VPN peer requires a specific IPSec encryption and/or authentication key, you must configure
the FortiGate unit to use manual keys instead. For more information, see Manual key on
page 263.
Phase 2 list
Figure 129:IPSec VPN Phase 2 list
Create New
Tunnel Name
Remote Gateway
The names of the phase 1 configurations that are associated with the
tunnel configurations.
Lifetime (sec/kb)
Status
The current status of the tunnel. If Down, the tunnel is not processing
traffic. If Up, the tunnel is currently processing traffic. Unknown is
displayed for dialup tunnels.
Timeout
01-28008-0003-20050204
261
VPN
Tunnel Name
Remote
Gateway
Concentrator
P2 Proposal
262
DES-Digital Encryption Standard, a 64-bit block algorithm that uses a 56bit key.
01-28008-0003-20050204
Fortinet Inc.
VPN
You can select either of the following message digests to check the
authenticity of messages during an encrypted session:
NULL-Do not use a message digest.
Enable perfect Enable or disable PFS. Perfect forward secrecy (PFS) improves security by
forcing a new Diffie-Hellman exchange whenever keylife expires.
forward
secrecy (PFS)
DH Group
Select one Diffie-Hellman group (1, 2, or 5). The remote peer or client must be
configured to use the same group.
Keylife
Select the method for determining when the phase 2 key expires: Seconds,
KBytes, or Both. If you select both, the key expires when either the time has
passed or the number of KB have been processed. The range is from 120 to
172800 seconds, or from 5120 to 2147483648 KB.
Autokey Keep Enable the option if you want the tunnel to remain active when no data is
being processed.
Alive
DHCP-IPSec
If the FortiGate unit will relay DHCP requests from dialup clients to an external
DHCP server, you can select DHCP-IPsec Enable to enable DHCP over
IPSec services. The DHCP relay parameters must be configured separately.
For more information, see System DHCP on page 81.
Internet
browsing
Quick Mode
Identities
Manual key
If required, you can manually define cryptographic keys for establishing an IPSec VPN
tunnel. You would define manual keys in situations where:
Prior knowledge of the encryption and/or authentication key is required (that is,
one of the VPN peers requires a specific IPSec encryption and/or authentication
key).
01-28008-0003-20050204
263
VPN
In both cases, you do not specify IPSec phase 1 and phase 2 parameters; you define
manual keys on the VPN > IPSEC > Manual Key tab instead.
If one of the VPN peers uses specific authentication and encryption keys to establish
a tunnel, both VPN peers must be configured to use the same encryption and
authentication algorithms and keys.
Note: It may not be safe or practical to define manual keys because network administrators
must be trusted to keep the keys confidential, and propagating changes to remote VPN peers in
a secure manner may be difficult.
It is essential that both VPN peers be configured with matching encryption and
authentication algorithms, matching authentication and encryption keys, and
complementary Security Parameter Index (SPI) settings.
Each SPI identifies a Security Association (SA). The value is placed in ESP
datagrams to link the datagrams to the SA. When an ESP datagram is received, the
recipient refers to the SPI to determine which SA applies to the datagram. An SPI
must be specified manually for each SA. Because an SA applies to communication in
one direction only, you must specify two SPIs per configuration (a local SPI and a
remote SPI) to cover bidirectional communications between two VPN peers.
Caution: If you are not familiar with the security policies, SAs, selectors, and SA databases for
your particular installation, do not attempt the following procedure without qualified assistance.
Go to VPN > IPSEC > Manual Key and select Create New.
264
Create New
Remote Gateway
Encryption
Algorithm
Authentication
Algorithm
01-28008-0003-20050204
Fortinet Inc.
VPN
Remote SPI
Remote Gateway
Type the IP address of the public interface to the remote peer. The
address identifies the recipient of ESP datagrams.
Encryption
Algorithm
01-28008-0003-20050204
265
VPN
Encryption Key
Authentication
Algorithm
If you selected:
DES, type a 16-character hexadecimal number (0-9, a-f).
Concentrator
Concentrator
In a hub-and-spoke configuration, connections to a number of remote peers radiate
from a single, central FortiGate unit. Site-to-site connections between the remote
peers do not exist; however, VPN tunnels between any two of the remote peers can
be established through the FortiGate unit hub.
In a hub-and-spoke network, all VPN tunnels terminate at the hub. The peers that
connect to the hub are known as spokes. The hub functions as a concentrator on the
network, managing all VPN connections between the spokes. VPN traffic passes from
one tunnel to the other through the hub.
You define a concentrator to include spokes in the hub-and-spoke configuration.
To define a concentrator
266
01-28008-0003-20050204
Fortinet Inc.
VPN
Concentrator list
Concentrator list
Figure 134:IPSec VPN concentrator list
Create New
Select Create New to define a new concentrator for an IPSec hub-andspoke configuration.
Concentrator options
Figure 135:Creating a concentrator for a hub-and-spoke configuration
Concentrator
Name
Available
Tunnels
A list of defined IPsec VPN tunnels. Select a tunnel from the list and then
select the right-pointing arrow. Repeat these steps until all of the tunnels
associated with the spokes are included in the concentrator.
Members
Ping Generator
The ping generator generates traffic in an IPSec VPN tunnel to keep the tunnel
connection open when no traffic is being generated inside the tunnel. For example,
the ping generator is useful in scenarios where a dialup client or dynamic DNS peer
connects from an IP address that changes periodicallytraffic may be suspended
while the IP address changes. You may also use the ping generator to troubleshoot
network connectivity inside a VPN tunnel.
01-28008-0003-20050204
267
VPN
You can configure settings to generate ping commands through two tunnels
simultaneously. The ping interval is fixed at 40 seconds.
The source and destination IP addresses refer to the source and destination
addresses of IP packets that are to be transported through the VPN tunnel. When
source and destination addresses of 0.0.0.0 are entered, no ping traffic is
generated between the source and destination.
To configure the ping generator
1
Select Enable.
In the Source IP 1 field, type the private IP address or subnet address from which
traffic may originate locally (for example, 192.168.20.12 or 192.168.20.0
respectively).
If you want to enable a second ping generator, repeat Steps 3 and 4 for the Source IP
2 and Destination IP 2 settings.
Select Apply.
268
Enable
Select the option to ping the specified destination address using the
specified source address.
Source IP 1
Destination IP 1
Source IP 2
Destination IP 2
01-28008-0003-20050204
Fortinet Inc.
VPN
Dialup monitor
Monitor
You can use the monitor to view activity on IPSec VPN tunnels and start or stop those
tunnels. The display provides a list of addresses, proxy IDs, and timeout information
for all active tunnels.
To view active tunnels
1
In the list of tunnels, select the Bring down tunnel or Bring up tunnel button in the row
that corresponds to the tunnel that you want to bring down or up.
If you take down an active tunnel while a dialup client such as FortiClient is still
connected, FortiClient will continue to show the tunnel connected and idle. The dialup
client must disconnect before another tunnel can be initiated.
Dialup monitor
The list of dialup tunnels provides information about the status of tunnels that have
been established for dialup clients. The list displays the IP addresses of dialup clients
and the names of all active tunnels. The number of tunnels shown in the list can
change as dialup clients connect and disconnect.
Figure 137:Dialup monitor
Flush dialup
tunnels icon
Stop all dialup tunnels and stop the traffic passing through all dialup tunnels.
Dialup users may have to reconnect to establish new VPN sessions.
Name
Remote gateway The IP address and UDP port of the remote gateway.
Username
The peer ID, certificate name, or XAuth user name of the dialup client (if a
peer ID, certificate name, or XAuth user name was assigned to the dialup
client for authentication purposes).
Timeout
The time before the next key exchange. The time is calculated by
subtracting the time elapsed since the last key exchange from the keylife.
Proxy ID Source The IP address of the host, server, or private network behind the FortiGate
unit. A network range may be displayed if the source address in the firewall
encryption policy was expressed as a range of IP addresses.
Proxy ID
Destination
The virtual IP (VIP) address of the dialup client. A range of VIP addresses
may be displayed if the destination address in the firewall encryption policy
was expressed as a range of VIP addresses.
01-28008-0003-20050204
269
VPN
Bring up tunnel Start or stop the current dialup tunnel. If you stop the tunnel, the dialup user
and Bring down may have to reconnect to establish a new VPN session.
tunnel icons
Page up and
Display the previous or next page of dialup-tunnel status listings.
Page down icons
Name
Remote gateway The IP address and UDP port of the remote gateway. For dynamic DNS
tunnels, the IP address is updated dynamically.
Timeout
The time before the next key exchange. The time is calculated by
subtracting the time elapsed since the last key exchange from the keylife.
Proxy ID Source The IP address of the host, server, or private network behind the FortiGate
unit. A network range may be displayed if the source address in the firewall
encryption policy was expressed as a range of IP addresses.
Proxy ID
Destination
Bring up tunnel Start or stop the selected VPN tunnel. If you stop the tunnel, the remote
and Bring down VPN peer may have to reconnect to establish a new VPN session.
tunnel icons
Page up and
Display the previous or next page of VPN-tunnel status listings.
Page down icons
PPTP
FortiGate units support PPTP to tunnel PPP traffic between two VPN peers. Windows
or Linux PPTP clients can establish a PPTP tunnel with a FortiGate unit that has been
configured to act as a PPTP server. As an alternative, you can configure the FortiGate
unit to forward PPTP packets to a PPTP server on the network behind the FortiGate
unit.
For information about how to perform these tasks, see PPTP configuration
procedures on page 278.
To enable PPTP and specify the PPTP address range
1
270
01-28008-0003-20050204
Fortinet Inc.
VPN
PPTP range
PPTP range
The PPTP address range is the range of addresses reserved for remote PPTP clients.
When the remote PPTP client connects, the FortiGate unit assigns an IP address from
a reserved range of IP addresses to the client PPTP interface. The PPTP client uses
the assigned IP address as its source address for the duration of the connection.
Figure 139:PPTP range
Enable PPTP
You must add a user group before you can select the option.
Starting IP
Ending IP
User Group
Select the name of the PPTP user group that you defined.
Disable PPTP
L2TP
A FortiGate unit can be configured to act as an L2TP network server. The FortiGate
implementation of L2TP enables a remote dialup client to establish an L2TP tunnel
with the FortiGate unit directly.
For information about how to perform the related tasks, see L2TP configuration
procedures on page 278.
To enable L2TP and specify the L2TP address range
1
L2TP range
The L2TP address range specifies the range of addresses reserved for remote clients.
When a remote client connects to the FortiGate unit, the client is assigned an IP
address from this range. Afterward, the FortiGate unit uses the assigned address to
communicate with the remote client.
01-28008-0003-20050204
271
VPN
Enable L2TP
You must add a user group before you can enable the option.
Starting IP
Ending IP
User Group
Select the name of the L2TP user group that you defined.
Disable L2TP
Certificates
Digital certificates are downloadable files that you can install on the FortiGate unit and
on remote peers and clients for authentication purposes.
An X.509 digital certificate contains information that has been digitally signed by a
trusted third party known as a certificate authority (CA). Because CAs can be trusted,
the certificates issued by a CA are deemed to be trustworthy.
To view and manage local certificates
1
For more information, see CA certificate list on page 275 and Importing CA
certificates on page 275.
For detailed information and step-by-step procedures related to obtaining and
installing digital certificates, see the FortiGate VPN Guide.
272
01-28008-0003-20050204
Fortinet Inc.
VPN
Certificate request
Generate
Import
Name
Subject
Status
View Certificate
Detail icon
Delete icon
Download icon
Select to save a copy of the certificate request to a local computer. Send the
request to your CA to obtain a certificate for the FortiGate unit.
Certificate request
To obtain a personal or site certificate, you must send a request to a CA that provides
digital certificates that adhere to the X.509 standard. The FortiGate unit provides a
way for you to generate the request. The generated request includes information such
as the FortiGate units public static IP address, domain name, or email address.
To generate a certificate request
1
Select Generate.
01-28008-0003-20050204
273
VPN
Certification Name
Subject Information
For Domain name, enter the fully qualified domain name of the
FortiGate unit being certified. Do not include the protocol
specification (http://) or any port number or path names.
For E-mail, enter the email address of the owner of the FortiGate
unit being certified. Typically, email addresses are entered only
for clients, not gateways.
Organization Unit
Organization
Locality (City)
State/Province
Country
Key Type
Key Size
Select 1024 Bit, 1536 Bit or 2048 Bit. Larger keys are slower to
generate but more secure. Not all IPSec VPN products support all
three key sizes.
274
01-28008-0003-20050204
Fortinet Inc.
VPN
CA certificate list
Select Import.
Figure 144:Importing a signed certificate
Browse to the location on the management PC where the certificate has been saved,
select the certificate, and then select OK.
Select OK.
CA certificate list
Follow the CA instructions to download their root certificate, and then install the root
certificate on the FortiGate unit. The installed CA certificates are displayed in the CA
certificate list.
Figure 145:CA certificate list
Import
Name
Subject
View Certificate
Detail icon
Delete icon
Download icon
Importing CA certificates
After you download the root certificate of the CA, save the certificate on a PC that has
management access to the FortiGate unit.
To import a CA root certificate
1
Select Import.
01-28008-0003-20050204
275
VPN
Browse to the location on the management PC where the certificate has been saved,
select the certificate, and then select OK.
Select OK.
Configuring L2TP VPNs describes how to configure the FortiGate unit to operate
as an L2TP network server.
Monitoring and Testing VPN Tunnels outlines some general monitoring and
testing procedures for VPNs.
General high-level procedures are presented here. For details, see the FortiGate VPN
Guide.
Define the phase 1 parameters that the FortiGate unit needs to authenticate remote
peers and establish a secure a connection. See Phase 1 on page 256.
Define the phase 2 parameters that the FortiGate unit needs to create a VPN tunnel
with a remote peer. See Phase 2 on page 260.
Define source and destination addresses for the IP packets that are to be transported
through the VPN tunnel, and create the firewall encryption policy, which defines the
scope of permitted services between the IP source and destination addresses. See
Adding firewall policies for IPSec VPN tunnels on page 277.
Note: Perform Steps 1 and 2 to have the FortiGate unit generate unique IPSec encryption and
authentication keys automatically. In situations where a remote VPN peer requires a specific
IPSec encryption and/or authentication key, you must configure the FortiGate unit to use
manual keys instead of performing Steps 1 and 2. For more information, see Manual key on
page 263.
276
01-28008-0003-20050204
Fortinet Inc.
VPN
In the Address Name field, type a name that represents the local network, server(s),
or host(s) from which IP packets may originate on the private network behind the local
FortiGate unit.
In the IP Range/Subnet field, type the corresponding IP address and subnet mask (for
example, 172.16.5.0/24 for a subnet, or 172.16.5.1/32 for a server or host) or
IP address range (for example, 192.168.10.[80-100]).
Select OK.
To define an IP destination address
In the Address Name field, type a name that represents the remote network, server(s),
or host(s) to which IP packets may be delivered.
In the IP Range/Subnet field, type the corresponding IP address and subnet mask (for
example, 192.168.20.0/24 for a subnet, or 192.168.20.2/32 for a server or
host), or IP address range (for example, 192.168.20.[10-25]).
Select OK.
To define the firewall encryption policy
Source
Select the local interface to the internal (private) network.
Destination
Select the local interface to the external (public) network.
Address Name
Source
Select the name that corresponds to the local network, server(s), or
host(s) from which IP packets may originate.
Destination
Select the name that corresponds to the remote network, server(s), or
host(s) to which IP packets may be delivered. The name may correspond
to a VIP-address range for dialup clients.
Schedule
Keep the default setting (always) unless changes are needed to meet
specific requirements.
Service
Keep the default setting (ANY) unless changes are needed to meet your
specific requirements.
01-28008-0003-20050204
277
VPN
Action
Select ENCRYPT.
VPN Tunnel
Select the name of the phase 2 tunnel configuration to which this policy
will apply.
Select Allow inbound if traffic from the remote network will be allowed to
initiate the tunnel.
Select Allow outbound if traffic from the local network will be allowed to
initiate the tunnel.
Select Inbound NAT to translate the source IP addresses of inbound
decrypted packets into the IP address of the FortiGate internal interface.
Select Outbound NAT to translate the source address of outbound
encrypted packets into the IP address of the FortiGate public interface.
You may enable a protection profile, and/or event logging, or select advanced settings
to shape traffic or differentiate services. See the Firewall chapter of the FortiGate
Administration Guide.
Select OK.
Place the policy in the policy list above any other policies having similar source and
destination addresses.
Create a PPTP user group containing one user for each PPTP client. See User on
page 243.
Enable PPTP on the FortiGate unit and specify the range of addresses that can be
assigned to PPTP clients when they connect. See PPTP range on page 271.
Create a PPTP user group containing one user for each PPTP client. See User on
page 243.
Enable PPTP on the FortiGate unit and specify the range of addresses that can be
assigned to PPTP clients when they connect. See PPTP range on page 271.
278
Create an L2TP user group containing one user for each remote client. See User on
page 243.
01-28008-0003-20050204
Fortinet Inc.
VPN
ipsec phase1
Enable L2TP on the FortiGate unit and specify the range of addresses that can be
assigned to remote clients when they connect. See L2TP range on page 271.
CLI configuration
This section provides information about features that must be configured through CLI
commands. CLI commands provide additional network options that cannot be
configured through the web-based manager. For complete descriptions and examples
of how to use CLI commands, see the FortiGate CLI Reference Guide.
ipsec phase1
ipsec phase2
ipsec vip
ipsec phase1
In the web-based manager, the Dead Peer Detection option can be enabled when you
define advanced Phase 1 options. The config vpn ipsec phase1 CLI command
supports additional options for specifying a long and short idle time, a retry count, and
a retry interval.
01-28008-0003-20050204
279
ipsec phase1
VPN
280
01-28008-0003-20050204
Default
Availability
300
seconds
All models.
dpd must
be set to
enable.
10
seconds
All models.
dpd must
be set to
enable.
All models.
dpd must
be set to
enable.
5
seconds
All models.
dpd must
be set to
enable.
Fortinet Inc.
VPN
ipsec phase2
Example
Use the following command to edit an IPSec VPN phase 1 configuration with the
following characteristics:
Mode: aggressive
Retry count: 5
Retry interval: 30
config vpn ipsec phase1
edit Simple_GW
set Type dynamic
set proposal des-md5
set authmethod psk
set psksecret Qf2p3O93jIj2bz7E
set mode aggressive
set dpd enable
set dpd-idlecleanup 1000
set dpd-idleworry 150
set dpd-retrycount 5
set dpd-retryinterval 30
end
ipsec phase2
Use the config vpn ipsec phase2 CLI command to add or edit an IPSec VPN
phase 2 configuration.
01-28008-0003-20050204
281
ipsec vip
VPN
Description
Bind the tunnel to the specified
network interface. Type the name of
the local FortiGate interface.
Enable or disable all dialup clients to
connect using the same phase 2
tunnel definition.
Default
null
Availability
All models.
ipsec vip
A FortiGate unit can act as a proxy by answering ARP requests locally and forwarding
the associated traffic to the intended destination host over an IPSec VPN tunnel. The
feature is intended to enable IPSec VPN communications between two hosts that
coordinate the same private address space on physically separate networks. The IP
addresses of both the source host and the destination host must be unique. The
ipsec vip command lets you specify the IP addresses that can be accessed at the
remote end of the VPN tunnel. You must configure IPSec virtual IP (VIP) addresses at
both ends of the IPSec VPN tunnel.
Adding an IPSec VIP entry to the VIP table enables a FortiGate unit to respond to
ARP requests destined for remote servers and route traffic to the intended
destinations automatically. Each IPSec VIP entry is identified by an integer. An entry
identifies the name of the FortiGate interface to the destination network, and the IP
address of a destination host on the destination network. Specify an IP address for
every host that needs to be accessed on the other side of the tunnelyou can define
a maximum of 32 IPSec VIP addresses on the same interface.
Note: The interface to the destination network must be associated with a VPN tunnel through a
firewall encryption policy (action must be set to encrypt). The policy determines which VPN
tunnel will be selected to forward traffic to the destination. When you create IPSec VIP entries,
check the encryption policy on the FortiGate interface to the destination network to ensure that
it meets your requirements.
For more information, see Configuring IPSec virtual IP addresses on page 283.
282
01-28008-0003-20050204
Fortinet Inc.
VPN
ipsec vip
Description
The IP address of the destination
host on the destination network.
out-interface
The name of the FortiGate interface
<interface-name_str> to the destination network.
Default
0.0.0.0
Availability
All models.
null
All models.
Example
The following commands add IPSec VIP entries for two remote hosts that can be
accessed by a FortiGate unit through an IPSec VPN tunnel on the external
interface of the FortiGate unit. Similar commands must be entered on the FortiGate
unit at the other end of the IPSec VPN tunnel.
config vpn ipsec vip
edit 1
set ip 192.168.12.1
set out-interface external
next
edit 2
set ip 192.168.12.2
set out-interface external
end
Note: Typing next lets you define another VIP address without leaving the vip shell.
This example shows how to display the settings for the vpn ipsec vip command.
get vpn ipsec vip
This example shows how to display the settings for the VIP entry named 1.
get vpn ipsec vip 1
This example shows how to display the current configuration of all existing VIP
entries.
show vpn ipsec vip
01-28008-0003-20050204
283
ipsec vip
VPN
Consider the following example, which shows two physically separate networks. The
IP addresses of the computers on both networks are in the 192.168.12.0/24 range,
but no two IP addresses are the same. An IPSec VPN has been configured between
FortiGate_1 and FortiGate_2. The FortiGate configuration permits Host_1 on the
Finance network to transmit data to Host_2 on the HR network through the IPSec
VPN tunnel.
Figure 147:A typical site-to-site configuration using the IPSec VIP feature
HR Network
192.168.12.0/24
Host_2
192.168.12.2
FortiGate_1
Esc
Enter
external
Internet
external
Esc
Enter
FortiGate_2
Host_1
192.168.12.1
Finance Network
192.168.12.0/24
When Host_1 attempts to send a packet to Host_2 for the first time, Host_1 issues an
ARP request locally for the MAC address of Host_2. However, because Host_2
resides on a remote network, it does not respond. Instead, the FortiGate unit
responds with its own MAC address. From that point, Host_1 adds the MAC address
of the FortiGate unit to its ARP cache and the FortiGate unit will act as a proxy for
Host_2.
In the above example, the private IP addresses between the two sites have been
coordinated to protect against ambiguous routing (no two IP addresses are the same).
Setting up a configuration like this involves performing the following tasks at
FortiGate_1 and FortiGate_2.
To enable IPSec VPN communication between two network hosts that coordinate the
same private address space on physically separate networks, perform the following
tasks at the local and remote FortiGate units:
284
On both FortiGate units, define the gateway/tunnel on which to transmit VPN traffic to
the remote location (see Phase 1 on page 256 and Phase 2 on page 260).
On both FortiGate units, define the firewall encrypt policy that is needed to select and
enable communication through the defined VPN gateway/tunnel (see Adding firewall
policies for IPSec VPN tunnels on page 277).
Using CLI commands to configure the local FortiGate unit, add VIP entries to define
which IP addresses can be accessed at the remote end of the VPN tunnel (see ipsec
vip on page 282). For example, to enable access to Host_2 on the HR network from
Host_1 on the Finance network, enter the following CLI commands on FortiGate_1:
01-28008-0003-20050204
Fortinet Inc.
VPN
ipsec vip
Using CLI commands to configure the remote FortiGate unit, add VIP entries to define
which IP addresses can be accessed at the local end of the VPN tunnel (see ipsec
vip on page 282). For example, to enable access to Host_1 on the Finance network
from Host_2 on the HR network, enter the following CLI commands on FortiGate_2:
config vpn ipsec vip
edit 1
set ip 192.168.12.1
set out-interface external
end
01-28008-0003-20050204
285
ipsec vip
286
VPN
01-28008-0003-20050204
Fortinet Inc.
IPS
The FortiGate Intrusion Prevention System (IPS) combines signature and anomaly
intrusion detection and prevention with low latency and excellent reliability. The
FortiGate unit can record suspicious traffic in logs, can send alert email to system
administrators, and can log, pass, drop, reset, or clear suspicious packets or
sessions. You can adjust some IPS anomaly thresholds to work best with the normal
traffic on the protected networks. You can also create custom signatures to customize
the FortiGate IPS for diverse network environments.
You can configure the IPS globally and then enable or disable all signatures or all
anomalies in individual firewall protection profiles. Table 26 describes the IPS settings
and where to configure and access them. To access protection profile IPS options go
to Firewall > Protection Profile, select edit or Create New, and select IPS. See
Protection profile options on page 233.
Table 26: IPS and Protection Profile IPS configuration
Protection Profile IPS options
IPS setting
IPS Signature
IPS Anomaly
01-28008-0003-20050204
287
Predefined
IPS
Signature
Anomaly
Signature
The FortiGate IPS matches network traffic against patterns contained in attack
signatures. Attack signatures reliably protect your network from known attacks.
Fortinets FortiProtect infrastructure ensures the rapid identification of new threats and
the development of new attack signatures.
You can configure the FortiGate unit to automatically check for and download an
updated attack definition file containing the latest signatures, or you can manually
download the updated attack definition file. You can also configure the FortiGate unit
to allow push updates of updated attack definition files as soon as they are available
from the FortiProtect Distribution Network. For details, see Update center on
page 128.
When the FortiGate unit installs an updated attack definition file, it checks to see if the
default configuration for any existing signatures has changed. If the default
configuration has changed, the changes are preserved.
In addition to an extensive list of predefined attack signatures, you can also create
your own custom attack signatures for the FortiGate unit. See Adding custom
signatures on page 293.
Predefined
Predefined signatures are arranged into groups based on the type of attack. By
default, all signature groups are enabled while some signatures within groups are not.
Check the default settings to ensure they meet the requirements of your network
traffic.
You can enable or disable signature groups or individual signatures. Disabling
unneeded signatures can improve system performance and reduce the number of log
messages and alert emails that the IPS generates. For example, the IPS detects a
large number of web server attacks. If you do not provide access to a web server
behind your FortiGate unit, you can disable all web server attack signatures.
Some signature groups include configurable parameters. The parameters that are
available depend on the type of signatures in the signature group. When you
configure these parameters for a signature group, the parameters apply to all of the
signatures in the group.
For each signature, you can configure the action the FortiGate IPS takes when it
detects an attack. The FortiGate IPS can pass, drop, reset or clear packets or
sessions.
You can also enable or disable logging of the attack.
288
01-28008-0003-20050204
Fortinet Inc.
IPS
Predefined
Group Name
Enable
The status of the signature group. A white check mark in a green circle
indicates the signature group is enabled. A white X in a grey circle indicates
the signature group is disabled.
Logging
The logging status for individual signatures. Click on the blue triangle to
show the signature group members. A white check mark in a green circle
indicates logging is enabled for the signature. A white X in a grey circle
indicates logging is disabled for the signature.
Action
The action set for individual signatures. Click on the blue triangle to show
the signature group members. Action can be Pass, Drop, Reset, Reset
Client, Reset Server, Drop Session, Clear Session, or Pass Session. See
Table 27.
Revision
The revision number for individual signatures. To show the signature group
members, click on the blue triangle.
Modify
The Configure and Reset icons. Reset only appears when the default
settings have been modified. Selecting Reset restores the default settings.
Table 27 describes each possible action you can select for predefined signatures.
Table 27: Actions to select for each predefined signature
Action
Description
Pass
The FortiGate unit lets the packet that triggered the signature pass
through the firewall. If logging is disabled and action is set to Pass, the
signature is effectively disabled.
Drop
The FortiGate unit drops the packet that triggered the signature. Fortinet
recommends using an action other than Drop for TCP connection based
attacks.
Reset
The FortiGate unit drops the packet that triggered the signature, sends a
reset to both the client and the server, and removes the session from the
FortiGate session table. Used for TCP connections only. If you set this
action for non-TCP connection based attacks, the action will behave as
Clear Session. If the Reset action is triggered before the TCP connection
is fully established it acts as Clear Session.
01-28008-0003-20050204
289
Predefined
IPS
Table 27: Actions to select for each predefined signature
Reset Client
The FortiGate unit drops the packet that triggered the signature, sends a
reset to the client, and removes the session from the FortiGate session
table. Used for TCP connections only. If you set this action for non-TCP
connection based attacks, the action will behave as Clear Session. If the
Reset Client action is triggered before the TCP connection is fully
established it acts as Clear Session.
Reset Server
The FortiGate unit drops the packet that triggered the signature, sends a
reset to the server, and removes the session from the FortiGate session
table. Used for TCP connections only. If you set this action for non-TCP
connection based attacks, the action will behave as Clear Session. If the
Reset Server action is triggered before the TCP connection is fully
established it acts as Clear Session.
Drop Session
The FortiGate unit drops the packet that triggered the signature and drops
any other packets in the same session.
Clear Session
The FortiGate unit drops the packet that triggered the signature, removes
the session from the FortiGate session table, and does not send a reset.
Pass Session
The FortiGate unit lets the packet that triggered the signature and all other
packets in the session pass through the firewall.
Select the Configure icon next to the predefined signature group that you want to
enable or disable.
Figure 149:Enabling or disabling a predefined signature group
Select the enable box to enable the predefined signature group or clear the enable
box to disable the predefined signature group.
Select OK.
To configure predefined signature settings
Select the blue triangle next to a signature group name to display the members of that
group.
Select the Configure icon for the signature you want to configure.
Figure 150:Configuring predefined IPS signatures
290
01-28008-0003-20050204
Fortinet Inc.
IPS
Predefined
Select the Enable box to enable the signature or clear the Enable box to disable the
signature.
Select the Logging box to enable logging for this signature or clear the Logging box to
disable logging for this signature.
Select the Action for the FortiGate unit to take when traffic matches this signature.
(See Table 27.)
Select OK.
To restore the recommended settings of a signature
Select the blue triangle next to a signature group name to display the members of that
group.
Select the Reset icon for the signature you want to restore to recommended settings.
The Reset icon is displayed only if the settings for the signature have been changed
from recommended settings.
Select OK.
http_decoder
im
p2p
rpc_decoder
tcp_reassembler
01-28008-0003-20050204
291
Custom
IPS
idle_timeout
If a session is idle for longer than this number of seconds, the session will
not be maintained by tcp_reassembler.
min_ttl
A packet with a higher ttl number in its IP header than the number specified
here is not processed by tcp_reassembler.
port_list
A comma separated list of ports. The dissector can decode these TCP ports.
bad_flag_list
reassembly_
direction
codepoint
A number from 0 to 63. Used for differentiated services tagging. When the
action for p2p and im signatures is set to Pass, the FortiGate unit checks the
codepoint. If the codepoint is set to a number from 1 to 63, the codepoint for
the session is changed to the specified value. If the codepoint is set to -1
(the default) no change is made to the codepoint in the IP header.
Custom
You can create custom IPS signatures. The custom signatures you create are added
to a single Custom signature group.
Custom signatures provide the power and flexibility to customize the FortiGate IPS for
diverse network environments. The FortiGate predefined signatures cover common
attacks. If you are using an unusual or specialized application or an uncommon
platform, you can add custom signatures based on the security alerts released by the
application and platform vendors.
You can also use custom signatures to block or allow specific traffic. For example to
block traffic containing pornography, you can add custom signatures similar to the
following:
F-SBID (--protocol tcp; --flow established; --content "nude cheerleader"; --no_case)
When you add the signature set action to Drop Session.
For more information on custom signature syntax see the FortiGate IPS Custom
Signatures Technical Bulletin.
Note: Custom signatures are an advanced feature. This document assumes the user has
previous experience creating intrusion detection signatures.
Enable custom Select the Enable custom signature box to enable the custom signature
group or clear the Enable custom signature box to disable the custom
signature
signature group.
Create New
292
01-28008-0003-20050204
Fortinet Inc.
IPS
Custom
Clear all custom Remove all the custom signatures from the custom signature group.
signatures
Reset to
recommended
settings?
Name
Revision
The revision number for each custom signature. The revision number is a
number you assign to the signature when you create or revise it.
Enable
The status of each custom signature. A white check mark in a green circle
indicates the signature is enabled. A white X in a grey circle indicates the
signature is disabled.
Selecting the box at the top of the Enable column enables all the custom
signatures. Clearing the box at the top of the Enable column disables all the
custom signatures.
Logging
The logging status of each custom signature. A white check mark in a green
circle indicates logging is enabled for the custom signature. A white X in a
grey circle indicates logging is disabled for the custom signature.
Action
The action set for each custom signature. Action can be Pass, Drop, Reset,
Reset Client, Reset Server, Drop Session, Clear Session, or Pass Session.
Modify
Select Create New to add a new custom signature or select the Edit icon to edit an
existing custom signature.
Figure 154:Edit custom signature
Select the action to be taken when a packet triggers this signature. (See Table 27 for
action descriptions.)
Select the Logging box to enable logging for the custom signature or clear the Logging
box to disable logging for the custom signature.
01-28008-0003-20050204
293
Custom
IPS
Caution: Restoring the custom signature list overwrites the existing file.
Anomaly
The FortiGate IPS uses anomaly detection to identify network traffic that does not fit
known or preset traffic patterns. The FortiGate IPS identifies the four statistical
anomaly types for the TCP, UDP, and ICMP protocols.
Flooding
Scan
Source session
limit
Destination
session limit
You can enable or disable logging for each anomaly, and you can control the IPS
action in response to detecting an anomaly. In many cases you can also configure the
thresholds that the anomaly uses to detect traffic patterns that could represent an
attack.
Note: It is important to know the normal and expected traffic on your network before changing
the default anomaly thresholds. Setting the thresholds too low could cause false positives, and
setting the thresholds too high could miss some attacks.
You can also use the command line interface (CLI) to configure session control based
on source and destination network address. See Anomaly CLI configuration on
page 297.
The anomaly detection list can be updated only when the FortiGate firmware image is
upgraded.
Anomaly list
Figure 155:The Anomaly list
294
01-28008-0003-20050204
Fortinet Inc.
IPS
Custom
Name
Enable
The status of the anomaly. A white check mark in a green circle indicates the
anomaly is enabled. A white X in a grey circle indicates the anomaly is
disabled.
Logging
The logging status for each anomaly. A white check mark in a green circle
indicates logging is enabled for the anomaly. A white X in a grey circle
indicates logging is disabled for the anomaly.
Action
The action set for each anomaly. Action can be Pass, Drop, Reset, Reset
Client, Reset Server, Drop Session, Clear Session, or Pass Session.
Modify
The Edit and Reset icons. If you have changed the settings for an anomaly,
you can use the Reset icon to change the settings back to the
recommended settings.
Configuring an anomaly
Each anomaly is preset with a recommended configuration. By default all anomaly
signatures are enabled. You can use the recommended configurations or you can
modify the recommended configurations to meet the needs of your network.
For more information on minimum, maximum, and recommended thresholds for the
anomalies with configurable thresholds, see the FortiGate IPS Anomaly Thresholds
and Dissector Values Technical Bulletin.
Figure 156:Editing the portscan IPS anomaly
Name
Enable
Select the Enable box to enable the anomaly or clear the Enable box to
disable the anomaly.
Logging
Select the Logging box to enable logging for the anomaly or clear the
Logging box to disable logging for the anomaly.
Action
Select an action for the FortiGate unit to take when traffic triggers this
anomaly.
01-28008-0003-20050204
295
Custom
IPS
Pass
The FortiGate unit lets the packet that triggered the anomaly pass
through the firewall. If logging is disabled and action is set to Pass, the
anomaly is effectively disabled.
Drop
The FortiGate unit drops the packet that triggered the anomaly. Fortinet
recommends using an action other than Drop for TCP connection based
attacks.
Reset
The FortiGate unit drops the packet that triggered the anomaly, sends a
reset to both the client and the server, and removes the session from
the FortiGate session table. Used for TCP connections only. If you set
this action for non-TCP connection based attacks, the action will behave
as Clear Session. If the Reset action is triggered before the TCP
connection is fully established it acts as Clear Session.
Reset
Client
The FortiGate unit drops the packet that triggered the anomaly, sends a
reset to the client, and removes the session from the FortiGate session
table. Used for TCP connections only. If you set this action for non-TCP
connection based attacks, the action will behave as Clear Session. If the
Reset Client action is triggered before the TCP connection is fully
established it acts as Clear Session.
Reset
Server
The FortiGate unit drops the packet that triggered the anomaly, sends a
reset to the server, and removes the session from the FortiGate session
table. Used for TCP connections only. If you set this action for non-TCP
connection based attacks, the action will behave as Clear Session. If the
Reset Server action is triggered before the TCP connection is fully
established it acts as Clear Session.
Drop
The FortiGate unit drops the packet that triggered the anomaly and
Session drops any other packets in the same session.
Clear
The FortiGate unit drops the packet that triggered the anomaly, removes
Session the session from the FortiGate session table, and does not send a reset.
Pass
The FortiGate unit lets the packet that triggered the anomaly and all
Session other packets in the session pass through the firewall.
threshold
Select the Edit icon for the signature you want to configure.
Select the Enable box to enable the anomaly or clear the Enable box to disable the
anomaly.
Select the Logging box to enable logging for this anomaly or clear the Logging box to
disable logging for this anomaly.
Select an action for the FortiGate unit to take when traffic triggers this anomaly.
Select OK.
To restore the default settings of an anomaly
296
Select the Reset icon for the anomaly you want to restore to defaults.
The Reset icon is displayed only if the settings for the anomaly have been changed
from defaults.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
IPS
Access the config limit subcommand using the config ips anomaly
<name_str> command. Use this command for session control based on source and
destination network address. This command is available for tcp_src_session,
tcp_dst_session, icmp_src_session, icmp_dst_session,
udp_src_session, udp_dst_session.
You cannot edit the default entry. Addresses are matched from more specific to
more general. For example, if you define thresholds for 192.168.100.0/24 and
192.168.0.0/16, the address with the 24 bit netmask will be matched first.
Description
The ip address and netmask of the
source or destination network.
Default Availability
No
All models.
default.
No
All models.
default.
Example
Use the following command to configure the limit for the tcp_src_session
anomaly.
config ips anomaly tcp_src_session
config limit
edit subnet1
set ipaddress 1.1.1.0 255.255.255.0
set threshold 300
end
end
FortiGate-100 Administration Guide
01-28008-0003-20050204
297
IPS
298
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Antivirus provides configuration access to most of the antivirus options you enable
when you create a firewall protection profile. While antivirus settings are configured for
system-wide use, you can implement specific settings on a per profile basis.
Table 28 describes the antivirus settings and where to configure and access them. To
access protection profile antivirus options go to Firewall > Protection Profile, select
edit or Create New, and select Anti-Virus. See Protection profile options on
page 233.
Table 28: Antivirus and Protection Profile antivirus configuration
Protection Profile antivirus options
Antivirus setting
Virus Scan
File Block
Quarantine
01-28008-0003-20050204
299
Antivirus
File block
Quarantine
Config
CLI configuration
File block
Configure file blocking to remove all files that are a potential threat and to prevent
active computer virus attacks. You can block files by name, by extension, or any other
pattern, giving you the flexibility to block potentially harmful content.
Note: File block entries are not case sensitive. For example, adding *.exe to the file block list
also blocks any files ending in .EXE.
For standard operation, you can choose to disable file blocking in the Protection
Profile, and enable it only to temporarily block specific threats as they occur. You can
also enable or disable file blocking by protocol for each file pattern you configure.
The FortiGate unit blocks files that match a configured file pattern and displays a
replacement message instead. The FortiGate unit also writes a message to the virus
log and sends an alert email if configured to do so.
If both file block and virus scan are enabled, the FortiGate unit blocks files that match
enabled file patterns and does not scan these files for viruses.
300
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Select Create New to add a new file pattern to the file block list.
Apply
Pattern
The current list of blocked file patterns. You can create a pattern by using
? or * wildcard characters.
Check All
Select a check box beside a file pattern to enable blocking that pattern for
all types of traffic. Select a check box beside a service (HTTP, FTP, IMAP,
POP3, and SMTP) to enable blocking all file patterns for that service.
01-28008-0003-20050204
301
Antivirus
HTTP
Displays a check mark if file blocking is enabled to block the file pattern in
HTTP traffic.
FTP
Displays a check mark if file blocking is enabled to block the file pattern in
FTP traffic.
IMAP
Displays a check mark if file blocking is enabled to block the file pattern in
IMAP traffic.
POP3
Displays a check mark if file blocking is enabled to block the file pattern in
POP3 traffic.
SMTP
Displays a check mark if file blocking is enabled to block the file pattern in
SMTP traffic.
The Delete and Edit/View icons.
Select the protocols for which you want to block the file, or select Check All.
Select Apply.
Quarantine
FortiGate units with a local disk can quarantine blocked and infected files. You can
view the file names and status information about the file in the quarantined file list.
You can also submit specific files and add file patterns to the AutoSubmit list so they
will automatically be uploaded to Fortinet for analysis.
This section describes:
AutoSubmit list
Config
302
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Select Apply to apply the sorting and filtering selections to the quarantined
files list.
Sort by:
Sort the list. Choose from: status, service, file name, date, TTL, or duplicate
count. Click apply to complete the sort.
Filter:
File Name
The processed file name of the quarantined file. When a file is quarantined,
all spaces are removed from the file name, and a 32-bit checksum is
performed on the file. The file is stored on the FortiGate hard disk with the
following naming convention: <32bit CRC>.<processed filename>
For example, a file named Over Size.exe is stored as
3fc155d2.oversize.exe.
Date
The date and time that the file was quarantined, in the format dd/mm/yyyy
hh:mm. This value indicates the time that the first file was quarantined if the
duplicate count increases.
Service
The service from which the file was quarantined (HTTP, FTP, IMAP, POP3,
SMTP).
Status
Status
Description
Specific information related to the status, for example, File is infected with
W32/Klez.h or File was stopped by file block pattern.
DC
Duplicate count. A count of how many duplicates of the same file were
quarantined. A rapidly increasing number can indicate a virus outbreak.
TTL
Time to live in the format hh:mm. When the TTL elapses, the FortiGate unit
labels the file as EXP under the TTL heading. In the case of duplicate files,
each duplicate found refreshes the TTL.
Upload status
Y indicates the file has been uploaded to Fortinet for analysis, N indicates
the file has not been uploaded.
The Delete icon.
The Download icon. Download the corresponding file in its original format.
The Submit icon. Upload a suspicious file to Fortinet for analysis.
Note: Duplicates of files (based on the checksum) are not stored, only counted. The TTL value
and the duplicate count are updated each time a duplicate of a file is found.
01-28008-0003-20050204
303
AutoSubmit list
Antivirus
AutoSubmit list
You can configure the FortiGate unit to automatically upload suspicious files to
Fortinet for analysis. You can add file patterns to the AutoSubmit list using wildcard
characters (* or ?). File patterns are applied for AutoSubmit regardless of file blocking
settings.
You can also upload files to Fortinet based on status (blocked or heuristics) or submit
individual files directly from the quarantined files list. The FortiGate unit uses
encrypted email to autosubmit files to an SMTP server through port 25.
Figure 160:Sample AutoSubmit list
Select Create New to add a new file pattern to the AutoSubmit list.
File Pattern
The current list of file patterns that will be automatically uploaded. You can
create a pattern by using ? or * wildcard characters. Enable the check box
to enable all file patterns in the list.
Enter the file pattern or file name you want to automatically upload to Fortinet for
analysis.
Select Enable.
Select OK.
Note: To enable automatic uploading of the configured file patterns you must go to Anti-Virus >
Quarantine > Config, select Enable AutoSubmit, and select Use File Pattern.
304
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Config
Config
Go to Config to set quarantine configuration options including whether to quarantine
blocked or infected files and from which service. You can also configure the time to
live and file size values, and enable AutoSubmit settings.
Figure 162:Quarantine configuration
Age limit
The time limit in hours for which to keep files in quarantine. The age limit is
used to formulate the value in the TTL column of the quarantined files list.
When the limit is reached the TTL column displays EXP. and the file is
deleted (although a record is maintained in the quarantined files list).
Entering an age limit of 0 (zero) means files are stored on disk indefinitely
depending on low disk space action.
Max filesize to
quarantine
The maximum size of quarantined files in MB. Setting the maximum file size
too large may affect performance.
Low disk space Select the action to take when the local disk is full: overwrite the oldest file or
drop the newest file.
Enable
AutoSubmit
Apply
01-28008-0003-20050204
305
Virus list
Antivirus
Config
Config displays a list of the current viruses blocked by the FortiGate unit. You can also
configure file and email size limits, and grayware blocking.
This section describes:
Virus list
Config
Grayware
Grayware options
Virus list
The virus list displays the current viruses blocked in alphabetical order. You can view
the entire list or parts of the list by selecting the number or alphabet ranges. You can
update this list manually or set up the FortiGate unit to receive automatic updates
daily or whenever required. To manually upload a virus list update see Changing unit
information on page 37. To find out how to use the Fortinet Update Center, see
Update center on page 128.
Figure 163:Virus list (partial)
Config
Oversize threshold configuration refers to the size limits you can apply to scan files
and email in memory.
The maximum file size allowed in memory is usually 10% of the FortiGate RAM size.
For example, a FortiGate unit with 256 MB of RAM could have a memory oversize
threshold range of 1 to 25 MB. The range for each FortiGate unit is displayed in the
web-based manager as shown in Figure 164.
Note: For email scanning, the oversize threshold refers to the final size of the email after
encoding by the email client, including attachments. Email clients may use a variety of encoding
types and some encoding types translate into larger file sizes than the original attachment. The
most common encoding, base64, translates 3 bytes of binary data into 4 bytes of base64 data.
So a file may be blocked or logged as oversized even if the attachment is several megabytes
less than the configured oversize threshold.
306
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Grayware
Figure 164:Example threshold configuration
You can enable oversized file blocking in a firewall protection profile. To access
protection profiles go to Firewall > Protection Profile, select Anti-Virus > Oversized
File/Email and choose to pass or block oversized email and files for each protocol.
Further file size limits for uncompressed files can be configured as an advanced
feature via the CLI. See CLI configuration on page 309.
Grayware
Grayware programs are unsolicited commercial software programs that get installed
on computers, often without the users consent or knowledge. Grayware programs are
generally considered an annoyance, but these programs can cause system
performance problems or be used for malicious means.
The FortiGate unit scans for known grayware executable programs in each category
you enable. The category list and contents are added or updated whenever your
FortiGate unit receives a virus update package. New categories may be added at any
time and will be loaded with the virus updates. By default, all new categories are
disabled. Grayware is enabled in a protection profile when Virus Scan is enabled.
Grayware options
Grayware categories are populated with known executable files. Each time the
FortiGate unit receives a virus and attack definitions update, the grayware categories
and contents are updated.
Figure 165:Sample grayware options
01-28008-0003-20050204
307
Grayware options
Antivirus
The categories may change or expand when the FortiGate unit receives updates. In
the example above you can choose to enable the following grayware categories.
Enabling a grayware category blocks all files listed in the category.
308
Adware
Dial
Select enable to block dialer programs. Dialers allow others to use the
PC modem to call premium numbers or make long distance calls.
Game
Joke
P2P
Spy
Keylog
Hijacker
Plugin
NMT
RAT
Misc
BHO
Select enable to block browser helper objects. BHOs are DLL files that
are often installed as part of a software package so the software can
control the behavior of Internet Explorer 4.x and higher. Not all BHOs
are malicious, but the potential exists to track surfing habits and gather
other information.
Toolbar
Download
01-28008-0003-20050204
Fortinet Inc.
Antivirus
CLI configuration
Note: This guide only covers Command Line Interface (CLI) commands that are not
represented in the web-based manager. For complete descriptions and examples of how to use
CLI commands see the FortiGate CLI Reference Guide.
Example
This example shows how to disable heuristic scanning.
config antivirus heuristic
set mode disable
end
01-28008-0003-20050204
309
Antivirus
This example shows how to display the settings for the antivirus heuristic
command.
get antivirus heuristic
This example shows how to display the configuration for the antivirus heuristic
command.
show antivirus heuristic
Default
imap
smtp
pop3
http
ftp
No
default.
Availability
FortiGate
models
numbered
200 and
higher.
FortiGate
models
numbered
200 and
higher.
310
01-28008-0003-20050204
Fortinet Inc.
Antivirus
port
<port_integer>
uncompsizelimit
<MB_integer>
Description
Default
Availability
All models.
All models.
All models.
01-28008-0003-20050204
311
Antivirus
Example
This example shows how to set the maximum file size that can be buffered to memory
for scanning at 12 MB, the maximum uncompressed file size that can be buffered to
memory for scanning at 15 MB, and how to enable antivirus scanning on ports 70, 80,
and 443 for HTTP traffic.
config antivirus service http
set memfilesizelimit 12
set uncompsizelimit 15
set port 70
set port 80
set port 443
end
This example shows how to display the antivirus HTTP traffic settings.
get antivirus service http
This example shows how to display the configuration for antivirus HTTP traffic.
show antivirus service http
312
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Default
Availability
21
All models.
Example
This example shows how to set the maximum file size buffered to memory for
scanning at 25 MB, the maximum uncompressed file size that can be buffered to
memory at 100 MB, and how to enable antivirus scanning on ports 20 and 21 for FTP
traffic.
config antivirus service ftp
set memfilesizelimit 25
set uncompsizelimit 100
set port 20 21
end
This example shows how to display the antivirus FTP traffic settings.
get antivirus service ftp
This example shows how to display the configuration for antivirus FTP traffic.
show antivirus service ftp
01-28008-0003-20050204
313
Antivirus
port
<port_integer>
uncompsizelimit
<MB_integer>
Description
Default
Availability
All models.
All models.
All models.
314
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Example
This example shows how to set the maximum file size that can be buffered to memory
for scanning at 20 MB, the maximum uncompressed file size that can be buffered to
memory for scanning at 60 MB, and how to enable antivirus scanning on ports 110,
111, and 992 for POP3 traffic.
config antivirus service pop3
set memfilesizelimit 20
set uncompsizelimit 60
set port 110
set port 111
set port 992
end
This example shows how to display the antivirus POP3 traffic settings.
get antivirus service pop3
This example shows how to display the configuration for antivirus POP3 traffic.
show antivirus service pop3
01-28008-0003-20050204
315
Antivirus
Default
Availability
10 (MB)
All models.
143
All models.
10 (MB)
All models.
Example
This example shows how to set the maximum file size that can be buffered to memory
for scanning at 25 MB, the maximum uncompressed file size that can be buffered to
memory for scanning at 50 MB, and how to enable antivirus scanning on ports 143
and 993 for IMAP traffic.
config antivirus service http
set memfilesizelimit 25
set uncompsizelimit 50
set port 143
set port 993
end
This example shows how to display the antivirus IMAP traffic settings.
get antivirus service imap
This example shows how to display the configuration for antivirus IMAP traffic.
show antivirus service imap
316
01-28008-0003-20050204
Fortinet Inc.
Antivirus
Default
Availability
10 (MB)
All models.
143
All models.
10 (MB)
All models.
01-28008-0003-20050204
317
Antivirus
Example
This example shows how to set the maximum file size that can be buffered to memory
for scanning at 100 MB, the maximum uncompressed file size that can be buffered to
memory for scanning at 1 GB (1000 MB), and how to enable antivirus scanning on
ports 25, and 465 for SMTP traffic.
config antivirus service smtp
set memfilesizelimit 100
set uncompsizelimit 1000
set port 25
set port 465
end
This example shows how to display the antivirus SMTP traffic settings.
get antivirus service smtp
This example shows how to display the configuration for antivirus SMTP traffic.
show antivirus service smtp
318
01-28008-0003-20050204
Fortinet Inc.
Web filter
Web filter provides configuration access to the Web filtering and Web category filtering
options you enable when you create a firewall Protection Profile.
To access protection profile web filter options go to Firewall > Protection Profile, select
edit or Create New, and select Web Filtering or Web Category Filtering. See
Protection profile options on page 233.
Table 30: Web filter and Protection Profile web filtering configuration
Protection Profile web filtering options
Enable or disable web page filtering for HTTP Add URLs and URL patterns to block web
traffic based on the URL block list.
pages from specific sources.
Web Exempt List
Enable or disable web page filtering for HTTP Add URLs to exempt them from web and virus
traffic based on the URL exempt list. Exempt filtering.
URLs are not scanned for viruses.
Web Script Filter
01-28008-0003-20050204
319
Web filter
Table 30: Web filter and Protection Profile web filtering configuration
Protection Profile web filtering options
Category / Action
FortiGuard web filtering service provides
many categories by which to filter web traffic.
You can set the action to take on web pages
for each category. Choose from allow,
monitor, or reject.
320
Content block
URL block
URL exempt
Category block
Script filter
01-28008-0003-20050204
Fortinet Inc.
Web filter
Content block
Control web content by blocking specific words or word patterns. The FortiGate unit
blocks web pages containing banned words and displays a replacement message
instead.
You can use Perl regular expressions or wildcards to add banned word patterns to the
list. See Using Perl regular expressions on page 347.
Note: Perl regular expression patterns are case sensitive for Web Filter content block. To make
a word or phrase case insensitive, use the regular expression /i. For example,
/bad language/i blocks all instances of bad language regardless of case. Wildcard
patterns are not case sensitive.
Note: Enable Web filtering > Web Content Block in your firewall Protection Profile to activate
the content block settings.
Select Create New to add a banned word to the web content block list.
total
Banned word
The current list of banned words and patterns. Select the check box to
enable all the banned words in the list.
Pattern type
The pattern type used in the banned word list entry. Choose from wildcard or
regular expression. See Using Perl regular expressions on page 347.
Language
The character set to which the banned word belongs: Simplified Chinese,
Traditional Chinese, French, Japanese, Korean, Thai, or Western.
01-28008-0003-20050204
321
Web filter
When you select Create New or Edit you can configure the following settings for the
banned word.
Banned word
Enter the word or pattern you want to include in the banned word list
Pattern type
Select the pattern type for the banned word. Choose from wildcard or
regular expression. See Using Perl regular expressions on page 347.
Language
Select the character set for the banned word. Choose from: Chinese
Simplified, Chinese Traditional, French, Japanese, Korean, Thai, or
Western.
Enable
Select Create New to add a banned word or select Edit for the banned word you want
to modify.
Select Enable.
Select OK.
URL block
You can block access to specific URLs by adding them to the URL block list. You can
also add patterns using text and regular expressions (or wildcard characters) to block
URLs. The FortiGate unit blocks web pages matching any specified URLs or patterns
and displays a replacement message instead.
Note: Enable Web filtering > Web URL Block in your firewall Protection Profile to activate the
URL block settings.
322
01-28008-0003-20050204
Fortinet Inc.
Web filter
complete URLs
IP addresses
If you want to use more than one URL block list, simply combine the lists in a text file
and upload them to the FortiGate unit by selecting the Upload URL block list icon.
URLs in a text file must be separated by hard returns to upload correctly.
Figure 168:Sample Web URL block list
total
URL
The current list of blocked URLs. Select the check box to enable all the
URLs in the list.
01-28008-0003-20050204
323
Web filter
Enter a URL or partial URL to add to the URL block list. (Do not include http://.)
Type a top-level URL or IP address to block access to all pages on a web site. For
example, www.badsite.com or 122.133.144.155 blocks access to all pages at
this web site.
Enter a top-level URL followed by the path and filename to block access to a single
page on a web site. For example, www.badsite.com/news.html or
122.133.144.155/news.html blocks the news page on this web site.
To block all pages with a URL that ends with badsite.com, add badsite.com to
the block list. For example, adding badsite.com blocks access to
www.badsite.com, mail.badsite.com, www.finance.badsite.com, and so
on.
Select Enable.
Select OK.
324
01-28008-0003-20050204
Fortinet Inc.
Web filter
Select Create New to add a new pattern to the web pattern block list.
Pattern
The current list of blocked patterns. Select the check box to enable all the
web patterns in the list.
Select Enable.
Select OK.
URL exempt
Note: URLs in the URL exempt list bypass all security features, including virus scanning.
01-28008-0003-20050204
325
Web filter
Note: Enable Web filtering > Web Exempt List in your firewall Protection Profile to activate the
URL exempt settings.
total
Page up icon
Clear URL exempt Select this icon to delete the entire URL exempt list.
list icon
URL Exempt List
The current list of exempt URLs. Select the check box to enable all the
URLs in the list.
326
Select Enable.
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Web filter
Category block
You can filter http content by specific categories using the FortiGuard managed web
filtering service.
This section describes:
01-28008-0003-20050204
327
Web filter
FortiGuard licensing
Every FortiGate unit comes with a free 30-day FortiGuard trial license. FortiGuard
license management is done by Fortinet servers, so there is no need to enter a
license number. The FortiGate unit automatically contacts a FortiGuard Service Point
when you enable FortiGuard category blocking.
When you want to renew your FortiGuard license after the free trial, contact Fortinet
Technical Support.
FortiGuard configuration
Once selected, FortiGuard category blocking is enabled globally. After enabling
FortiGuard you can configure different categories for each firewall protection profile.
Use the procedure Configuring web category filtering options on page 235 to
configure FortiGuard category blocking in a protection profile.
You can configure the following options to enable and help maintain FortiGuard web
filtering:
Enable Service Select to enable FortiGuard web filtering.
FortiGuard
Status: Select Check Status to test the connection to the FortiGuard server.
Status should change from a flashing red/yellow indicator to a solid green
indicator when the server is contacted successfully.
License Type: The FortiGuard license type.
Expiration: The date the FortiGuard license expires.
Enable Cache
328
01-28008-0003-20050204
Fortinet Inc.
Web filter
TTL
Time to live. The number of seconds to store URL ratings in the cache
before contacting the server again.
To have a
URLs...
To have a URL's category rating re-evaluated, please click here. Select the
link to have a web site re-evaluated if you think the category rating is
incorrect. You must provide a complete valid URL.
Select Check status to make sure the FortiGate unit can access the FortiGuard
server.
After a moment, the FortiGuard status should change from Unknown to Available. If
the FortiGuard status is unavailable, wait and try again.
Select Apply.
You can now enable web category blocking and configure categories for any firewall
protection profile you create. See Configuring web category filtering options on
page 235 and FortiGuard categories on page 369.
Once you select Apply, the FortiGuard license type and expiration date appears on
the configuration screen (Web Filter > Category Block).
You can generate a text and pie chart format report on web filtering for any profile.
The FortiGate unit maintains statistics for allowed, blocked and monitored web pages
for each category. You can view reports for a range of hours or days, or you can view
a complete report of all activity.
Figure 175:Sample report
01-28008-0003-20050204
329
Web filter
Report Type
Select the time frame for which you want to generate the report. Choose
from hour, day, or all historical statistics.
Report Range
Select the time range (24 hour clock) or day range (from six days ago to
today) for which you want the report. For example, if you select report type
hour and enter the range 13 to 16, the results is a category block report for 1
pm to 4 pm today. If you select report type day and enter range 0 to 3, the
result is a category block report for 3 days ago to today.
Get Report
Allowed
The number of allowed web addresses accessed in the selected time frame.
Blocked
The number of blocked web addresses accessed in the selected time frame.
Monitored
Select Reports.
330
01-28008-0003-20050204
Fortinet Inc.
Web filter
Description
Default
Example
This example shows how to change the FortiGuard Service Point name.
config webfilter catblock
set ftgd_hostname guard.example.net
end
This example shows how to display the catblock settings.
get webfilter catblock
This example shows how to display the configuration for the catblock settings.
show webfilter catblock
If the show command returns you to the prompt, the settings are at default.
Script filter
You can configure the FortiGate unit to filter certain web scripts. You can filter Java
applets, cookies, and ActiveX controls from web pages.
Figure 176:Script filtering options
01-28008-0003-20050204
331
Web filter
Note: Blocking any of these items may prevent some web pages from functioning and
displaying correctly.
Note: Enable Web filtering > Web Script Filter in your firewall Protection Profile to activate the
script filter settings.
332
Javascript
Cookies
ActiveX
01-28008-0003-20050204
Fortinet Inc.
Spam filter
Spam filter provides configuration access to the spam filtering options you enable
when you create a firewall protection profile. While spam filters are configured for
system-wide use, you can enable the filters on a per profile basis. Spam filter can be
configured to manage unsolicited commercial email by detecting spam email
messages and identifying spam transmissions from known or suspected spam
servers.
Table 31 describes the spam filter settings and where to configure and access them.
To access protection profile spam filter options go to Firewall > Protection Profile, edit
or Create New, Spam Filtering. See Protection profile options on page 233.
Table 31: Spam Filter and Protection Profile spam filtering configuration
Protection Profile spam filtering options
01-28008-0003-20050204
333
Spam filter
Table 31: Spam Filter and Protection Profile spam filtering configuration
Protection Profile spam filtering options
Spam Action
The action to take on email identified as
spam. POP3 and IMAP messages are tagged.
Choose Tagged or Discard for SMTP
messages. You can append a custom word or
phrase to the subject or MIME header of
tagged email. You can choose to log any
spam action in the event log.
Append to:
Choose to append the tag to the subject or
MIME header of the email identified as spam.
Append with:
Enter a word or phrase (tag) to append to
email identified as spam. The maximum
length is 63 characters.
Add event into the system log
Enable or disable logging of spam actions to
the event log.
334
01-28008-0003-20050204
Fortinet Inc.
Spam filter
FortiShield
IP address
Email address
MIME headers
Banned word
FortiShield
You can filter Spam with an IP address black list and a URL black list using the
Fortinet FortiShield product.
This section describes:
FortiShield options
01-28008-0003-20050204
335
Spam filter
FortiShield compiles the IP address list and URL list from email captured by spam
probes located around the world. Spam probes are email addresses purposely
configured to attract spam and identify known spam sources to create the antispam IP
address and URL address lists. FortiShield combines IP address checks and URL
checks with other spam filter techniques in a two-pass process.
On the first pass, if IP address FortiShield check is selected in the protection profile,
FortiShield extracts the SMTP mail server source address and sends the IP address
to a FortiShield server to see if this IP address matches the list of known spammers. If
URL FortiShield check is selected in the protection profile, FortiShield checks the
body of email messages to extract any URL links. These URL links will be sent to a
FortiShield server to see if any of them is listed. Typically Spam messages contain
URL links to advertisements (also called spamvertizing).
If an IP address or URL match is found, FortiShield terminates the session. If
FortiShield does not find a match, the mail server sends the email to the recipient.
As each email is received, FortiShield performs the second antispam pass by
checking the header, subject, and body of the email for common spam content. If
FortiShield finds spam content, the email is tagged or dropped according to the
configuration in the firewall protection profile.
Both FortiShield antispam processes are completely automated and configured by
Fortinet. With constant monitoring and dynamic updates, FortiShield is always current.
You can enable or disable FortiShield in a firewall protection profile. See Configuring
spam filtering options on page 236.
FortiShield licensing
Every FortiGate unit comes with a free 30-day FortiShield trial license. FortiShield
license management is done by Fortinet servers, so there is no need to enter a
license number. The FortiGate unit automatically contacts a FortiShield Service Point
when you enable FortiShield.
When you want to renew your FortiShield license after the free trial, contact Fortinet
Technical Support.
FortiShield configuration
Once selected, FortiShield is enabled globally. After enabling FortiShield you can
enable FortiShield IP address checking and URL checking in each firewall protection
profile.
336
01-28008-0003-20050204
Fortinet Inc.
Spam filter
FortiShield options
Use the procedure Configuring spam filtering options on page 236 to configure
FortiShield in a protection profile.
FortiShield options
If you have ordered FortiShield through Fortinet technical support or are using the free
30-day trial, you only need to enable the service to start configuring and using
FortiShield.
Figure 177:FortiShield configuration
You can configure or view the following settings for the FortiShield service:
Enable Service Select to enable the FortiShield service.
Status
Select Check Status to test the connection to the FortiShield server. Status
should change from a flashing red/yellow indicator to a solid green indicator
when the server is contacted successfully.
License Type
Expiration
Enable Cache
Select to enable caching the FortiShield IP address and URL block lists.
Enabling the cache can improve performance because the FortiGate unit
does not need to access the server each time the same IP address or URL
appears as the source of an email. The cache is configured to use 6% of the
of the FortiGate RAM. When the cache is full, the least recently used IP
address or URL is deleted.
TTL
Select Check status to make sure the FortiGate unit can access the FortiShield
server.
After a moment, the FortiShield status should change from Unknown to Available. If
the FortiShield status is unavailable, wait and try again.
Select Apply.
You can now enable FortiShield for any firewall protection profile you create. See
Configuring spam filtering options on page 236.
Once you select Apply, the FortiShield license type and expiration date appears on
the configuration screen (Spam Filter > FortiShield).
01-28008-0003-20050204
337
Spam filter
Example
This example shows how to change the FortiShield Service Point name.
config spamfilter fortishield
set hostname shield.example.net
end
This example shows how to display the FortiShield settings.
get spamfilter fortishield
This example shows how to display the configuration for the FortiShield settings.
show spamfilter fortishield
If the show command returns you to the prompt, the settings are at default.
338
01-28008-0003-20050204
Fortinet Inc.
Spam filter
IP address list
IP address
The FortiGate unit uses the IP address list to filter incoming email. The FortiGate unit
compares the IP address of the sender to the list in sequence. If a match is found, the
corresponding protection profile action is taken. If no match is found, the email is
passed on to the next spam filter.
You can enter an IP address and mask in two formats:
IP address list
IP address options
IP address list
You can configure the FortiGate unit to filter email from specific IP addresses. You
can mark each IP address as clear, spam, or reject. You can filter single IP
addresses, or a range of addresses at the network level by configuring an address
and mask.
Figure 178:Sample IP address list
IP address options
IP address list has the following icons and features:
Create New
Total
IP address/Mask
Action
The action to take on email from the configured IP address. Actions are:
Mark as Spam to apply the spam action configured in the protection
profile, Mark as Clear to let the email pass to the next filter, or Mark as
Reject (SMTP only) to drop the session.
01-28008-0003-20050204
339
Spam filter
Figure 179:Adding an IP address
If required, select before or after another IP address in the list to place the new IP
address in the correct position.
Select OK.
340
01-28008-0003-20050204
Fortinet Inc.
Spam filter
Select Create New to add a server to the DNSBL & ORDBL list.
Total
DNSBL Server
The current list of servers. Select the check box to enable all the DNSBL
and ORDBL servers in the list.
Action
Enter the domain name of the DNSBL or ORDBL server you want to add.
Select Enable.
Select OK.
01-28008-0003-20050204
341
Spam filter
Email address
The FortiGate unit uses the email address list to filter incoming email. The FortiGate
unit compares the email address or domain of the sender to the list in sequence. If a
match is found, the corresponding protection profile action is taken. If no match is
found, the email is passed on to the next spam filter.
You can use Perl regular expressions or wildcards to add email address patterns to
the list. See Using Perl regular expressions on page 347.
This section describes:
Select Create New to add an email address to the email address list.
Total
Email address
Pattern Type
The pattern type used in the email address entry. Choose from wildcard or
regular expression. See Using Perl regular expressions on page 347.
Action
The action to take on email from the configured address. Actions are:
Mark as Spam to apply the spam action configured in the protection
profile, or Mark as Clear to let the email pass to the next filter.
342
01-28008-0003-20050204
Fortinet Inc.
Spam filter
If required, select before or after another email address in the list to place the new
email address in the correct position.
Select the action to take on email from the configured address or domain.
Select OK.
MIME headers
MIME (Multipurpose Internet Mail Extensions) headers are added to email to describe
content type and content encoding, such as the type of text in the email body or the
program that generated the email. Some examples of MIME headers include:
X-mailer: outgluck
X-Distribution: bulk
Content_Type: text/html
Content_Type: image/jpg
The first part of the MIME header is called the header key, or just header. The second
part is called the value. Spammers will often insert comments into header values or
leave them blank. These malformed headers can fool some spam and virus filters.
You can use the MIME headers list to mark email from certain bulk mail programs or
with certain types of content that are common in spam messages. You can choose to
mark the email as spam or clear for each header you configure.
The FortiGate unit compares the MIME header key-value pair of incoming email to the
list pair in sequence. If a match is found, the corresponding protection profile action is
taken. If no match is found, the email is passed on to the next spam filter.
You can use Perl regular expressions or wildcards to add MIME header patterns to
the list. See Using Perl regular expressions on page 347.
Note: MIME header entries are case sensitive.
01-28008-0003-20050204
343
Spam filter
Select Create New to add a MIME header to the MIME headers list.
Total
344
Header
Value
Pattern Type
The pattern type used in the MIME header list entry. Choose from wildcard
or regular expression. See Using Perl regular expressions on page 347.
Action
The action to take on email with the configured MIME header. Actions are:
Mark as Spam to apply the spam action configured in the protection
profile, Mark as Clear to let the email pass to the next filter, or Mark as
Reject (SMTP only) to drop the session.
01-28008-0003-20050204
Fortinet Inc.
Spam filter
Select the action to take on email with that MIME header key-value.
Select OK.
Banned word
Control spam by blocking email containing specific words or patterns. The FortiGate
unit searches for banned words in email messages. If a match is found, the
corresponding protection profile action is taken. If no match is found, the email is
passed to the recipient.
You can use Perl regular expressions or wildcards to add banned word patterns to the
list. See Using Perl regular expressions on page 347.
Note: Perl regular expression patterns are case sensitive for Spam Filter banned words. To
make a word or phrase case insensitive, use the regular expression /i. For example,
/bad language/i will block all instances of bad language regardless of case. Wildcard
patterns are not case sensitive.
01-28008-0003-20050204
345
Spam filter
Select Create New to add a word or phrase to the banned word list.
Total
Pattern
The list of banned words. Select the check box to enable all the banned
words in the list.
Pattern Type
The pattern type used in the banned word list entry. Choose from wildcard or
regular expression. See Using Perl regular expressions on page 347.
Language
The character set to which the banned word belongs: Simplified Chinese,
Traditional Chinese, French, Japanese, Korean, Thai, or Western.
Where
The location which the FortiGate unit searches for the banned word: subject,
body, or all.
Action
When you select Create New or Edit you can configure the following settings for the
banned word.
346
01-28008-0003-20050204
Fortinet Inc.
Spam filter
Pattern
Enter the word or phrase you want to include in the banned word list.
Pattern Type
Select the pattern type for the banned word. Choose from wildcard or
regular expression. See Using Perl regular expressions on page 347.
Language
Select the character set for the banned word. Choose from: Chinese
Simplified, Chinese Traditional, French, Japanese, Korean, Thai, or
Western.
Where
Select the location to search for the banned word. Choose from: subject,
body, or all.
Action
Select the action to perform on email containing the banned word. Choose
from: Mark as Spam to apply the spam action configured in the protection
profile, or Mark as Clear to allow the email (since Banned Word is the last
filter).
Enable
Select Create New to add a banned word or select Edit for the banned word you want
to modify.
Select Enable.
Select OK.
01-28008-0003-20050204
347
Spam filter
To match a special character such as '.' and * use the escape character \. For
example:
In Perl regular expressions, * means match 0 or more times of the character before it,
not 0 or more times of any character. For example:
To match any character 0 or more times, use .* where . means any character and
the * means 0 or more times. For example, the wildcard match pattern forti*.com
should therefore be fort.*\.com.
Word boundary
In Perl regular expressions, the pattern does not have an implicit word boundary. For
example, the regular expression test not only matches the word test but also
matches any word that contains the test such as atest, mytest, testimony,
atestb. The notation \b specifies the word boundary. To match exactly the word
test, the expression should be \btest\b.
Case sensitivity
Regular expression pattern matching is case sensitive in the Web and Spam filters. To
make a word or phrase case insensitive, use the regular expression /i For example,
/bad language/i will block all instances of bad language regardless of case.
Table 32: Perl regular expression formats
348
Expression
Matches
abc
^abc
abc$
a|b
either of a and b
^abc|abc$
ab{2,4}c
ab{2,}c
ab*c
ab+c
ab?c
a.c
a\.c
a.c exactly
[abc]
01-28008-0003-20050204
Fortinet Inc.
Spam filter
[abc]+
any (nonempty) string of a's, b's and c's (such as a, abba, acbabcacaa)
[^abc]+
any (nonempty) string which does not contain any of a, b and c (such as defg)
\d\d
/i
makes the pattern case insensitive. For example, /bad language/i blocks
any instance of bad language regardless of case.
\w+
100\s*mk
the strings 100 and mk optionally separated by any amount of white space
(spaces, tabs, newlines)
abc\b
abc when followed by a word boundary (e.g. in abc! but not in abcd)
perl\B
perl when not followed by a word boundary (e.g. in perlert but not in perl stuff)
\x
tells the regular expression parser to ignore white space that is neither
backslashed nor within a character class. You can use this to break up your
regular expression into (slightly) more readable parts.
/x
used to add regexps within other text. If the first character in a pattern is
forward slash '/', the '/' is treated as the delimiter. The pattern must contain a
second '/'. The pattern between / will be taken as a regexp, and anything
after the second / will be parsed as a list of regexp options ('i', 'x', etc). An
error occurs If the second '/' is missing. In regular expressions, the leading
and trailing space is treated as part of the regular expression.
Examples
To block any word in a phrase
/block|any|word/
To block purposely misspelled words
Spammers often insert other characters between the letters of a word to fool spam
blocking software.
/^.*v.*i.*a.*g.*r.*a.*$/i
/cr[e][\+\-\*=<>\.\,;!\?%&@\^\$\{\}()\[\]\|\\_01]dit/i
To block common spam phrases
The following phrases are some examples of common phrases found in spam
messages.
/try it for free/i
/student loans/i
/youre already approved/i
/special[\+\-\*=<>\.\,;!\?%&~#@\^\$\{\}()\[\]\|\\_1]offer/i
01-28008-0003-20050204
349
350
Spam filter
01-28008-0003-20050204
Fortinet Inc.
01-28008-0003-20050204
351
For descriptions of log formats and specific log messages see the FortiGate Log
Message Reference Guide.
This chapter describes:
Log config
Log access
CLI configuration
Log config
Use Log Config to configure log storage, alert emails and log filters.
This section describes:
FortiLog
352
A FortiLog unit. The FortiLog unit is a log analyzer and manager that can
combine the log information from various FortiGate units and other firewall
units. To enable content archiving with a firewall Protection profile, you need
to select the FortiLog option and define its IP address.
01-28008-0003-20050204
Fortinet Inc.
Memory
The FortiGate system memory. The FortiGate system memory has a limited
capacity and only displays the most recent log entries. Traffic and content
logs cannot be stored in the memory buffer. When the memory is full, the
FortiGate unit begins to overwrite the oldest messages. All log entries are
deleted when the FortiGate unit restarts.
Syslog
WebTrends
Select Apply.
FortiLog settings
IP:
Level:
The FortiGate unit logs all messages at and above the logging severity
level you select. For example, if you select Error, the unit logs Error,
Critical, Alert and Emergency level messages. See Table 33, Logging
severity levels, on page 354.
Enable encryption
Local ID:
The identifier for the FortiGate unit. This must match the device name
assigned to this unit on the FortiLog unit.
Pre-shared key
01-28008-0003-20050204
353
Description
Emergency
Alert
Critical
Functionality is affected.
Error
Warning
Notification
Information
Disk settings
Maximum size of log The maximum size of the log file that is saved to the disk. When the log
file
file reaches the specified maximum size, the current log file is saved and
a new active log file is started. The default maximum log file size is 10 MB
and the maximum log file size allowed is 10 GB.
Roll log time
At the specified time of day, the current log file is saved and a new active
log file is started.
The number of times the current log should be saved and a new active
log started: each minute, hour, or day (as selected in the Unit drop down
list).
Unit
The unit of time that corresponds to the specified Roll Log Frequency:
minute, hour, or day.
The day of the week when the log should be saved and a new log started.
At midnight on the specified day the current log file is saved and a new
active log file is started.
The policy to follow for saving the current log and starting a new active
log. Overwritten deletes the oldest log entry when the disk is full. Block
traffic stops all network traffic when the disk is full. Do not log stops
logging messages when the disk is full.
Level
The FortiGate unit logs all messages at and above the logging severity
level you select. For example, if you select Error, the unit logs Error,
Critical, Alert and Emergency level messages. See Table 33, Logging
severity levels, on page 354.
354
Upload Server IP
Enter the IP address of the FTP server to which to upload the log files.
Port
Enter the port number used by the FTP server. The default port is 21,
which is the standard FTP port.
Username
Password
Remote Directory
Enter the name of the path on the FTP server into which to transfer the
log files. If you do not specify a remote directory, the log files are
uploaded to the root directory of the FTP server.
Select the log files to upload to the FTP server. You can upload the Traffic
Log file, Event Log file, Antivirus Log file, Web Filter Log file, Attack Log
file, Spam Filter Log file, and Content Archive file.
01-28008-0003-20050204
Fortinet Inc.
Enter the port number on the logging server. The default is 21 (FTP).
Select Apply.
Memory settings
Level
The FortiGate unit logs all messages at and above the logging severity
level you select. For example, if you select Error, the unit logs Error,
Critical, Alert and Emergency level messages. See Table 33, Logging
severity levels, on page 354.
Syslog settings
Name/IP
The domain name or IP address of the syslog server that stores the logs.
Port
Level
The FortiGate unit logs all messages at and above the logging severity
level you select. For example, if you select Error, the unit logs Error,
Critical, Alert and Emergency level messages. See Table 33, Logging
severity levels, on page 354.
Facility
Enable CSV Format If you enable CSV format, the FortiGate unit produces the log in Comma
Separated Value (CSV) format. If you do not enable CSV format the
FortiGate unit produces plain text files.
WebTrends settings
Name/IP
The domain name or IP address of the WebTrends server that stores the
logs.
Level
The FortiGate unit logs all messages at and above the logging severity
level you select. For example, if you select Error, the unit logs Error,
Critical, Alert and Emergency level messages. See Table 33, Logging
severity levels, on page 354.
Note: To record traffic log messages, you must set the logging severity level to Notification
when configuring the logging location. Traffic log messages do not generally have a severity
level higher than Notification.
Also, you must enable traffic logging for specific interfaces or firewall policies.
01-28008-0003-20050204
355
356
Authentication
Enable
SMTP Server
SMTP User
Password
Email To
Test
Level
The FortiGate unit sends alert email for all messages at and above the
logging severity level you select.
Emergency
The interval to wait before sending an alert e-mail for emergency level
log messages.
Alert
The interval to wait before sending an alert e-mail for alert level log
messages.
Critical
The interval to wait before sending an alert e-mail for critical level log
messages.
Error
The interval to wait before sending an alert e-mail for error level log
messages.
Warning
The interval to wait before sending an alert e-mail for warning level log
messages.
Notification
The interval to wait before sending an alert e-mail for notification level
log messages.
01-28008-0003-20050204
Fortinet Inc.
Information
The interval to wait before sending an alert e-mail for information level
log messages.
Apply
Note: If more than one log message is collected before an interval is reached, the messages
are combined and sent out as one alert email.
You can select specific events to trigger alert email in Log Filter, described in Log
filter options on page 357.
To configure alert email
Note: Before configuring alert email make sure you configure at least one DNS server. The
FortiGate unit uses the SMTP server name to connect to the mail server, and must look up this
name on your DNS server.
Configure the time limit in which to send email for each logging severity level.
Select the logging severity level for which you want to send alert email.
Select Apply.
01-28008-0003-20050204
357
Traffic log
The Traffic Log records all the traffic to and through the FortiGate interfaces. You can
configure logging for traffic controlled by firewall policies and for traffic between any
source and destination addresses. You can also apply global settings, such as
session or packet log. You can apply the following filters:
Policy allowed
traffic
The FortiGate unit logs all traffic that is allowed according to the firewall
policy settings.
Policy violation
traffic
The FortiGate unit logs all traffic that violates the firewall policy settings.
Note: You can enable traffic logging for specific interfaces or firewall policies. See Enabling
traffic logging on page 360 for more information.
Event log
The Event Log records management and activity events, such as when a
configuration has changed or a routing gateway has been added. You can apply the
following filters:
358
System Activity
event
The FortiGate unit logs all system-related events, such as ping server
failure and gateway status.
IPSec negotiation
event
The FortiGate unit logs all IPSec negotiation events, such as progress
and error reports.
DHCP service
event
The FortiGate unit logs all DHCP-events, such as the request and
response log.
01-28008-0003-20050204
Fortinet Inc.
L2TP/PPTP/PPPoE
service event
The FortiGate unit logs all protocol-related events, such as manager and
socket creation processes.
Admin event
The FortiGate unit logs all administrative events, such as user logins,
resets, and configuration updates.
HA activity event
The FortiGate unit logs all high availability events, such as link, member,
and state information.
Firewall
The FortiGate unit logs all firewall-related events, such as user
authentication event authentication.
Pattern update
event
The FortiGate unit logs all pattern update events, such as antivirus and
IPS pattern updates and update failures.
Anti-virus log
The Anti-virus Log records virus incidents in Web, FTP, and email traffic, such as
when the FortiGate unit detects an infected file, blocks a file type, or blocks an
oversized file or email. You can apply the following filters:
Virus infected
Filename blocked
File oversized
The FortiGate unit logs all instances of blocked content (specified in the
banned words list).
URL block
The FortiGate unit logs all instances of blocked URLs (specified in the
URL block list).
URL exempt
The FortiGate unit logs all instances of allowed URLs (specified in the
URL exempt list).
Blocked category
ratings
The FortiGate unit logs all access attempts to URLs blocked because of
web category filtering settings.
Monitored category The FortiGate unit logs all access attempts to URLs monitored because
of web category filtering settings.
ratings
Category rating
errors
The FortiGate unit logs all instances of web category filtering rating
errors.
Attack log
The Attack Log records attacks detected and prevented by the FortiGate unit. You can
apply the following filters:
Attack Signature
The FortiGate unit logs all detected and prevented attacks based on the
attack signature, and the action taken by the FortiGate unit.
Attack Anomaly
The FortiGate unit logs all detected and prevented attacks based on
unknown or suspicious traffic patterns, and the action taken by the
FortiGate unit.
01-28008-0003-20050204
359
The FortiGate unit logs all instances of blocked email in SMTP traffic.
POP3
The FortiGate unit logs all instances of blocked email in POP3 traffic.
IMAP
The FortiGate unit logs all instances of blocked email in IMAP traffic.
Enable the logging type for each location to which you want to log messages.
Select Apply.
Select Log.
Select OK.
Repeat steps 1 through 4 for each interface for which you want to enable logging.
Make sure you enable traffic logs for a logging location and set the logging severity
level to Notification or lower.
To enable traffic logging for a firewall policy
You can enable traffic logging for a firewall policy. All connections accepted by the
firewall policy are recorded in the traffic log.
360
Select OK.
01-28008-0003-20050204
Fortinet Inc.
Make sure you enable traffic log under Log Filter for a logging location and set the
logging severity level to Notification or lower.
Log access
Log Access provides access to log messages saved to the memory buffer. You can
view and search logs.
This section describes:
The following table describes the features and icons you can use to navigate and
search the logs when viewing logs through the web-based manager.
Type
Go to previous
page
Go to next page
01-28008-0003-20050204
361
Line: /
Type the line number of the first line you want to display. The number
following the slash (/) is the total number of lines in the log.
Search
Advanced Search Select to search log messages by date, time and keywords.
Column settings button. Select to choose columns for log display.
Raw or
Formatted
Choosing columns
You can customize your log messages display using the Column Settings window.
The column settings apply only when the formatted (not raw) display is selected.
Figure 194:Column settings for viewing log messages
Available fields The fields that you can add to the log message display.
362
->
Select to move selected fields from Available fields list to Show these fields
list.
<-
Select to move selected fields from the Show these fields list to the
Available fields list.
Show these
fields in this
order
The fields that are displayed as columns in the log messages list. The fields
are listed in order with the first column at the top of the list.
Move up
Move selected field up one position in the Show these fields list.
Move down
Move selected field down one position in the Show these fields list.
01-28008-0003-20050204
Fortinet Inc.
The Detailed Information column provides the entire raw log entry and is not needed
unless the log contains information not available in any of the other, more specific
columns.
To change the columns in the log message display
1
To add fields, select them in the Available fields list and select the right arrow button.
To remove fields, select them in the Show these fields list and select the left arrow
button.
To change the position of a column, select the field in the Show these fields list and
then select Move Up or Move Down as necessary.
Select OK.
Display the log messages you want to search. For more information, see Viewing log
messages on page 361.
Display the log messages you want to search. For more information, see Viewing log
messages on page 361.
If you want to search for log messages in a particular date range, select the From and
To dates.
01-28008-0003-20050204
363
fortilog setting
Select OK.
The log message list shows only the logs that meet your log search criteria.
CLI configuration
This guide only covers Command Line Interface (CLI) commands and command
keywords that are not represented in the web-based manager. For complete
descriptions of working with CLI commands see the FortiGate CLI Reference Guide.
fortilog setting
Note: The command keywords for fortilog setting that are not represented in the webbased manager are localid and psksecret.
Use this command to configure log settings for logging to a FortiLog unit.
The FortiLog unit is a log analyzer and manager that can combine the log information
from various FortiGate units.
364
Description
Default
Availability
disable
All models.
All models.
01-28008-0003-20050204
Fortinet Inc.
syslogd setting
Description
Default
server
<address_ipv4>
status
Enter enable to enable logging to a
{disable | enable} FortiLog unit.
Availability
All models.
All models.
Note: The IPSec VPN settings for the FortiGate unit must match the VPN settings on the
FortiLog unit.
Example
This example shows how to enable logging to a FortiLog unit, set the FortiLog IP
address, add a local ID, and add a pre-shared key for an IPSec VPN tunnel.
config log fortilog setting
set status enable
set server 192.168.100.1
set localid net_host_c
set psksecret J7fram54AhTWmoF5
end
This example shows how to display the log setting for logging to a FortiLog unit.
get log fortilog setting
This example shows how to display the configuration for logging to a FortiLog unit.
show log fortilog setting
If the show command returns you to the prompt, the settings are at default.
syslogd setting
Note: The only command keyword for syslog setting that is not represented in the webbased manager is the facility keyword.
Use this command to configure log settings for logging to a remote syslog server.
You can configure the FortiGate unit to send logs to a remote computer running a
syslog server.
01-28008-0003-20050204
365
syslogd setting
366
01-28008-0003-20050204
Default
Availability
disable
All models.
local7
All models.
514
All models.
All models.
Fortinet Inc.
syslogd setting
Description
alert
alert messages
audit
audit messages
auth
security/authorization messages
authpriv
clock
clock daemon
cron
daemon
ftp
kernel
kernel messages
local0 local7
lpr
email system
news
ntp
syslog
Example
This example shows how to enable logging to a remote syslog server, configure an IP
address and port for the server, and set the facility type to user.
config log syslogd setting
set status enable
set server 220.210.200.190
set port 601
set facility user
end
This example shows how to display the log setting for logging to a remote syslog
server.
get log syslogd setting
This example shows how to display the configuration for logging to a remote syslog
server.
show log syslogd setting
If the show command returns you to the prompt, the settings are at default.
01-28008-0003-20050204
367
syslogd setting
368
01-28008-0003-20050204
Fortinet Inc.
FortiGuard categories
FortiGuard is a web filtering solution provided by Fortinet. FortiGuard sorts thousands
of Web pages into a wide variety of categories that users can allow, block, or monitor.
The FortiGate unit accesses the nearest FortiGuard server to determine the category
of a requested Web page and then follows the policy configured for that user or
interface.
Please see Category block on page 327 for more information about how FortiGuard
works and how to configure it.
Table 35 describes each FortiGuard category.
Table 35: FortiGuard categories
Category name
Description
Potentially Liable
1. Abused Drugs
2. Cult or Occult
3. Hacking
4. Illegal or Questionable
01-28008-0003-20050204
369
FortiGuard categories
Table 35: FortiGuard categories
Category name
Description
5. Racism or Hate
6. Violence
Objectionable or Controversial
370
7. Abortion
8. Adult Materials
9. Advocacy Groups
11. Gambling
13. Nudity
14. Pornography
15. Tasteless
01-28008-0003-20050204
Fortinet Inc.
FortiGuard categories
Table 35: FortiGuard categories
Category name
Description
16. Weapons
Potentially Non-productive
17. Advertisement
20. Games
27. Spyware
01-28008-0003-20050204
371
FortiGuard categories
Table 35: FortiGuard categories
Category name
Description
General Interest
372
30. Education
33. Health
35. Medicine
01-28008-0003-20050204
Fortinet Inc.
FortiGuard categories
Table 35: FortiGuard categories
Category name
Description
40. Religion
46. Sports
47. Travel
48. Vehicles
01-28008-0003-20050204
373
FortiGuard categories
Table 35: FortiGuard categories
Category name
Description
Business Oriented
49. Business and Economy
Others
374
55. Miscellaneous
01-28008-0003-20050204
Fortinet Inc.
Glossary
Glossary
address: An IP address (logical address) or the
address of a physical interface (hardware address). An
Ethernet address is sometimes called a MAC address.
See also IP address.
aggressive mode: A way to establish a secure
channel during IPSec phase 1 negotiations when the
VPN peer uses its identity as part of the authentication
process. See also main mode.
AH, Authentication Header: An IPSec security
protocol. Fortinet IPSec uses ESP in tunnel mode, not
AH. See ESP.
ARP, Address Resolution Protocol: A protocol that
resolves a logical IP address to a physical Ethernet
address.
authentication: A process whereby a server
determines whether a client may establish a
connection and access private resources.
CA, Certificate Authority: A company that issues
digital certificates to validate the identity of a person or
entity in an online exchange.
CHAP, Challenge Handshake Authentication
Protocol: An authentication protocol supported by
PPP. See also PPP.
client: An application that requires and requests
services from a server.
cluster: A group of FortiGate units that act as a single
virtual FortiGate unit to maintain connectivity even if
one of the FortiGate units in the cluster fails.
cluster unit: A FortiGate unit operating in a FortiGate
HA cluster.
connection: A link between computers, applications,
or processes that can be logical, physical, or both.
decryption: A method of decoding an encrypted file
into its original state.
device failover: A hardware or software problem that
causes a FortiGate unit to stop processing network
traffic. If one of the FortiGate units in a cluster fails, all
functions, all established firewall connections, and all
IPSec VPN sessions are maintained by the other
FortiGate units in the HA cluster.
01-28008-0003-20050204
375
Glossary
376
01-28008-0003-20050204
Fortinet Inc.
Glossary
packet: A piece of data transmitted over a packetswitched network. A packet contains a payload, the
source and destination addresses, and a checksum. In
IP networks, packets are often called datagrams.
Packets are passed between the OSI data-link and
network layers.
01-28008-0003-20050204
377
Glossary
378
01-28008-0003-20050204
Fortinet Inc.
Glossary
01-28008-0003-20050204
379
Glossary
380
01-28008-0003-20050204
Fortinet Inc.
Index
A
address name
firewall address 210
abr-type 175
accept action
firewall policy 203
access-list 186
action
firewall policy 201, 203
Spam filter banned word 346, 347
Spam filter DNSBL and ORDBL 341
Spam filter IP address 339
Spam filter MIME headers 344
action type
Spam filter email address 342
Action, Policy 278
active sessions
HA cluster members 105
AH
active-active
HA 93
alert email
active-passive
HA 93
ActiveX 332
add signature to outgoing emails
protection profile 234
address
firewall 209
firewall address group 212
firewall address options 210
list 210
See also firewall address 209
address group 212
adding 213
create new 212
deleting 213
editing 213
list 212
options 212
service 214
enabling 357
options 356
allow inbound
encrypt policy 203
firewall policy 203
allow outbound
firewall policy 203
allow websites when a rating error occurs (HTTP only)
protection profile 236
allowed
web category report 330
anomaly 294
destination session limit 294
flooding 294
list 294
scan 294
source session limit 294
01-28008-0003-20050204
381
Index
antivirus 299
adware grayware 308
BHO grayware 308
CLI configuration 309
config 306
configure antivirus heuristic 309
dial grayware 308
download grayware 308
file block 300
file block list 301
game grayware 308
grayware 307
grayware options 307
heuristics 309, 310
hijacker grayware 308
joke grayware 308
keylog grayware 308
memfilesizelimit 311, 313, 314, 316, 317
misc grayware 308
NMT grayware 308
order of antivirus operations 300
oversize threshold configuration 306
P2P grayware 308
plugin grayware 308
protection profile configuration 300
quarantine 302
quarantine files list 302
quarantine files list options 303
RAT grayware 308
scanning large files 310
spy grayware 308
toolbar grayware 308
uncompsizelimit 311, 313, 314, 316, 317
virus information 300
virus list 306
virus list updates 300
antivirus options
protection profile 234
antivirus updates 131
through a proxy server 132
ANY
service 214
AOL
service 215
append to
protection profile 237
append with
protection profile 237
archive content meta-information
protection profile 238
area 189
attack updates
scheduling 131
through a proxy server 132
authentication 178, 184, 191
enabling 249
firewall policy 205
timeout 91
382
B
back to HA configuration page
HA cluster members 105
back up configuration 126
backup
custom IPS signature 294
bandwidth
guaranteed 206, 207
maximum 206, 207
banned word
adding words to the Spam filter banned word list 347
edit 322
Spam filter 345
web content block 321, 322
banned word (Spam filter)
action 346, 347
enable 347
language 346, 347
pattern 346, 347
pattern type 346, 347
where 346, 347
banned word check
protection profile 237
banned word list
Spam filter 346
banned word options
Spam filter 346
BGP
service 215
BHO
grayware category 308
bindtoif 282
block unrated websites (HTTP only)
protection profile 235
blocked
web category report 330
border-routers 173
browsing
the Internet through a VPN tunnel 263
01-28008-0003-20050204
Fortinet Inc.
Index
C
CA certificates 274
cache
FortiGuard 328
FortiShield 337
categories
FortiGuard 327, 369
category
protection profile 236
web category report 330
category block 327
configuration options 328
reports 329, 330
category blocking 327
Certificate Name 258, 274
clear session
predefined signature action 290
CLI 19
upgrading the firmware 42, 44
web category block 330
CLI configuration
antivirus 309
cluster
configuring an HA cluster 100
managing an HA cluster 104
cluster ID
HA cluster members 105
cluster members
HA 95, 105
clustering
protocol 93
code 218
command line interface 19
comments
firewall policy 207
Concentrator 262, 266
Concentrator list 267
Concentrator name 267
Concentrator options 267
Concentrator, Manual Key 266
config
antivirus 306
config distance 177
config distribute-list 186
config interface 190
config limit 297
config neighbor 187
config network 189
config offset-list 196
config redistribute 195
configuration
backup 126
FortiGuard 328
reset to factory default 140
restore 126
configure antivirus heuristic
antivirus 309
configuring
manual key IPSec VPN 264
connecting a FortiGate HA cluster 101
contact information
SNMP 108
content archive options
protection profile 237
content block
web filter 321
cookies 332
cost 188, 192
CPU usage
HA cluster members 105
Create New 256, 261, 264, 267
create new
firewall policy 201
csv 366
custom service 218
adding 219
adding a TCP or UDP custom service 219
adding an ICMP custom service 219
adding an IP custom service 219
deleting 219
editing 220
ICMP 218
IP 218
list 217
options 217
TCP 218
custom signature
adding 293
backing up and restoring 294
IPS 292
custom TCP service 217
customer service 24
D
database 173
RIP 174
database-filter-out 192
database-overflow 175
database-overflow-max-lsas 175
database-overflow-time-to-recover 175
date
quarantine files list 303
date setting 89
DC
quarantine files list 303
DDNS 64
Dead Peer Detection 260
dead-interval 184, 192
debug log
back up 126
restore 126
default heartbeat device configuration
HA 99
default-cost 178
01-28008-0003-20050204
383
Index
default-information-metric 175
default-information-metric-type 175
default-information-originate 175
default-information-route-map 175
default-metric 176
deny action
firewall policy 203
deny split tunneling 263
dest
firewall policy 201
destination address name
firewall policy 202
destination interface/zone
firewall policy 202
destination IP address
example 277
destination port 218
destination session limit
anomaly type 294
device 198
device failover
HA 93
DH Group 263
DH Group, Phase 1 260
DHCP
and IP Pools 204
HA 94
service 215
DHCP-IPSec 263
dial
grayware category 308
dialup VPN
monitor 269
differentiated services
firewall policy 206
original (forward) DSCP value 207
reverse (reply) DSCP value 207
differentiated services code point 206
DiffServ
firewall policy 206
direction 180
disable
firewall policy 208
Disk logging settings 354
disk space
quarantine 305
display content meta-information on the system dashboard
protection profile 238
dissector signature
IPS 291
distance 176
DNS
service 215
DNSBL
adding a server to the DNSBL and ORDBL list 341
Spam filter 340
DNSBL list
Spam filter 341
384
DNSBL options
Spam filter 341
DNSBL server
Spam filter DNSBL and ORDBL 341
download
grayware category 308
quarantine files list 303
dpd-idlecleanup 280
dpd-idleworry 280
dpd-retrycount 280
dpd-retryinterval 280
drop
predefined signature action 289
drop sessiondrop
predefined signature action 290
drop_heuristic 310
DSCP 206
dst 198, 268
dst2 268
duplicates
quarantine files list 303
Dynamic DNS 257
on network interface 60
dynamic DNS
monitor 269, 270
dynamic IP pool
IP pool 244, 245, 247, 249
dynamic IP pool NAT option
firewall policy 204
dynamic NAT
IP pool 231
dynamic port forwarding 225
dynamic port forwarding virtual IP
adding 228
E
email address
action type 342
adding an email address or domain to the Spam filter email
address list 342
pattern type 342
Spam filter 342
email address BWL check
protection profile 236
email address list
Spam filter 342
email address options
Spam filter 342
email scanning
oversize threshold 306
enable
firewall policy 201, 208
Spam filter banned word 347
enable AutoSubmit
quarantine 305
enable cache
FortiShield 337
01-28008-0003-20050204
Fortinet Inc.
Index
enable category block (HTTP only)
protection profile 235
Enable perfect forward secrecy (PFS) 263
Enable replay detection 263
enable service
FortiShield 337
encrypt action
firewall policy 203
encrypt policy
allow inbound 203
inbound NAT 203
outbound NAT 203
VPN tunnel 203
Encryption
for FortiLog unit 353
Encryption Algorithm 257, 264
Encryption Algorithm, Manual Key 265
Encryption Key, Manual Key 266
end IP
IP pool 230
ESP
service 215
exempt
URL exempt list 326
expiration
FortiShield 337
expire
system status 40
external interface
virtual IP 227
external IP address
virtual IP 227
external service port
virtual IP 227
F
facility 366
fail open 298
failover
HA 92
monitoring cluster units 106
FDN
FortiProtect Distribution Network 128
FDS
FortiProtect Distribution Server 128
FGCP
HA 93
file block
adding a filename or pattern to the list 302
antivirus 300
default list of patterns 301
pattern 301
protection profile 234
file block list
antivirus 301
configuring 302
file name
quarantine files list 303
file pattern
quarantine autosubmit list 304
filename
adding to the file block list 302
filter
quarantine files list 303
FINGER
service 215
firewall 199
address 209
address group options 212
address list 210
address options 210
authentication timeout 91
configuring 199
custom service list 217
custom service options 217
introduction 15
IP pool 229
one-time schedule 222
overview 199
policy 200
policy list 201
policy matching 200
policy options 201
predefined services 214
protection profile 232
recurring schedule 223, 224
schedule 221
service 213
virtual IP 225
virtual IP list 226
virtual IP options 226
firewall address 209
adding 211
address group 212
address name 210
create new 210
deleting 212
editing 211
IP range/subnet 210
list 210
name 210
options 210
subnet 210
type 210
firewall address group
adding 213
available addresses 213
deleting 213
editing 213
group name 213
members 213
firewall IP pool list 230
firewall IP pool options 230
firewall policies for IPSec VPN
adding 277
01-28008-0003-20050204
385
Index
firewall policy
accept action 203
action 201, 203
adding 207
adding a protection profile 239
address name 202
advanced 204
allow inbound 203
allow outbound 203
authentication 205
changing the position in the policy list 208
comments 207
configuring 207
create new 201
deleting 207
deny action 203
dest 201
destination address name 202
destination interface/zone 202
differentiated services 206
DiffServ 206
disabling 208
dynamic IP pool NAT option 204
editing 207
enable 201
enabling 208
encrypt action 203
fixed port NAT option 204
guaranteed bandwidth 206, 207
ID 201
inbound NAT 203
insert policy before 201
interface/zone 202
log traffic 204
maximum bandwidth 206, 207
move to 201
moving 208
NAT 203
original (forward) DSCP value 207
outbound NAT 203
protection profile 204
reverse (reply) DSCP value 207
schedule 201, 202
service 201, 203
source 201
source address name 202
source interface/zone 202
traffic priority 206
traffic shaping 206
VPN tunnel 203
firewall protection profile
default protection profiles 233
list 232
options 233
386
firewall service
AH 214
ANY 214
AOL 215
BGP 215
DHCP 215
DNS 215
ESP 215
FINGER 215
FTP 215
GOHPER 215
GRE 214
H323 215
HTTP 215
HTTPS 215
ICMP_ANY 216
IKE 215
IMAP 215
INFO_ADDRESS 216
INFO_REQUEST 216
Internet-Locator-Service 215
IRC 215
L2TP 215
LDAP 215
NetMeeting 215
NFS 215
NNTP 216
NTP 216
OSPF 216
PC-Anywhere 216
PING 216
POP3 216
PPTP 216
QUAKE 216
RAUDIO 216
RIP 216
RLOGIN 216
SIP-MSNmessenger 216
SMTP 216
SNMP 216
SSH 216
SYSLOG 216
TALK 216
TCP 216
TELNET 217
TFTP 217
TIMESTAMP 216
UDP 217
UUCP 217
VDOLIVE 217
WAIS 217
WINFRAME 217
X-WINDOWS 217
firmware
installing 45
re-installing current version 45
reverting to an older version 45
upgrading to a new version 41
upgrading using the CLI 42, 44
upgrading using the web-base manager 41, 43
01-28008-0003-20050204
Fortinet Inc.
Index
fixed port 204
IP pool 231
fixed port NAT option
firewall policy 204
flooding
anomaly type 294
FortiGate Clustering Protocol
HA 93
FortiGuard 327
cache 328
categories 327, 369
changing the host name 330
CLI configuration 330
configuration 328
configuration options 328
configuring 329
enable service 328
generating a report 330
licensing 328
ratings 327
report allowed 330
report blocked 330
report category 330
report options 330
report profiles 330
report range 330
report type 330
reports 329
service points 327
TTL 329
Fortilog logging settings 353
fortilog setting 364
Fortinet customer service 24
FortiProtect Distribution Network 128
FortiProtect Distribution Server 128
FortiShield
cache 337
changing the FortiShield hostname 338
CLI configuration 338
communication protocol 336
configuration 336
enable cache 337
enable service 337
expiration 337
license type 337
licensing 336
options 337
service points 336
Spam filter 335
status 337
TTL 337
from IP
system status 40
from port
system status 40, 66
FTP
memfilesizelimit 313
service 215
uncompsizelimit 313
ftp 240
G
game
grayware category 308
gateway 198
Gateway IP 256
Gateway Name 256, 257
go
HA cluster members 105
GOPHER
service 215
grayware
adware 308
antivirus 307
BHO 308
dial 308
download 308
game 308
hijacker 308
joke 308
keylog 308
misc 308
NMT 308
P2P 308
plugin 308
RAT 308
spy 308
toolbar 308
grayware options
antivirus 307
GRE
service 214
group ID
HA 96
grouping services 220
groups
user 249
guaranteed bandwidth 207
firewall policy 206
traffic shaping 206
H
H323
service 215
01-28008-0003-20050204
387
Index
HA 92, 93, 95
active-active 93
active-passive 93
add a new unit to a functioning cluster 103
cluster members 95, 105
cluster units 92
configuration 94
configure a FortiGate unit for HA operation 100
configure weighted-round-robin weights 103
configuring and HA cluster 100
connect a FortiGate HA cluster 101
default heartbeat device configuration 99
device failover 93
DHCP 94
failover 92
FGCP 93
group ID 96
HA monitor 105
heartbeat device IP addresses 99
heartbeat failover 93
hub (schedule) 97
introduction 18
IP (schedule) 98
IP Port (schedule) 98
L2TP 94
least-connection schedule 97
link failover 93
load balancing 93
manage individual cluster units 107
manage logs for individual cluster units 106
managing a cluster 104
mode 95
modes 93
monitor cluster units for a failover 106
monitor priorities 99
none (schedule) 97
override master 97
overview 92
password 97
PPP 94
PPPoE 94
PPTP 94
primary cluster unit 92
primary unit 92
priorities of heartbeat device 98
random (schedule) 98
round-robin 97
schedule 97
standalone mode 95
unit priority 96
view the status of each cluster member 105
weighted-round-robin 97
388
HA cluster members
active sessions 105
back to HA configuration page 105
cluster ID 105
CPU usage 105
go 105
intrusion detected 106
memory usage 105
monitor 105
network utilization 106
refresh every 105
status 105
total bytes 106
total packets 105
up time 105
virus detected 105
header
Spam filter MIME headers 344
heartbeat
failover 93
heartbeat device 93
HA 93
heartbeat device IP addresses
HA 99
hello-interval 184, 192
HELO DNS lookup
protection profile 236
heuristics
antivirus 309, 310
drop_heuristic 310
quarantine 310
store_heuristic 310
High Availability 95
high availability
introduction 18
high availability See HA 92
hijacker
grayware category 308
HTTP
memfilesizelimit 311
service 215
uncompsizelimit 311
virus scanning large files 310
http 240
HTTPS 19, 25
service 215
hub
HA schedule 97
I
ICMP 216
ICMP custom service 218
adding 219
code 218
protocol type 218
type 218
ICMP_ANY
service 216
01-28008-0003-20050204
Fortinet Inc.
Index
ID
firewall policy 201
idle timeout
web-based manager 91
IKE
service 215
IMAP
memfilesizelimit 316
service 215
uncompsizelimit 316
inbound NAT
firewall policy 203
INFO_ADDRESS
service 216
INFO_REQUEST
service 216
insert policy before
firewall policy 201
Interface
IP pool 230
interface 173, 192
administrative status 56, 77
bringing down 62
bringing up 62
RIP 174
starting 62
interface/zone
firewall policy 202
Interface/Zone, Policy 277
Internet browsing
through a VPN tunnel 263
Internet-Locator-Service
service 215
intrusion detected
HA cluster members 106
intrusion prevention system See Also IPS 287
IP
HA schedule 98
virtual IP 226
ip 188, 192, 283
IP Address 257
IP address
action 339
heartbeat device 99
Spam filter 339
IP address BWL check
protection profile 236
IP address FortiShield check
protection profile 236
IP address list
Spam filter 339
IP address options
Spam filter 339
IP custom service 218, 219
adding 219
protocol number 219
protocol type 219
IP Pool
DHCP 204
PPPoE 204
IP pool 204, 229
adding 231
configuring 231
create new 230
deleting 231
dynamic NAT 231
edit 231
end IP 230
fixed port 231
interface 230
IP range/subnet 230
list 230
name 230
options 230
start IP 230
IP port
HA schedule 98
IP range/subnet
firewall address 210
IP pool 230
IP Range/Subnet, Address 277
ipaddress 297
IPS 17
adding custom signatures 293
anomaly 294
anomaly list 294
configuring predefined signatures 290
custom signatures 292
disabling predefined signatures 290
dissector signatures 291
enabling predefined signatures 290
predefined signature action 289
predefined signature list 289
predefined signatures 288
restoring predefined signature settings 291
signature 288
updates and information 287
IPS anomaly
protection profile 237
IPS options
protection profile 237
IPS See also intrusion prevention system 287
IPS signature
protection profile 237
ipsec vip 282
IPSec VPN
authentication for user group 249
Internet browsing 263
monitor 269
ping generator 267
remote gateway 249
IPv6 79
IRC
service 215
01-28008-0003-20050204
389
Index
J
Javascript 332
joke
grayware category 308
K
Keepalive Frequency 260
Key Size 274
Key Type 274
Keylife 260, 263
keylog
grayware category 308
L
L2TP 249
configuring gateway 271
enabling 271
HA 94
overview 271
service 215
language
Spam filter banned word 346, 347
web content block 321, 322
web-based manager 91
LDAP
service 215
Least-Connection
HA schedule 97
license
FortiGuard 328
license type
FortiShield 337
licensing
FortiShield 336
Lifetime (sec/kb) 261
link failover
HA 93
list 180
load balancing
HA 93
Local certificate list 272
Local certificate options 273
Local ID 260
Local SPI, Manual Key 265
Log & report 351
Log file upload settings 354
Log filter options 357
Log settings 352
log traffic
firewall policy 204
Logging 361
logging 20
predefined signature 289
390
logs
managing for individual cluster units 106
low disk space
quarantine 305
M
manage cluster units
HA 107
Managing digital certificates 272
Manual Key 263
manual key IPSec configuration
configuration steps 264
Manual key list 264
Manual key options 265
map to IP
virtual IP 226, 227
map to port
virtual IP 226, 227
matching
policy 200
max filesize to quarantine
quarantine 305
maximum bandwidth 206, 207
firewall policy 206
traffic shaping 206
md5-key 184, 192
member 252
Members 267
memfilesizelimit 311, 313, 314, 316, 317
Memory logging settings 355
memory usage
HA cluster members 105
metric 195
metric-type 195
MIB
FortiGate 111
MIME headers
action 344
adding MIME headers to the Spam filter MIME header list
345
header 344
pattern type 344
Spam filter 343
value 344
MIME headers check
protection profile 237
MIME headers list
Spam filter 344
MIME headers options
Spam filter 344
misc
grayware category 308
Mode 256, 257
mode
HA 93, 95
Transparent 16
01-28008-0003-20050204
Fortinet Inc.
Index
monitor
HA 105
HA cluster members 105
IPSec VPN 269
monitor priorities
HA 99
move to
firewall policy 201
mtu 192
MTU size 61
mtu-ignore 193
N
name
IP pool 230
NAT
encrypt policy 203
firewall policy 203
inbound 203
introduction 16
outbound 203
push update 134
NAT/Route mode
introduction 16
natip 209
Nat-traversal 260
neighbor 173
netmask
administrator account 122
NetMeeting
service 215
network address translation
introduction 16
network intrusion detection 17
network utilization
HA cluster members 106
network-type 193
next hop router 65
NFS
service 215
NMT
grayware category 308
NNTP
service 216
none
HA schedule 97
nssa-default-information-originate 178
nssa-default-information-originate-metric 178
nssa-default-information-originate-metric-typ 178
nssa-redistribution 178
nssa-translator-role 179
NTP
service 216
NTP server 90
setting system date and time 89
one-time schedule
adding 223
configuring 223
create new 222
creating 222
deleting 223
editing 223
list 222
options 222
start 222
stop 222
options
changing system options 90
ORDBL
Spam filter 340
ORDBL list
adding a server to the DNSBL and ORDBL list 341
Spam filter 341
Spam options 341
order of operations
antivirus 300
web filter 320
original (forward) DSCP value
firewall policy 207
OSPF 174
service 216
outbound NAT
encrypt policy 203
firewall policy 203
out-interface 283
override master
HA 97
oversize threshold
email scanning 306
oversize threshold configuration
antivirus 306
oversized file/email
protection profile 234
P
P1 Proposal, Phase 1 259
P2 Proposal, Phase 2 262
P2P
grayware category 308
pass
predefined signature action 289
pass fragmented emails
protection profile 234
pass sessiondrop
predefined signature action 290
passive-interface 176
password
HA 97
01-28008-0003-20050204
391
Index
pattern 325
added to the web pattern block list 325
adding to the file block list 302
default list of file block patterns 301
file block 301
Spam filter banned word 346, 347
Pattern block options 325
pattern type
Spam filter banned word 346, 347
Spam filter email address 342
Spam filter MIME headers 344
web content block 321, 322
PC-Anywhere
service 216
peer 185
Peer option 258
Perl regular expressions
Spam filter 347
Phase 1 256
Phase 1 advanced options 259
Phase 1 basic settings 257
Phase 1 list 256
Phase 2 260
Phase 2 advanced options 262
Phase 2 basic settings 261
Phase 2 list 261
PING
service 216
ping generator
IPSec VPN 267
plugin
grayware category 308
policy
accept action 203
action 201, 203
adding 207
address name 202
advanced 204
allow inbound 203
allow outbound 203
authentication 205
changing the position in the policy list 208
comments 207
configuring 207
create new 201
deleting 207
deny action 203
dest 201
destination address name 202
destination interface/zone 202
differentiated services 206
DiffServ 206
disabling 208
dynamic IP pool NAT option 204
editing 207
enable 201
enabling 208
392
01-28008-0003-20050204
Fortinet Inc.
Index
predefined signature
action 289
actions 289
clear session action 290
configuring 290
disabling 290
drop action 289
drop session action 290
enabling 290
list 289
logging 289
pass action 289
pass session action 290
reset action 289
reset client action 290
reset server action 290
restoring recommended settings 291
revision 289
prefix 182, 189, 196
Pre-shared Key 258
Pre-shared key
for FortiLog unit 353
priorities of heartbeat device
HA 98
priority 188, 193
profile 282
category block reports 330
protection 232
protection profile 232
add signature to outgoing emails 234
adding 238
adding to a firewall policy 239
allow websites when a rating error occurs (HTTP only) 236
antivirus options 234
append to 237
append with 237
archive content meta-information 238
banned word check 237
block unrated websites (HTTP only) 235
category 236
configuring 238
content archive options 237
default protection profiles 233
deleting 238
display content meta-information on the system dash-
board 238
editing 238
email address BWL check 236
enable category block (HTTP only) 235
file block 234
firewall policy 204
HELO DNS lookup 236
IP address BWL check 236
IP address FortiShield check 236
IPS anomaly 237
IPS options 237
IPS signature 237
list 232
MIME headers check 237
options 233
oversized file/email 234
pass fragmented emails 234
provide details for blocked HTTP 4xx and 5xx errors (HTTP only) 235
rate images by URL (blocked images will be replaced with
blanks) (HTTP only) 235
RBL & ORDBL check 236
return email DNS check 237
scan (default protection profile) 233
spam action 237
spam filtering options 236
strict (default protection profile) 233
unfiltered (default protection profile) 233
URL FortiShield check 236
virus scan 234
web (default protection profile) 233
web category options 235
web content block 235
web exempt list 235
web filtering options 234
web resume download block 235
web script filter 235
web URL block 235
protection profile configuration
web filter 320
protocol 186
service 214
system status 40
virtual IP 227
protocol number 219
protocol type 218, 219
provide details for blocked HTTP 4xx and 5xx errors (HTTP
only)
protection profile 235
Proxy ID Destination 269, 270
Proxy ID Source 269, 270
proxy server 132
push updates 132
push update
configuring 133
external IP address changes 133
management IP address changes 134
through a NAT device 134
through a proxy server 132
01-28008-0003-20050204
393
Index
Q
QoS 206
QUAKE
service 216
quality of service 206
quarantine
adding file patterns to the autosubmit list 304
age limit 305
antivirus 302
autosubmit list 304
autosubmit list file pattern 304
autosubmit list options 304
configuration 305
configuring the autosubmit list 304
enable AutoSubmit 305
enabling uploading autosubmit file patterns 304
heuristics 310
low disk space 305
max filesize to quarantine 305
options 305
quarantine files list
antivirus 302
apply 303
date 303
DC 303
download 303
duplicates 303
file name 303
filter 303
options 303
service 303
sort by 303
status 303
status description 303
submit 303
TTL 303
upload status 303
Quick Mode Identities 263
R
random
HA schedule 98
range
web category reports 330
RAT
grayware category 308
rate images by URL (blocked images will be replaced with
blanks) (HTTP only)
protection profile 235
ratings
FortiGuard 327
RAUDIO
service 216
RBL & ORDBL check
protection profile 236
read & write access level
administrator account 89, 121, 125, 129, 136
394
01-28008-0003-20050204
Fortinet Inc.
Index
router
next hop 65
router-id 176
routing
configuring 69
policy 155
S
scan
anomaly type 294
default protection profile 233
schedule
automatic antivirus and attack definition updates 131
creating one-time 222
firewall 221
firewall policy 201, 202
HA 97
one-time schedule list 222
one-time schedule options 222
recurring schedule list 223
recurring schedule options 224
Schedule, Policy 277
scheduled antivirus and attack updates 132
scheduled updates
through a proxy server 132
scheduling 131
script filter 331
ActiveX 332
cookies 332
Javascript 332
options 332
select
recurring schedule 224
server 365, 366
service
AH 214
ANY 214
AOL 215
BGP 215
custom service list 217
custom service options 217
custom TCP 217
DHCP 215
DNS 215
ESP 215
FINGER 215
firewall 213
firewall policy 201, 203
FTP 215
GOPHER 215
GRE 214
group 220
H323 215
HTTPS 215
ICMP_ANY 216
IKE 215
IMAP 215
INFO_ADDRESS 216
INFO_REQUEST 216
Internet-Locator-Service 215
IRC 215
L2TP 215
LDAP 215
NetMeeting 215
NFS 215
NNTP 216
NTP 216
organizing services into groups 221
OSPF 216
PC-Anywhere 216
PING 216
POP3 216
PPTP 216
predefined 214
QUAKE 216
quarantine files list 303
RAUDIO 216
RIP 216
RLOGIN 216
service name 214
SIP-MSNmessenger 216
SMTP 216
SNMP 216
SSH 216
SYSLOG 216
TALK 216
TCP 216
TELNET 217
TFTP 217
TIMESTAMP 216
UDP 217
user-defined TCP 217
UUCP 217
VDOLIVE 217
WAIS 217
WINFRAME 217
X-WINDOWS 217
service ftp 312
service group 220
adding 221
create new 220
deleting 221
editing 221
list 220
options 220
service imap 315
service point
FortiGuard 327
service points
FortiShield 336
service pop3 314
service port
virtual IP 226
service smtp 317
Service, Policy 277
set time 90
shortcut 179
01-28008-0003-20050204
395
Index
signature
adding custom IPS signatures 293
custom IPS signatures 292
dissector 291
IPS 288
single-source 282
SIP-MSNmessenger
service 216
SMTP
memfilesizelimit 317
service 216
uncompsizelimit 317
smtp 241
SNMP
contact information 108
MIBs 111
service 216
traps 112
sort by
quarantine files list 303
source
firewall policy 201
source address name
firewall policy 202
source interface/zone
firewall policy 202
source IP address
example 277
source port 218
source session limit
anomaly type 294
spam action
protection profile 237
Spam filter 333
adding a server to the DNSBL and ORDBL list 341
adding an email address or domain to the Spam filter email
address list 342
adding MIME headers to the Spam filter MIME header list
396
345
adding words to the Spam filter banned word list 347
banned word 345
banned word list 346
banned word options 346
DNSBL 340
DNSBL list 341
DNSBL options 341
email address 342
email address list 342
email address options 342
FortiShield 335
FortiShield options 337
IP address 339
IP address list 339
IP address options 339
MIME headers 343
MIME headers list 344
MIME headers options 344
ORDBL 340
ORDBL list 341
ORDBL options 341
Perl regular expressions 347
Spam filter DNSBL and ORDBL
action 341
DNSBL server 341
spam filtering options
protection profile 236
spf-timers 176
split tunneling
deny 263
spy
grayware category 308
src 268
src2 268
SSH
service 216
SSL
service definition 215
standalone mode
HA 95
start
one-time schedule 222
recurring schedule 224
start IP
IP pool 230
static IP
monitor 269, 270
static NAT virtual IP 225
adding 227
Status 261
status 173, 194, 195, 268, 365, 366
FortiShield 337
HA cluster members 105
interface 56, 77
quarantine files list 303
status description
quarantine files list 303
01-28008-0003-20050204
Fortinet Inc.
Index
stop
one-time schedule 222
recurring schedule 224
store_heuristic 310
Strict
default protection profile 233
stub-type 179
Subject Information 274
submit
quarantine files list 303
subnet
firewall address 210
substitute 182
substitute-status 182
syn interval 90
synchronize with NTP server 90
SYSLOG
service 216
Syslog logging settings 355
system configuration 89
system date and time
setting 89
system options
changing 90
T
tag 195, 196
TALK
service 216
TCP
custom service 217
service 216
TCP custom service 218
adding 219
destination port 218
protocol type 218
source port 218
technical support 24
TELNET
service 217
TFTP
service 217
threshold 297
time
setting 89
time zone 90
Timeout 261, 269, 270
timeout
firewall authentication 91
idle 91
web-based manager 91
TIMESTAMP
service 216
to IP
system status 40
to port
system status 40
toolbar
grayware category 308
total bytes
HA cluster members 106
total packets
HA cluster members 105
Traffic Priority 206
traffic priority
firewall policy 206
traffic shaping 206
traffic shaping
firewall policy 206
guaranteed bandwidth 206
maximum bandwidth 206
traffic priority 206
transmit-delay 185, 194
Transparent mode 16
traps
SNMP 112
trusted host
administrator account 122
Administrators options 122
security issues 122
TTL
FortiGuard 329
FortiShield 337
quarantine files list 303
Tunnel Name 261, 262
type 179, 218
firewall address 210
virtual IP 227
U
UDP 218
service 217
UDP custom service 218
adding 219
destination port 218
protocol type 218
source port 218
uncompsizelimit 311, 313, 314, 316, 317
Unfiltered
default protection profile 233
unit priority
HA 96
up time
HA cluster members 105
update
push 133
updates
virus list 300
upgrade
firmware 41
upgrading
firmware using the CLI 42, 44
firmware using the web-based manager 41, 43
upload status
quarantine files list 303
01-28008-0003-20050204
397
Index
Uploading a local certificate 274
URL block
add a URL to the web filter block list 324
web filter 322
URL exempt
configuring 326
list 326
options 326
web filter 325
URL FortiShield check
protection profile 236
user groups
configuring 249
user-defined TCP services 217
Username 269
UUCP
service 217
V
value
Spam filter MIME headers 344
VDOLIVE
service 217
virtual domain
properties 142
virtual IP 225
adding 227, 228
adding a dynamic port forwarding virtual IP 228
adding a port forwarding virtual IP 228
adding a static NAT virtual IP 227
configuring 227
create new 226
deleting 229
editing 229
external interface 227
external IP address 227
external service port 227
firewall 225
IP 226
list 226
map to IP 226, 227
map to port 226, 227
options 226
port forwarding 225
protocol 227
service port 226
static NAT 225
type 227
virtual-links 173
virus
virus list information 300
virus list updates 300
virus detected
HA cluster members 105
virus list 306
virus protection
worm protection 14
virus protection See also antivirus 299
398
virus scan
protection profile 234
VLAN
overview 70
VLAN subinterface
bringing down 62
bringing up 62
starting 62
VPN
introduction 17
VPN certificates
restore 127
upload 127
VPN tunnel
encrypt policy 203
firewall policy 203
VPN Tunnel, Policy 278
VPNs 255
W
WAIS
service 217
Web
default protection profile 233
web category block
changing the host name 330
CLI configuration 330
configuration options 328
configuring 329
generating a report 330
report allowed 330
report blocked 330
report category 330
report options 330
report profiles 330
report range 330
report type 330
reports 329
web category options
protection profile 235
web content block
banned word 321, 322
language 321, 322
pattern type 321, 322
protection profile 235
web filter 321, 322
web content block list
web filter 321
web content filtering
introduction 14
web exempt list
protection profile 235
01-28008-0003-20050204
Fortinet Inc.
Index
web filter 319
add a URL to the web URL block list 324
category block 327
configuring the web content block list 322
configuring the web URL block list 324
content block 321
order of operations 320
protection profile configuration 320
script filter 331
URL block 322
URL exempt 325, 326
URL exempt options 326
web content block list 321
web content block options 321
web pattern block list 324, 325
web URL block list 323
web URL block options 323
web filtering options
protection profile 234
Web pattern block 324
web pattern block 325
adding a pattern 325
configuring 325
list 324
options 325
pattern 325
web resume download block
protection profile 235
X
XAuth 260
X-WINDOWS
service 217
01-28008-0003-20050204
399
Index
400
01-28008-0003-20050204
Fortinet Inc.