
FortiGate-50R Installation and Configuration Guide Version 2.50 MR2
FortiGate-50R Installation and Configuration Guide
113
Firewall configuration
Firewall policies control all traffic passing through the FortiGate unit. Firewall policies
are instructions used by the FortiGate unit to decide what to do with a connection
request. When the firewall receives a connection request in the form of a packet, it
analyzes the packet to extract its source address, destination address, and service
(port number).
For the packet to be connected through the FortiGate unit, a firewall policy must have
been added that matches the packet’s source address, destination address, and
service. The policy directs the firewall action on the packet. The action can be to allow
the connection, deny the connection, require authentication before the connection is
allowed, or process the packet as an IPSec VPN packet. You can also add schedules
to policies so that the firewall can process connections differently depending on the
time of day or the day of the week, month, or year.
Each policy can be individually configured to route connections or to apply network
address translation (NAT) to translate source and destination IP addresses and ports.
You can add IP pools to use dynamic NAT when the firewall translates source
addresses. You can use policies to configure port address translation (PAT) through
the FortiGate.
Content profiles can be added to policies to apply antivirus protection, web filtering,
and email filtering to web, file transfer, and email services. You can create content
profiles that perform one or any combination of the following actions:
• Apply antivirus protection to HTTP, FTP, SMTP, IMAP, or POP3 services.
• Apply web filtering to HTTP services.
• Apply email filtering to IMAP and POP3 services.
You can also add logging to a firewall policy so that the FortiGate unit logs all
connections that use this policy.
This chapter describes:
•
Default firewall configuration
•
Adding firewall policies
•
Configuring policy lists
•
Addresses
•
Services
•
Schedules
•
Virtual IPs
•
IP pools
•
IP/MAC binding
•
Content profiles
Summary of Contents for FortiGate 50R
Page 16: ...16 Fortinet Inc Customer service and technical support Introduction ...
Page 32: ...32 Fortinet Inc Next steps Getting started ...
Page 40: ...40 Fortinet Inc Completing the configuration NAT Route mode installation ...
Page 112: ...112 Fortinet Inc Customizing replacement messages System configuration ...
Page 144: ...144 Fortinet Inc Content profiles Firewall configuration ...
Page 202: ...202 Fortinet Inc Logging attacks Network Intrusion Detection System NIDS ...
Page 216: ...216 Fortinet Inc Exempt URL list Web filtering ...
Page 228: ...228 Fortinet Inc Configuring alert email Logging and reporting ...
Page 232: ...232 Fortinet Inc Glossary ...