What’s new in FortiOS 4.0
Enhanced Antispam Engine (ASE)
FortiGate Version 4.0 Administration Guide
01-400-89802-20090424
33
•
set ips-sniffer-mode enable
end
IPS interface policies for IPv6
Similar to interface-based DoS policies for IPv4, you can use the FortiGate CLI command
config firewall interface-policy6
to add IPv6 interface-based policies. In
FortiOS version 4.0, you can add IPS Sensors to IPv6 interface-based policies:
config firewall interface-policy6
edit 1
set interface "port1”
set srcaddr6 "all"
set dstaddr6 "all"
set service6 "ANY"
set ips-sensor-status enable
set ips-sensor "all_default"
end
IPS Packet Logging
For FortiOS 4.0 IPS packet logging has been enhanced to allow sending log messages to
a FortiAnalyzer unit or the
FortiGuard Analysis and Manager Service
. Also if you are
storing IPS packets logs in FortiGate memory new CLI commands are available to control
the amount of memory to available and the number of packets that are saved when
logging packets.
For more information, see
Enhanced Antispam Engine (ASE)
FortiOS 4.0 includes a new Antispam Engine (ASE) that can be updated from the
FortiGuard Distribution Network to add new antispam techniques without requiring a
FortiOS firmware update. You can also update the ASE manually using the following CLI
command:
execute restore ase {ftp | sftp} <filename> <server> <userid>
WCCP v2 support
You can now use WCCP v2 to configure a FortiGate unit to optimize web traffic, thus
reducing transmission costs and downloading time. This traffic includes user requests to
view pages on Web servers and the replies to those requests. When a user requests a
page from a web server, the FortiGate unit sends that request to a cache server (also
called a web-cache server). If the cache server has a copy of the requested page in
storage, the cache server sends the user that page. Otherwise, the cache server retrieves
the requested page, caches a copy of it, and forwards it to the user.
The FortiGate unit supports WCCP v2 by transparently redirecting selected types of traffic
to a group of cache servers. When WCCP is enabled, the FortiGate unit maintains a web
cache server list in the WCCP database.
To configure WCCP support you use the
config system wccp
command to enable
WCCP support. Then you enable WCCP for firewall policies using the
wccp
keyword.
When these WCCP-enabled firewall policies accept traffic, the traffic is re-directed to a
cache server. The FortiGate unit uses the information in the WCCP database to determine
the cache server to redirect the traffic to.
Summary of Contents for Gate 60D
Page 705: ...www fortinet com...
Page 706: ...www fortinet com...