Firewall
Policy
FortiGate-1000A/FA2 Administration Guide
01-28011-0254-20051115
207
Schedule
Select a schedule that controls when the policy is available to be matched with
connections. See
“Schedule” on page 226
.
Service
Select the name of a service or service group that matches the service or protocol of
the packets to be matched with this policy. You can select from a wide range of
predefined services or add custom services and service groups. See
“Service” on
page 218
.
Action
Select how you want the firewall to respond when the policy matches a connection
attempt.
VPN Tunnel
Select a VPN tunnel for an ENCRYPT policy. You can select an AutoIKE key or
Manual Key tunnel.
ACCEPT
Accept connections matched by the policy. You can also configure NAT,
protection profiles, log traffic, traffic shaping, authentication, and differentiated
services. You can also add a comment to the policy.
DENY
Select deny to reject connections matched by the policy. The only other policy
options that you can configure are log traffic (to log the connections denied by
this policy) and differentiated services. You can also add a comment to the
policy.
ENCRYPT
Select encrypt to make this policy an IPSec VPN policy. An IPSec VPN policy
causes the FortiGate unit to accept IPSec packets. When encrypt is selected
the VPN Tunnel Options appear. You can also configure protection profiles, log
traffic, traffic shaping, and differentiated services. You can also add a comment
to the policy. You cannot configure NAT or add authentication to an encrypt
policy. For more information, see
“Adding firewall policies for IPSec VPN
tunnels” on page 284
.
Allow Inbound
Select to enable traffic from a dialup client or computers on the remote
private network to initiate the tunnel.
Allow outbound
Select to enable traffic from computers on the local private network to initiate
the tunnel.
Inbound NAT
Select to translate the source IP addresses of inbound decrypted packets
into the IP address of the FortiGate interface to the local private network.
Outbound NAT
Select in combination with a
natip
CLI value to translate the source
addresses of outbound cleartext packets into the IP address that you specify.
Do not select Outbound NAT unless you specify a
natip
value through the
CLI. When a
natip
value is specified, the source addresses of outbound IP
packets are replaced before the packets are sent through the tunnel. For
more information, see the “firewall” chapter of the
FortiGate CLI Reference
.
Summary of Contents for FortiGate 1000A
Page 80: ...80 01 28011 0254 20051115 Fortinet Inc FortiGate IPv6 support System Network ...
Page 88: ...88 01 28011 0254 20051115 Fortinet Inc Dynamic IP System DHCP ...
Page 122: ...122 01 28011 0254 20051115 Fortinet Inc FortiManager System Config ...
Page 248: ...248 01 28011 0254 20051115 Fortinet Inc Protection profile Firewall ...
Page 260: ...260 01 28011 0254 20051115 Fortinet Inc CLI configuration User ...
Page 380: ...380 01 28011 0254 20051115 Fortinet Inc CLI configuration Log Report ...
Page 392: ...392 01 28011 0254 20051115 Fortinet Inc Glossary ...