60
01-28011-0259-20060210
Fortinet Inc.
Factory defaults
Protection profiles
Use protection profiles to apply different protection settings for traffic that is controlled
by firewall policies. You can use protection profiles to:
•
Configure antivirus protection for HTTP, FTP, IMAP, POP3, and SMTP firewall
policies
•
Configure Web filtering for HTTP firewall policies
•
Configure Web category filtering for HTTP firewall policies
•
Configure spam filtering for IMAP, POP3, and SMTP firewall policies
•
Enable the Intrusion Protection System (IPS) for all services
•
Enable content logging for HTTP, FTP, IMAP, POP3, and SMTP firewall policies
Using protection profiles, you can build protection configurations that can be applied
to different types of firewall policies. This allows you to customize types and levels of
protection for different firewall policies.
For example, while traffic between internal and external addresses might need strict
protection, traffic between trusted internal addresses might need moderate protection.
You can configure firewall policies for different traffic services to use the same or
different protection profiles.
Protection profiles can be added to NAT/Route mode and Transparent mode firewall
policies.
The FortiGate-5000 module comes pre configured with four protection profiles.
Strict
To apply maximum protection to HTTP, FTP, IMAP, POP3, and SMTP
traffic. You may not use the strict protection profile under normal
circumstances but it is available if you have problems with viruses and
require maximum screening.
Scan
To apply antivirus scanning to HTTP, FTP, IMAP, POP3, and SMTP content
traffic. Quarantine is also selected for all content services. On FortiGate
models with a hard drive, if antivirus scanning finds a virus in a file, the file is
quarantined on the FortiGate local disk. If required, system administrators
can recover quarantined files.
Web
To apply antivirus scanning and web content blocking to HTTP content
traffic. You can add this protection profile to firewall policies that control
HTTP traffic.
Unfiltered
To apply no scanning, blocking or IPS. Use if you do not want to apply
content protection to content traffic. You can add this protection profile to
firewall policies for connections between highly trusted or highly secure
networks where content does not need to be protected.