Fortinet FortiGate 100 User Manual
Page 10
Contents
10
Fortinet Inc.
Configuring the FortiGate unit as a L2TP gateway ..................................................... 214
Configuring a Windows 2000 client for L2TP.............................................................. 217
Configuring a Windows XP client for L2TP ................................................................. 218
Network Intrusion Detection System (NIDS) ................................................... 221
Selecting the interfaces to monitor.............................................................................. 222
Disabling the NIDS...................................................................................................... 222
Configuring checksum verification .............................................................................. 222
Viewing the signature list ............................................................................................ 223
Viewing attack descriptions......................................................................................... 223
Enabling and disabling NIDS attack signatures .......................................................... 224
Adding user-defined signatures .................................................................................. 224
Enabling NIDS attack prevention ................................................................................ 225
Enabling NIDS attack prevention signatures .............................................................. 226
Setting signature threshold values.............................................................................. 226
Configuring synflood signature values ........................................................................ 228
Logging attack messages to the attack log................................................................. 228
Reducing the number of NIDS attack log and email messages.................................. 229
General configuration steps ............................................................................................ 231
Antivirus scanning........................................................................................................... 232
File blocking .................................................................................................................... 233
General configuration steps ............................................................................................ 235
Content blocking ............................................................................................................. 236
Using the FortiGate web filter ..................................................................................... 237
Using the Cerberian web filter..................................................................................... 240