Fortinet FortiGate-800 User Manual
Page 11
Contents
FortiGate-800 Installation and Configuration Guide
11
Network Intrusion Detection System (NIDS) ................................................... 269
Selecting the interfaces to monitor.............................................................................. 270
Disabling monitoring interfaces................................................................................... 270
Configuring checksum verification .............................................................................. 270
Viewing the signature list ............................................................................................ 271
Viewing attack descriptions......................................................................................... 271
Disabling NIDS attack signatures ............................................................................... 272
Adding user-defined signatures .................................................................................. 272
Enabling NIDS attack prevention ................................................................................ 274
Enabling NIDS attack prevention signatures .............................................................. 274
Setting signature threshold values.............................................................................. 275
General configuration steps ............................................................................................ 279
Antivirus scanning........................................................................................................... 280
File blocking .................................................................................................................... 281
Quarantining infected files .......................................................................................... 283
Quarantining blocked files........................................................................................... 283
Viewing the quarantine list .......................................................................................... 284
Sorting the quarantine list ........................................................................................... 284
Filtering the quarantine list.......................................................................................... 285
Deleting files from the quarantine list.......................................................................... 285
Downloading quarantined files.................................................................................... 285
Configuring quarantine options ................................................................................... 285
General configuration steps ............................................................................................ 289
Content blocking ............................................................................................................. 290
Adding words and phrases to the Banned Word list ................................................... 290
Clearing the Banned Word list .................................................................................... 291
Backing up the Banned Word list................................................................................ 292
Restoring the Banned Word list .................................................................................. 292