beautypg.com

Adding firewall policies – Fortinet FortiGate 310B User Manual

Page 25

background image

Configuring

Configuring NAT mode

FortiGate-310B FortiOS 3.0 MR6 Install Guide
01-30006-0472-20080815

25

In the factory default configuration, entry number 1 in the Static Route list is
associated with a destination address of 0.0.0.0/0.0.0.0, which means any/all
destinations. This route is called the "static default route". If no other routes are
present in the routing table and a packet needs to be forwarded beyond the
FortiGate unit, the factory configured static default route causes the FortiGate unit
to forward the packet to the default gateway.

For an initial configuration, you must edit the factory configured static default route
to specify a different default gateway for the FortiGate unit. This will enable the
flow of data through the FortiGate unit.

For details on adding additional static routes, see the FortiGate Administration
Guide
.

To modify the default gateway

config router static

edit

set gateway
set device

end

Adding firewall policies

Firewall policies enable traffic to flow through the FortiGate interfaces. Firewall
policies to define the FortiGate unit process the packets in a communication
session. You can configure the firewall policies to allow only specific traffic, users
and specific times when traffic is allowed.

For the initial installation, a single firewall policy that enables all traffic through will
enable you to verify your configuration is working. On lower-end units such a
default firewall policy is already in place. For the higher end FortiGate units, you
will need to add a firewall policy.

The following steps add two policies that allows all traffic through the FortiGate
unit, to enable you to continue testing the configuration on the network.

To add an outgoing traffic firewall policy

config firewall profile

edit

set srcintf
set srcaddr
set dstintf
set dstaddr
set schedule always
set service ANY
set action accept

end

To create an incoming traffic firewall policy, use the same commands with the
addresses reversed.

Note that these policies allow all traffic through. No protection profiles have been
applied. Ensure you create additional firewall policies to accommodate your
network requirements.