beautypg.com

Fortinet FortiGate 50A User Manual

Page 8

background image

Contents

8

Fortinet Inc.

Virtual IPs........................................................................................................................ 157

Adding static NAT virtual IPs ...................................................................................... 158
Adding port forwarding virtual IPs ............................................................................... 159
Adding policies with virtual IPs.................................................................................... 161

IP pools ........................................................................................................................... 161

Adding an IP pool........................................................................................................ 162
IP Pools for firewall policies that use fixed ports......................................................... 162
IP pools and dynamic NAT ......................................................................................... 162

IP/MAC binding ............................................................................................................... 163

Configuring IP/MAC binding for packets going through the firewall............................ 163
Configuring IP/MAC binding for packets going to the firewall ..................................... 164
Adding IP/MAC addresses.......................................................................................... 165
Viewing the dynamic IP/MAC list ................................................................................ 165
Enabling IP/MAC binding ............................................................................................ 165

Content profiles............................................................................................................... 166

Default content profiles ............................................................................................... 167
Adding content profiles ............................................................................................... 167
Adding content profiles to policies .............................................................................. 169

Users and authentication .................................................................................. 171

Setting authentication timeout......................................................................................... 172
Adding user names and configuring authentication ........................................................ 172

Adding user names and configuring authentication .................................................... 172
Deleting user names from the internal database ........................................................ 173

Configuring RADIUS support .......................................................................................... 174

Adding RADIUS servers ............................................................................................. 174
Deleting RADIUS servers ........................................................................................... 174

Configuring LDAP support .............................................................................................. 175

Adding LDAP servers.................................................................................................. 175
Deleting LDAP servers................................................................................................ 176

Configuring user groups.................................................................................................. 177

Adding user groups..................................................................................................... 177
Deleting user groups................................................................................................... 178

IPSec VPN........................................................................................................... 179

Key management............................................................................................................ 180

Manual Keys ............................................................................................................... 180
Automatic Internet Key Exchange (AutoIKE) with pre-shared keys or certificates ..... 180

Manual key IPSec VPNs................................................................................................. 181

General configuration steps for a manual key VPN .................................................... 181
Adding a manual key VPN tunnel ............................................................................... 181