02-防火墙策略题材.ppt

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
The diagram above illustrates that an overall policy for content inspection is not a typical scenario. FortiGates are able to apply varying content inspection technologies based on different communications through the network. For example, sessions originating from the internal network may not be subject to IPS scanning. Whereas sessions entering servers on the DMZ should be subject to IPS scanning. We may wish to employ web content inspection technologies for our internal network, however, our servers may communicate with any outside host without such inspection. Protection profiles are broken down in several sections: Anti-Virus, Web Filtering, FortiGuard Web Filtering, Spam Filtering, IPS, Content Archive, IM/P2P, Logging, and VOIP. Each section will have different technologies and the ability to enable said technologies for supported protocols. Often times, as in the above diagram there is also the ability to specify certain thresholds or parameters for a particular feature. Although Fortinet recommends the creation of a new, custom Protection Profile for each type of flowThere are four protection profiles pre-configured in under (Firewall Protection Profile): Web: Scan: Strict: Unfiltered: 设置流量控制——在策略里调用 启用流量控制和每IP最大带宽 将应用层的安全附加在防火墙策略上———UTM 在策略中调用UTM 可以进行更细粒度的应用层的内容检测技术 防火墙策略中的UTM UTM选项涵盖病毒、IPS、Web过滤、email过滤、DLP、应用控制与以上相关的日志 实验 我们将DMZ 54 80 映射到X1的80端口上 54 443 映射到X2 443 内部用户10.0.X.1 通过公网地址X3访问internet 内部用户10.0.X.2 通过公网地址X4访问Internet TCP状态在会话表中可以跟踪 为非状态协议建立伪状态 IP, UDP, ICMP In the above diagram notice there is a “Multiple” button for source address, destination address, and service. This allows for simplified policy creation, and to avoid using address groups, and service groups. Generally speaking, if you are intend to group addresses or services for only a single policy simply use the “Multiple” button. If more than one firewall policy will group the addresses or services in the same fashion simply create a grouping via (firewall address

文档评论(0)

希望之星 + 关注
实名认证
内容提供者

我是一名原创力文库的爱好者!从事自由职业!

1亿VIP精品文档

相关文档