Contents
10 Fortinet Inc.
Addresses....................................................................................................................... 202
Adding addresses ....................................................................................................... 202
Editing addresses ....................................................................................................... 203
Deleting addresses ..................................................................................................... 204
Organizing addresses into address groups ................................................................ 204
Services .......................................................................................................................... 205
Predefined services .................................................................................................... 205
Adding custom TCP and UDP services ...................................................................... 208
Adding custom ICMP services .................................................................................... 209
Adding custom IP services.......................................................................................... 209
Grouping services....................................................................................................... 209
Schedules ....................................................................................................................... 210
Creating one-time schedules ...................................................................................... 211
Creating recurring schedules...................................................................................... 212
Adding schedules to policies....................................................................................... 213
Virtual IPs........................................................................................................................ 213
Adding static NAT virtual IPs ...................................................................................... 214
Adding port forwarding virtual IPs ............................................................................... 215
Adding policies with virtual IPs.................................................................................... 217
IP pools........................................................................................................................... 218
Adding an IP pool........................................................................................................ 218
IP Pools for firewall policies that use fixed ports......................................................... 219
IP pools and dynamic NAT ......................................................................................... 219
IP/MAC binding............................................................................................................... 220
Configuring IP/MAC binding for packets going through the firewall............................ 220
Configuring IP/MAC binding for packets going to the firewall ..................................... 221
Adding IP/MAC addresses.......................................................................................... 221
Viewing the dynamic IP/MAC list ................................................................................ 222
Enabling IP/MAC binding ............................................................................................ 222
Content profiles............................................................................................................... 223
Default content profiles ............................................................................................... 224
Adding content profiles ............................................................................................... 224
Adding content profiles to policies .............................................................................. 226
Users and authentication .................................................................................. 227
Setting authentication timeout......................................................................................... 228
Adding user names and configuring authentication........................................................ 228
Adding user names and configuring authentication .................................................... 228
Deleting user names from the internal database ........................................................ 229
Configuring RADIUS support.......................................................................................... 230
Adding RADIUS servers ............................................................................................. 230
Deleting RADIUS servers ........................................................................................... 230