266 Fortinet Inc.
Index
IDS log
viewing 255
IKE 259
IMAP 154, 259
Inbound NAT
encrypt policy 146
interface
RIP 124
internal address
example 152
internal address group
example 153
internal network
configuring 48
Internet
blocking access to Internet sites 237, 247
blocking access to URLs 237, 247
Internet key exchange 259
intrusion attempts
alert email 257
IP
configuring checksum verification 222
IP address
IP/MAC binding 166
IP addresses
configuring from the CLI 45, 59
IP pool
adding 164
IP spoofing 166
IP/MAC binding 166
adding 167
allow traffic 167
block traffic 167
dynamic IP/MAC list 166
enabling 168
static IP/MAC list 166
IPSec 259
IPSec VPN
authentication for user group 179
AutoIKE 182
certificates 182
disabling 217, 219
manual keys 182
pre-shared keys 182
remote gateway 179
status 205
timeout 205, 206
IPSec VPN tunnel
testing 206
J
Java applets 242
removing from web pages 242
K
keyword
log search 256
L
L2TP 179, 259
configuring Windows XP client 218
network configuration 214
L2TP gateway
configuring 214
language
web-based manager 131
LDAP
example configuration 178
LDAP server
adding server address 177
deleting 178
lease duration
DHCP 119
log setting
filtering log entries 94, 251
traffic filter 254
log to memory
configuring 251
viewing saved logs 255
Log Traffic
firewall policy 148
policy 148
logging 19, 249
attack log 251
configuring traffic settings 253, 254
email filter log 252
enabling alert email 257
event log 251
filtering log messages 251
log to memory 251
log to remote host 250
log to WebTrends 250
recording 249
searching logs 256
selecting what to log 251
traffic log 251
traffic sessions 253
update log 252
virus log 251
web filtering log 251
logs
recording on NetIQ WebTrends server 250
M
MAC address 260
IP/MAC binding 166
malicious scripts
removing from web pages 242, 248
management interface
Transparent mode 114
management IP address
transparent mode 59
manual keys
introduction 182
matching
policy 149