Fortinet FortiGate v3.0 MR7 user manual

User manual for the device Fortinet FortiGate v3.0 MR7

Device: Fortinet FortiGate v3.0 MR7
Category: Network Card
Manufacturer: Fortinet
Size: 0.92 MB
Added : 2/4/2014
Number of pages: 66
Print the manual

Download

How to use this site?

Our goal is to provide you with a quick access to the content of the user manual for Fortinet FortiGate v3.0 MR7. Using the online preview, you can quickly view the contents and go to the page where you will find the solution to your problem with Fortinet FortiGate v3.0 MR7.

For your convenience

If looking through the Fortinet FortiGate v3.0 MR7 user manual directly on this website is not convenient for you, there are two possible solutions:

  • Full Screen Viewing - to easily view the user manual (without downloading it to your computer), you can use full-screen viewing mode. To start viewing the user manual Fortinet FortiGate v3.0 MR7 on full screen, use the button Fullscreen.
  • Downloading to your computer - You can also download the user manual Fortinet FortiGate v3.0 MR7 to your computer and keep it in your files. However, if you do not want to take up too much of your disk space, you can always download it in the future from ManualsBase.
Fortinet FortiGate v3.0 MR7 User manual - Online PDF
Advertisement
« Page 1 of 66 »
Advertisement
Print version

Many people prefer to read the documents not on the screen, but in the printed version. The option to print the manual has also been provided, and you can use it by clicking the link above - Print the manual. You do not have to print the entire manual Fortinet FortiGate v3.0 MR7 but the selected pages only. paper.

Summaries

Below you will find previews of the content of the user manuals presented on the following pages to Fortinet FortiGate v3.0 MR7. If you want to quickly view the content of pages found on the following pages of the manual, you can use them.

Abstracts of contents
Summary of the content on the page No. 1

USER GUIDE
FortiOS v3.0 MR7
User Authentication User Guide
www.fortinet.com

Summary of the content on the page No. 2

FortiOS v3.0 MR7 User Authentication User Guide 28 Aug 2008 01-30007-0347-20080828 © Copyright 2008 Fortinet, Inc. All rights reserved. No part of this publication including text, examples, diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of Fortinet, Inc. Trademarks Fortinet, FortiGate and FortiGuard are registered trademarks and Dynami

Summary of the content on the page No. 3

Contents Contents Introduction ........................................................................................ 5 About authentication......................................................................................... 5 User’s view of authentication........................................................................... 6 Web-based user authentication .................................................................... 6 VPN client-based authentication .........................

Summary of the content on the page No. 4

Contents Users/peers and user groups ......................................................... 31 Users/peers...................................................................................................... 31 Creating local users .................................................................................... 32 Creating peer users .................................................................................... 34 User groups ........................................................

Summary of the content on the page No. 5

Introduction About authentication Introduction This section introduces you to the authentication process from the user and the administrators perspective, and provides supplementary information about Fortinet publications. Note: This document does not describe certificate-based VPN authentication. For information about this type of authentication, see the FortiGate IPSec VPN Guide and the FortiGate Certificate Management User Guide. The following topics are covered in this section: • About a

Summary of the content on the page No. 6

User’s view of authentication Introduction User’s view of authentication The user sees a request for authentication when they try to access a protected resource. The way in which the request is presented to the user depends on the method of access to that resource. VPN authentication usually controls remote access to a private network. Web-based user authentication Firewall policies usually control browsing access to an external network that provides connection to the Internet. In this case,

Summary of the content on the page No. 7

Introduction FortiGate administrator’s view of authentication FortiClient can store the user name and password for a VPN as part of the configuration for the VPN connection and pass them to the FortiGate unit as needed. Or, FortiClient can request the user name and password from the user when the FortiGate unit requests them. SSL VPN is a form of VPN that can be used with a standard Web browser. There are two modes of SSL VPN operation (supported in NAT/Route mode only): • web-only mode, for

Summary of the content on the page No. 8

FortiGate administrator’s view of authentication Introduction 3 Create user groups. Add local/peer user members to each user group as appropriate. You can also add an authentication server to a user group. In this case, all users in the server’s database can authenticate. You can only configure peer user groups through the CLI. •See “Configuring user groups” on page 41. 4 Configure firewall policies and VPN tunnels that require authenticated access. See “Configuring authentication for a firew

Summary of the content on the page No. 9

Introduction FortiGate administrator’s view of authentication Public Key Infrastructure (PKI) authentication A Public Key Infrastructure (PKI) is a comprehensive system of policies, processes, and technologies working together to enable users of the Internet to exchange information in a secure and confidential manner. PKIs are based on the use of cryptography - the scrambling of information by a mathematical formula and a virtual key so that it can only be decoded by an authorized party usin

Summary of the content on the page No. 10

About this document Introduction Authentication timeout An authenticated connection expires when it has been idle for a length of time that you specify. The authentication timeout value set in User > Authentication > Authentication applies to every user of the system. The choice of timeout duration is a balance between security and user convenience. The default is 5 minutes. For information about setting the authentication timeout, see “Authentication timeout” on page 47. Firewall policies

Summary of the content on the page No. 11

Introduction FortiGate documentation • In the examples, private IP addresses are used for both private and public IP addresses. • Notes and Cautions are used to provide important information: Note: Highlights useful additional information. Caution: Warns you about commands or procedures that could have unexpected or ! undesirable results including loss of data or damage to equipment. Typographic conventions FortiGate documentation uses the following typographical conventions: Convention Examp

Summary of the content on the page No. 12

Related documentation Introduction • FortiGate Administration Guide Provides basic information about how to configure a FortiGate unit, including how to define FortiGate protection profiles and firewall policies; how to apply intrusion prevention, antivirus protection, web content filtering, and spam filtering; and how to configure a VPN. • FortiGate online help Provides a context-sensitive and searchable version of the Administration Guide in HTML format. You can access online help from the

Summary of the content on the page No. 13

Introduction Related documentation FortiManager documentation • FortiManager QuickStart Guide Explains how to install the FortiManager Console, set up the FortiManager Server, and configure basic settings. • FortiManager System Administration Guide Describes how to use the FortiManager System to manage FortiGate devices. • FortiManager System online help Provides a searchable version of the Administration Guide in HTML format. You can access online help from the FortiManager Console as you wor

Summary of the content on the page No. 14

Customer service and technical support Introduction Fortinet Tools and Documentation CD All Fortinet documentation is available from the Fortinet Tools and Documentation CD shipped with your Fortinet product. The documents on this CD are current at shipping time. For up-to-date versions of Fortinet documentation see the Fortinet Technical Documentation web site. Fortinet Knowledge Center Additional Fortinet technical documentation is available from the Fortinet Knowledge Center. The knowled

Summary of the content on the page No. 15

Authentication servers RADIUS servers Authentication servers FortiGate units support the use of authentication servers. If you are going to use FortiGate authentication servers, you must configure the servers before you configure FortiGate users or user groups that require them. An authentication server can provide password checking for selected FortiGate users or it can be added as a member of a FortiGate user group. This section describes: • RADIUS servers • LDAP servers • TACACS+ servers

Summary of the content on the page No. 16

RADIUS servers Authentication servers Table 1: RADIUS attributes sent in RADIUS accounting message ATTRIBUTE AUTHENTICATION METHOD 1 2 3456 7 Web XX X X XAuth of IPSec (without DHCP) XX X X XAuth of IPSec (with DHCP) XX X X X PPTP/L2TP (in PPP) X X XX XX X SSL-VPN XX X X In order to support vendor-specific attributes (VSA), the RADIUS server requires a dictionary to define what the VSAs are. Fortinet’s dictionary is configured this way: ## Fortinet’s VSA’s # VENDOR fortinet 12356 BEGIN-VENDOR f

Summary of the content on the page No. 17

Authentication servers RADIUS servers • Change the FortiGate unit default RADIUS port to 1645 using the CLI: config system global set radius_port 1645 end To configure the FortiGate unit for RADIUS authentication - web-based manager 1 Go to User > Remote > RADIUS and select Create New. 2 Enter the following information, and select OK. Figure 1: Configure FortiGate unit for RADIUS authentication Name Enter the name that is used to identify the RADIUS server on the FortiGate unit. Primary Server

Summary of the content on the page No. 18

RADIUS servers Authentication servers To configure the FortiGate unit for RADIUS authentication - CLI config user radius edit set all-usergroup {enable | disable } set auth-type set nas-ip set radius-port set secondary-server set secondary-secret set server set secret set use-group-for-profile set use-management-vdo

Summary of the content on the page No. 19

Authentication servers LDAP servers To remove a RADIUS server from the FortiGate unit configuration - CLI config user radius delete end LDAP servers Lightweight Directory Access Protocol (LDAP) is an Internet protocol used to maintain authentication data that may include departments, people, groups of people, passwords, email addresses, and printers. An LDAP consists of a data- representation scheme, a set of defined operations, and a request/response network. The scale of LDAP

Summary of the content on the page No. 20

LDAP servers Authentication servers FortiGate LDAP does not support proprietary functionality, such as notification of password expiration, which is available from some LDAP servers. FortiGate LDAP does not supply information to the user about why authentication failed. To configure your FortiGate unit to work with an LDAP server, you need to understand the organization of the information on the server. The top of the hierarchy is the organization itself. Usually this is defined as Domain Co


Alternative user manuals
# User manual Category Download
1 Fortinet FortiAnalyzer 1000B User manual Network Card 79
2 Fortinet FortiAnalyzer FortiDB-400B User manual Network Card 29
3 Fortinet FortiDB-1000B User manual Network Card 8
4 Fortinet FortiAnalyzer 3.0 MR7 User manual Network Card 17
5 Fortinet FortiDB-2000B User manual Network Card 10
6 Fortinet FortiBridge 2002F User manual Network Card 2
7 Fortinet FortiGate 1000A-LENC User manual Network Card 8
8 Fortinet FortiGate 224B User manual Network Card 36
9 Fortinet FortiBridge 1000 User manual Network Card 4
10 Fortinet FortiGate 300 User manual Network Card 65
11 Fortinet FortiGate 3000 User manual Network Card 9
12 Fortinet FortiGate 100 User manual Network Card 1532
13 Fortinet FortiGate 3016B User manual Network Card 3
14 Fortinet FortiGate 110C User manual Network Card 573
15 Fortinet FortiGate 310B-LENC User manual Network Card 10
16 Sony BTA-NW1A User manual Network Card 2
17 Sony BKMW-E3000 User manual Network Card 2
18 Sony AC-SQ950D User manual Network Card 0
19 Sony BBV RX100 User manual Network Card 3
20 Sony CLIE A-AVZ-100-11 User manual Network Card 1