Carrier web-based manager settings

Carrier endpoint filter lists configuration settings

The following are Carrier endpoint filter list configuration settings in Security Profiles > Carrier Endpoint Filter Lists.

Carrier Endpoint Filter Lists

Lists all the endpoint filters that you created. On this page, you can edit, delete or create a new endpoint fil- ter list.

 

Create New

Creates a new endpoint filter list. When you select Create New, you are automatically redirected to the New List page. You must enter a name to go to the Carrier Endpoint Filter Lists Settings page.

Edit                                                 Modifies settings within an endpoint filter list in the list.

Removes an endpoint filter in the list.

Delete

To remove multiple endpoint filter lists from within the list, on the Carrier Endpoint Filter List page, in each of the rows of the endpoint filter lists you want removed, select the check box and then select Delete.

To remove all endpoint filter lists from the list, on the Carrier Endpoint Fil- ter List page, select the check box in the check box column and then select Delete.

Name                                              The name of the endpoint filter.

# Entries                                         The number of carrier endpoint patterns in each carrier endpoint filter list.

MMS Profiles                                 The MMS profile that the carrier endpoint filter list is added to.

Comments                                      A description about the endpoint filter.

Ref.                                                 Displays the number of times the object is referenced to other objects.

For example, av_1 profile is applied to a security policy; on the Profile page (Security Profiles > Antivirus > Profiles), 1 appears in Ref. .

To view the location of the referenced object, select the number in Ref., and the Object Usage window appears displaying the various locations of the referenced object.

To view more information about how the object is being used, use one of the following icons that is avialable within the Object Usage window:

  • View the list page for these objects – automatically redirects you to the list page where the object is referenced at.
  • Edit this object – modifies settings within that particular setting that the object is referenced with. For example, av_1 profile is referenced with a security policy and so, when this icon is selected, the user is redir- ected to the Edit Policy page.
  • View the details for this object – table, similar to the log viewer table, contains information about what settings are configured within that particular setting that the object is referenced with. For example,

av_1 profile is referenced with a security policy, and that security policy’s settings appear within the table.

 

Carrier Endpoint Filter Lists Settings

Provides settings for configuring an endpoint filter.

Name                                              The name you entered on the New List page, after selecting Create

New on the Carrier Endpoint Filter page.

Comments                                      A description about the endpoint filter. You can add one here if you did not enter one on the New List page.

Create New                                    Creates a new endpoint filter list. When you select Create New, you are automatically redirected to the New Entry page.

Edit                                                 Select to modify the settings of a pattern in the list.

Delete                                             Select to remove a pattern in the list.

Enable                                            Enables a disabled pattern in the list.

Disable                                           Disables a pattern in the list.

Remove All Entries                       Removes all patterns in the list on the Carrier Endpoint Filter Lists Set- tings page.

Enable                                            Indicates whether or not the pattern is enabled.

Pattern

Enter or change the pattern that FortiOS Carrier uses to match with car- rier endpoints. The pattern can be a single carrier endpoint or consist of wildcards or Perl regular expressions that will match more than one car- rier endpoint. Set Pattern Type to correspond to the pattern that you want to use.

Action                                             Select the action taken by FortiOS Carrier for messages from a carrier endpoint that matches the carrier endpoint pattern:

Pattern Type                                  The type of pattern chosen.

New Entry page

Pattern

Enter or change the pattern that FortiOS Carrier uses to match with car- rier endpoints. The pattern can be a single carrier endpoint or consist of wildcards or Perl regular expressions that will match more than one car- rier endpoint. Set Pattern Type to correspond to the pattern that you want to use.

Action(s)                                        Select the action taken by FortiOS Carrier for messages from a carrier endpoint that matches the carrier endpoint pattern:

Content Archive

MMS messages from the carrier endpoint are delivered, the message content is DLP archived according to MMS DLP archive settings. Con- tent archiving is also called DLP archiving.

Intercept                           MMS messages from the carrier endpoint are delivered. Based on the quarantine configuration, attached files may be removed and quar- antined.

Pattern Type

Select a pattern type as one of Single Carrier Endpoint, Wildcard or Regular Expression.

Wildcard and Regular Expression will match multiple patterns where Signle Carrier Endpoint matches only one.

Enable                                            Select to enable this carrier endpoint filter pattern.


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

This entry was posted in FortiOS 5.4 Handbook on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.