Fortinet black logo

Preface

Copy Link
Copy Doc ID 2217b382-0eca-11ed-bb32-fa163e15d75b:549229
Download PDF

Preface

This section covers the following topics:

Overview

FortiPolicy is the first containerized security platform that implements and automates security orchestration with full-flow inspection and segmented and microsegmented policy enforcement while auto-scaling to accommodate infrastructure changes and multi-terabit traffic flows.

This manual describes how FortiPolicy facilitates application security using the Fortinet Security Fabric.

This manual is prepared for data center infrastructure administrators, network virtualization administrators, information technology (IT) managers, network security experts, data center security administrators, and cybersecurity analysts.

This manual is organized as follows:

  • Introduction describes security threats in a Security Fabric, followed by the FortiPolicy technology solutions and detailed software component overviews.

  • Getting started explains how to initially install the FortiPolicy software to get started with continuous Security Fabric monitoring.

  • Setting up your workspace describes how to set up your applications, configure resource groups, specify segmentation and microsegmentation, and view events and logs.

  • Customizing policies describes how to create access control list (ACL) rules and policies, allowlists, blocklists, and custom URL categories.

  • Insights into FortiPolicy covers how to view FortiPolicy workloads, detections, assets, and operations.

  • FortiPolicy configuration describes how to configure the Security Fabric, create data planes, set up servers and certificates, improve your system health, perform system maintenance, and obtain reports.

Documentation conventions

This manual uses the following conventions for typographically representing terms and procedures.

Convention

Meaning

Example

italics

Denotes the name of GUI elements.

Enter a unique name in the Name field.

Courier font

Coding examples and text to be entered at a command prompt or Web UI field.

Enter the following path:

z:\vsphere-remote\datacenter

Click

Click the left mouse button.

Click Deploy to save your configuration and deploy the virtual chassis.

Double-click

Double-click the left mouse button.

Double-click the tagged WORKLOAD icon to display its IP address.

Right-click

Click the right mouse button.

Right-click the icon to display related details.

Related documentation

The following FortiPolicy documents supplement this manual:

  • FortiPolicy Release Notes describe the latest release of the FortiPolicy software including caveats, open issues, and new features.

  • FortiPolicy Getting Started Guide describes how to install and initially configure the FortiPolicy software in VMware environments. FortiPolicy becomes self-orchestrating immediately following initial configuration and virtual chassis deployment.

  • FortiPolicy Automated Policy Generation Guide describes how to secure your environment by allowing FortiPolicy to automate discovery, analysis, and organization of all connections and workloads into application groups for you, with proposed security policy recommendations for connections between those groups, including custom policies.

  • FortiPolicy CLI Reference describes the commands that make up the command-line interface (CLI) for FortiPolicy.

Obtaining more information

To obtain more information about FortiPolicy, refer to the following sources:

Technical support

For technical support, contact Fortinet as follows:

Preface

This section covers the following topics:

Overview

FortiPolicy is the first containerized security platform that implements and automates security orchestration with full-flow inspection and segmented and microsegmented policy enforcement while auto-scaling to accommodate infrastructure changes and multi-terabit traffic flows.

This manual describes how FortiPolicy facilitates application security using the Fortinet Security Fabric.

This manual is prepared for data center infrastructure administrators, network virtualization administrators, information technology (IT) managers, network security experts, data center security administrators, and cybersecurity analysts.

This manual is organized as follows:

  • Introduction describes security threats in a Security Fabric, followed by the FortiPolicy technology solutions and detailed software component overviews.

  • Getting started explains how to initially install the FortiPolicy software to get started with continuous Security Fabric monitoring.

  • Setting up your workspace describes how to set up your applications, configure resource groups, specify segmentation and microsegmentation, and view events and logs.

  • Customizing policies describes how to create access control list (ACL) rules and policies, allowlists, blocklists, and custom URL categories.

  • Insights into FortiPolicy covers how to view FortiPolicy workloads, detections, assets, and operations.

  • FortiPolicy configuration describes how to configure the Security Fabric, create data planes, set up servers and certificates, improve your system health, perform system maintenance, and obtain reports.

Documentation conventions

This manual uses the following conventions for typographically representing terms and procedures.

Convention

Meaning

Example

italics

Denotes the name of GUI elements.

Enter a unique name in the Name field.

Courier font

Coding examples and text to be entered at a command prompt or Web UI field.

Enter the following path:

z:\vsphere-remote\datacenter

Click

Click the left mouse button.

Click Deploy to save your configuration and deploy the virtual chassis.

Double-click

Double-click the left mouse button.

Double-click the tagged WORKLOAD icon to display its IP address.

Right-click

Click the right mouse button.

Right-click the icon to display related details.

Related documentation

The following FortiPolicy documents supplement this manual:

  • FortiPolicy Release Notes describe the latest release of the FortiPolicy software including caveats, open issues, and new features.

  • FortiPolicy Getting Started Guide describes how to install and initially configure the FortiPolicy software in VMware environments. FortiPolicy becomes self-orchestrating immediately following initial configuration and virtual chassis deployment.

  • FortiPolicy Automated Policy Generation Guide describes how to secure your environment by allowing FortiPolicy to automate discovery, analysis, and organization of all connections and workloads into application groups for you, with proposed security policy recommendations for connections between those groups, including custom policies.

  • FortiPolicy CLI Reference describes the commands that make up the command-line interface (CLI) for FortiPolicy.

Obtaining more information

To obtain more information about FortiPolicy, refer to the following sources:

Technical support

For technical support, contact Fortinet as follows: