Fortinet black logo

Cookbook

Creating security policies for different users

Copy Link
Copy Doc ID a4a06ec3-12a7-11e9-b86b-00505692583a:981270
Download PDF

Creating security policies for different users

In this recipe, you will create multiple security policies, which will apply security inspection to different users based on which user group they belong to.

This example contains three IPv4 policies:

  • Internet: The policy that the Employee user group uses to access the Internet. You use the FortiGate to apply some security inspection to traffic.
  • Accounting: The policy that the Accounting user group uses to access the Internet. You use the FortiGate to apply increased security inspection to protect sensitive information.
  • Admin: The policy that the Admin user group uses, connecting from a specific computer, to access the Internet. You use the FortiGate to apply limited security inspection.
Note

For information about creating the Internet policy, see Installing a FortiGate in NAT mode.

Creating security policies for different users

In this recipe, you will create multiple security policies, which will apply security inspection to different users based on which user group they belong to.

This example contains three IPv4 policies:

  • Internet: The policy that the Employee user group uses to access the Internet. You use the FortiGate to apply some security inspection to traffic.
  • Accounting: The policy that the Accounting user group uses to access the Internet. You use the FortiGate to apply increased security inspection to protect sensitive information.
  • Admin: The policy that the Admin user group uses, connecting from a specific computer, to access the Internet. You use the FortiGate to apply limited security inspection.
Note

For information about creating the Internet policy, see Installing a FortiGate in NAT mode.