2 minute read
The Virtual Cloud Firewall (VCFW) is provided as virtual machines (VMs) with the FortiGate operating system (FortiOS) installed.
These VMs receive the required CPU, memory, hard disk and network resources. After deployment, the VCFW is configured with basic settings such as IP address, hostname and administrative credentials.
The network interfaces are configured to connect to these corresponding security zones and external networks.
Security policies and NAT rules are set up to allow or block traffic based on defined rules.
Monitoring and management tools are integrated to monitor the performance and security of the VCFW.
The VCFW acts as a firewall to control traffic between different security zones and enforce security policies to defend against threats.
The VCFW provides secure VPN tunnels for remote access or cross-site connections.
The VCFW translates internal private IP addresses into a public IP address for Internet communication.
The VCFW can monitor network traffic for known infiltration attempts and malicious activities.
The VCFW enables the management and prioritisation of traffic on the basis of predefined rules.
The VCFW can block access to certain websites based on content filtering policies.
The VCFW generates logs and provides monitoring functions for network activities.
Changes to the configuration of the Virtual Cloud Firewall should always be tested in a non-production environment before being implemented in production to avoid disruptions.
This is constantly being further developed, so the major version currently in use should always be updated to the latest minor version released, especially with regard to security vulnerabilities. This often also provides additional improvements from the manufacturer.
The Virtual Cloud Firewall configurations should be backed up regularly to prevent data loss in the event of failures. This backup is already included in the product.
Use network segmentation and security zones effectively to control data traffic and increase security.