Chapter 10 Install and System Administration for FortiOS 5.0 : Advanced concepts : Administration for schools : Example security policies
  
Example security policies
Given these requirements, an example set of security policies could look like the following illustration. In a large setup, all the IPs for the students are treated by one of these four policies.
Figure 247: Simple security policy setup
The last policy in the list, included by default, is a deny policy.This adds to the potential of error that could end up allowing unwanted traffic to pass. The deny policy ensures that any traffic making it to this point is stopped. It can also help in further troubleshooting by viewing the logs for denied traffic.
With these policies in place, even before packet inspection occurs, the FortiGate, and the network are fairly secure. Should any of the UTM profiles fail, there is still a basic level of security.
See Also
Administration for schools
Security policies
DNS
Encrypted traffic (HTTPS)
FTP
UTM security profiles
Logging