Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Configure and Monitor FortiMail Email Archiving

To archive email you must set up and enable email archiving accounts. This recipe guides you through the detailed process of creating an archive account, creating an archive policy, and monitoring your...

View Article


Image may be NSFW.
Clik here to view.

How to Configure and View FortiMail Log Messages

Log messages can be stored locally, remotely, or at both locations. For this recipe, we will focus on storing log messages locally on the hard disk of the FortiMail unit. To ensure that the local hard...

View Article


Image may be NSFW.
Clik here to view.

SMS two-factor authentication for SSL VPN

In this recipe, you will create an SSL VPN with two-factor authentication consisting of a username/password and an SMS token. The SMS token is generated by FortiAuthenticator using the FortiGuard...

View Article

Image may be NSFW.
Clik here to view.

How to Generate and View Reports in FortiMail

Configuring Report Profiles Before you can generate a report you must first configure a report profile. To configure report profiles Go to Log and Report > Report Settings > Configuration. Select...

View Article

Image may be NSFW.
Clik here to view.

SSL VPN with certificate authentication

In this recipe, you will configure an SSL VPN tunnel that requires users to authenticate using a certificate. This recipe requires that you have three certificates: CA certificate server certificate...

View Article


Configuring and Viewing Logs in FortiMail (Video)

A short video on how to configure and view logs in FortiMail. The post Configuring and Viewing Logs in FortiMail (Video) appeared first on Fortinet Cookbook.

View Article

IPsec VPN with Native OS X Client (Video)

In this video, you will learn how to set up IPsec VPN between a FortiGate and a MAC using the default MAC client. This VPN configuration allows Mac users to securely access an internal network, and...

View Article

Image may be NSFW.
Clik here to view.

Blocking Ultrasurf

In this recipe, you will use antivirus scanning and application control to block network users from downloading and using Ultrasurf. As mentioned in a recent SysAdmin Note, Ultrasurf is an application...

View Article


Configuring Email Archiving in FortiMail (Video)

A short video detailing how to configure and monitor archived email in FortiMail. The post Configuring Email Archiving in FortiMail (Video) appeared first on Fortinet Cookbook.

View Article


Configuring and Viewing Reports in FortiMail (Video)

A short video on how to configure and view reports in FortiMail The post Configuring and Viewing Reports in FortiMail (Video) appeared first on Fortinet Cookbook.

View Article

Image may be NSFW.
Clik here to view.

Social WiFi Captive Portal with FortiAuthenticator (Form-based)

WiFi authentication using a forms-based portal provides access control without having to manually create guest accounts. This recipe involves setting up a social portal RADIUS service on the...

View Article

Last week to vote!

There’s one more week to vote in the Cookbook Anniversary poll. Thank you to everyone who has voted already, the feedback is very useful. The post Last week to vote! appeared first on Fortinet Cookbook.

View Article

Managing a FortiSwitch with a FortiGate (5.2)

Manage up to 16 FortiSwitches from the FortiGate web-based manager or CLI. You can create and assign VLANs and configure port information. The connection between the FortiSwitch and the FortiGate is...

View Article


Image may be NSFW.
Clik here to view.

Social WiFi Captive Portal with FortiAuthenticator (Facebook)

WiFi authentication using social media provides access control without having to manually create guest accounts. This recipe involves configuring an API for Facebook accounts, setting up a social...

View Article

Encryption hash used by FortiOS for local pwd/psk

In these days of heightened security awareness it makes sense to understand what is protecting your passwords from prying eyes. For anyone that has seen the configuration file of a FortiGate device,...

View Article


Image may be NSFW.
Clik here to view.

FortiVoice Enterprise Basic Setup

The FortiVoice Enterprise Phone System enables you to completely control your organization’s telephone communications. The following recipe guides you through the process of connecting your SIP phones...

View Article

Preventing Data Leaks (Video)

In this video, you will learn how to prevent files that contain sensitive information from leaving your internal network. You will create a Data Leak Prevention (or DLP) profile to block files with...

View Article


Image may be NSFW.
Clik here to view.

Configuring Office Peers in FVE

Once you have successfully set up the local office FortiVoice system, you can configure office peers. Office peer trunks allow offices to call one another as if the call was made from a local...

View Article

Increasing the Secruity of the FVE Unit

The growing popularity of Voice over IP technology has lead to an increase in threats targeting the quickly growing technology. This recipe guides you through the process of ensuring the safety of your...

View Article

Image may be NSFW.
Clik here to view.

Configuring FortiVoice Automated Answering and Call Transfers

What if your IT department is small and you want FortiVoice to forward your call to an answering machine in the event that everyone in your IT department is currently occupied? How do you get phones to...

View Article
Browsing all 690 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>