How to Configure and Monitor FortiMail Email Archiving
To archive email you must set up and enable email archiving accounts. This recipe guides you through the detailed process of creating an archive account, creating an archive policy, and monitoring your...
View ArticleHow to Configure and View FortiMail Log Messages
Log messages can be stored locally, remotely, or at both locations. For this recipe, we will focus on storing log messages locally on the hard disk of the FortiMail unit. To ensure that the local hard...
View ArticleSMS two-factor authentication for SSL VPN
In this recipe, you will create an SSL VPN with two-factor authentication consisting of a username/password and an SMS token. The SMS token is generated by FortiAuthenticator using the FortiGuard...
View ArticleHow to Generate and View Reports in FortiMail
Configuring Report Profiles Before you can generate a report you must first configure a report profile. To configure report profiles Go to Log and Report > Report Settings > Configuration. Select...
View ArticleSSL VPN with certificate authentication
In this recipe, you will configure an SSL VPN tunnel that requires users to authenticate using a certificate. This recipe requires that you have three certificates: CA certificate server certificate...
View ArticleConfiguring and Viewing Logs in FortiMail (Video)
A short video on how to configure and view logs in FortiMail. The post Configuring and Viewing Logs in FortiMail (Video) appeared first on Fortinet Cookbook.
View ArticleIPsec VPN with Native OS X Client (Video)
In this video, you will learn how to set up IPsec VPN between a FortiGate and a MAC using the default MAC client. This VPN configuration allows Mac users to securely access an internal network, and...
View ArticleBlocking Ultrasurf
In this recipe, you will use antivirus scanning and application control to block network users from downloading and using Ultrasurf. As mentioned in a recent SysAdmin Note, Ultrasurf is an application...
View ArticleConfiguring Email Archiving in FortiMail (Video)
A short video detailing how to configure and monitor archived email in FortiMail. The post Configuring Email Archiving in FortiMail (Video) appeared first on Fortinet Cookbook.
View ArticleConfiguring and Viewing Reports in FortiMail (Video)
A short video on how to configure and view reports in FortiMail The post Configuring and Viewing Reports in FortiMail (Video) appeared first on Fortinet Cookbook.
View ArticleSocial WiFi Captive Portal with FortiAuthenticator (Form-based)
WiFi authentication using a forms-based portal provides access control without having to manually create guest accounts. This recipe involves setting up a social portal RADIUS service on the...
View ArticleLast week to vote!
There’s one more week to vote in the Cookbook Anniversary poll. Thank you to everyone who has voted already, the feedback is very useful. The post Last week to vote! appeared first on Fortinet Cookbook.
View ArticleManaging a FortiSwitch with a FortiGate (5.2)
Manage up to 16 FortiSwitches from the FortiGate web-based manager or CLI. You can create and assign VLANs and configure port information. The connection between the FortiSwitch and the FortiGate is...
View ArticleSocial WiFi Captive Portal with FortiAuthenticator (Facebook)
WiFi authentication using social media provides access control without having to manually create guest accounts. This recipe involves configuring an API for Facebook accounts, setting up a social...
View ArticleEncryption hash used by FortiOS for local pwd/psk
In these days of heightened security awareness it makes sense to understand what is protecting your passwords from prying eyes. For anyone that has seen the configuration file of a FortiGate device,...
View ArticleFortiVoice Enterprise Basic Setup
The FortiVoice Enterprise Phone System enables you to completely control your organization’s telephone communications. The following recipe guides you through the process of connecting your SIP phones...
View ArticlePreventing Data Leaks (Video)
In this video, you will learn how to prevent files that contain sensitive information from leaving your internal network. You will create a Data Leak Prevention (or DLP) profile to block files with...
View ArticleConfiguring Office Peers in FVE
Once you have successfully set up the local office FortiVoice system, you can configure office peers. Office peer trunks allow offices to call one another as if the call was made from a local...
View ArticleIncreasing the Secruity of the FVE Unit
The growing popularity of Voice over IP technology has lead to an increase in threats targeting the quickly growing technology. This recipe guides you through the process of ensuring the safety of your...
View ArticleConfiguring FortiVoice Automated Answering and Call Transfers
What if your IT department is small and you want FortiVoice to forward your call to an answering machine in the event that everyone in your IT department is currently occupied? How do you get phones to...
View Article