FortiMail Troubleshooting: Server Connection Issues
The Troubleshooting recipes are here to assist you in diagnosing and remedying any problems you experience when using your FortiMail unit. This recipe guides you through the process of troubleshooting...
View ArticleFortiMail Troubleshooting: Antispam Issues
The Troubleshooting recipes are here to assist you in diagnosing and remedying any problems you experience when using your FortiMail unit. This recipe guides you through the process of troubleshooting...
View ArticleFortiMail Troubleshooting: SMTP Failure
The Troubleshooting recipes are here to assist you in diagnosing and remedying any problems you experience when using your FortiMail unit. This recipe guides you through the process of troubleshooting...
View ArticleFortiMail Troubleshooting: UI Connection Problems
The Troubleshooting recipes are here to assist you in diagnosing and remedying any problems you experience when using your FortiMail unit. This recipe guides you through the process of troubleshooting...
View ArticleFortiAuthenticator User Self-Registration (Video)
In this example, you will configure the FortiAuthenticator self-service portal allowing users to add their own account and change their own password. The recipe for this video is available here. Watch...
View ArticleFGCP High Availability Troubleshooting
This post is intended to help you find and fix some common and not so common FortiGate Clustering Protocol (FGCP) HA problems. 1. Before you set up a cluster Before you set up an FortiGate FGCP cluster...
View ArticleSignature vs. Adaptive vs. Behavioral
I recently came across a forum thread about the differences between signature-based, behavior-based and adaptive measures. I thought it was all fairly obvious until I realized that it was obvious to...
View ArticleAnnouncement: New FortiCast Podcast is coming out soon
We’re pumped to announce that Fortinet will be releasing a new podcast channel, FortiCast, in the near future. This podcast will be hosted by one of our friendly Cookbook technical writers, Victoria...
View ArticleIPsec VPN to Microsoft Azure
The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site is hosted on Microsoft Azure™, for which you will need...
View ArticleL2TP IPsec VPN on FortiGate
In this recipe, you will learn how to create an L2TP IPsec tunnel that allows remote users running the Windows 7 L2TP client to securely connect to a private network. The FortiGate implementation of...
View ArticleLimiting bandwidth with traffic shaping (Video)
In this video, you learn how to use Traffic Shaping on your FortiGate to limit the bandwidth for a specific IP address. When a particular IP address uses too many resources you can prevent that IP from...
View ArticleUsing virtual IPs to configure port forwarding
This recipe demonstrates how to use Virtual IPs (VIPs) to configure port forwarding on a FortiGate unit. This configuration allows users on the Internet to connect to your server protected behind a...
View ArticleEpisode 1: Introduction to FortiCast
The first episode of FortiCast, the podcast for all things Fortinet. This episode includes a brief overview of what you can expect from the podcast and a preview from an upcoming episode. The post...
View ArticleMAC access control with a WiFi network
This recipe demonstrates how to add device definitions to your FortiGate using Media Access Control (MAC) addresses. These definitions are then used to identify which devices can access the WiFi...
View ArticleFixed Port Range IP Pools algorithm
IP pools are a useful tool in NATing where the basic principles are fairly straightforward and the more basic options are used with great success. However, this SysAdmin Note is going to concentrate on...
View ArticleEpisode 2: Wave 2 Wireless
In this episode of FortiCast, Ben Wilson and Koroush Saraf discuss Wave 2 Wireless technology. More Wave 2 Wireless Resources: Fortinet Wireless LAN Solutions FortiAP 421E and 423E TechTarget: In Wave...
View ArticleFortiAuthenticator as a Certificate Authority (Video)
In this example, you will configure the FortiAuthenticator as a Certificate Authority, allowing the FortiAuthenticator to sign certificates that the FortiGate can use to secure administrator GUI...
View ArticleLogging traffic with FortiCloud
This recipe demonstrates how to use FortiCloud, an online logging service provided by Fortinet, to store logs of your FortiGate unit’s traffic. In this example, the log shows sites visited by users on...
View ArticleConfiguring Administrator Accounts and Profiles in FortiVoice Enterprise
FortiVoice Enterprise features a single administrator account by default. FortiVoice units, however, support multiple administrator accounts. This recipe guides you through the process of creating...
View ArticleRecording Calls in FortiVoice Enterprise
Let’s say you wanted to monitor or have a permanent record of a particularly important phone call. Thankfully, FortiVoice Enterprise supports call recording, so you can monitor and supervise incoming...
View Article