Virtual Domains (Video)
In this video, you will learn how to use virtual domains (VDOMs) to host multiple FortiOS instances on a single FortiGate. In this example, two companies (called Company A and Company B) use the same...
View ArticleWeb filtering using quotas
This recipe demonstrates how to set up a web filter security profile with a quota that dynamically limits the amount of time users on an internal network can access websites categorized as “General...
View ArticleAutomatic Dialing in FortiVoice Enterprise
The FortiVoice Enterprise auto dialing system provides a significant time and resource savings for your organization by assisting you when you need to reach multiple contacts quickly and efficiently....
View ArticleEpisode 3: SOC3
In this episode, Michael Strickland and Sean Groarke discuss the third generation of the FortiASIC system-on-a-chip, called the SOC3. This chip is used in the new FortiGate 60E series. More SOC3...
View ArticleConfiguring Alerts in FortiVoice Enterprise
What if you need a notification indicating a system activity event? FortiVoice Enterprise lets lets you configure your unit to notify selected users by email when specific events occur. This recipe...
View ArticleWiFi using FortiAuthenticator RADIUS (EAP-TLS)
This recipe will walk you through the configuration of FortiAuthenticator as the RADIUS server for a FortiGate wireless controller. WPA2-Enterprise with 802.1X authentication can be used to...
View ArticleEstablishing a Call Center in FortiVoice Enterprise
Often times callers outnumber available agents. Forcing a caller to call back repeatably to reach an available agent is bad for customer satisfaction and business. Thankfully, FortiVoice Enterprise...
View ArticleEpisode 4: FortiSwitch & FortiLink
In this episode, Sandip Borle, Eric Schulhof, and Alan Russell discuss FortiSwitch and how FortiLink can be used to extend FortiGate security across a network. More FortiSwitch/FortiLink resources...
View ArticleEstablishing a Voice Mailbox in FortiVoice Enterprise
What if you want someone from your documentation team to have access to the mailbox of your customer service department? Sharing voice mail between multiple users, both inside and outside of a...
View ArticleSite policy on comments
As is common on websites with a comments section, the user feedback on this site is moderated. Submitted comments may be held in a pending state until one of the site moderators takes a look at it and...
View ArticleBlocking Social Media (Video)
In this video, you’ll learn how to block access to social media websites using FortiGuard categories. You’ll need an active license for FortiGuard Web Filtering services. FortiGuard categories allow...
View ArticleEpisode 5: FortiCloud
Ben Wilson and Philip Keeley discus the key features of FortiCloud, our cloud-based management platform for FortiGate and FortiAP. More FortiCloud resources FortiCloud website FortiCloud 3.1 FAQ...
View ArticleFortiManager: Configure a Full Mesh VPN Topology within VPN Console
This is an example on how to configure a simple full mesh VPN with: Three FortiGate (FGT) devices Pre-shared key for authentication Auto-up tunnel setting Static Routes 1. Add FortiGate Devices and Map...
View ArticleEpisode 1: Introduction to FortiCast
The first episode of FortiCast, the podcast for all things Fortinet. This episode includes a brief overview of what you can expect from the podcast and a preview from an upcoming episode. Subscribe to...
View ArticleConfiguring ADVPN in FortiOS 5.4: Redundant hubs (Expert)
This recipe is a followup to the ADVPN basic recipe. As we have seen in the base configuration, ADVPN provides the means for spokes to automatically establish VPN sessions in a peer-to-peer fashion...
View ArticleInteractions between WAN LLB and Asymmetric Routing
Sometimes two good useful features don’t work together well. That is the case with the WAN Link Load Balancing (WAN LLB) function and the Asymmetric Routing function. In case you may be under the...
View ArticleFortiSandbox: Authorizing FortiMail in FortiSandbox
In this recipe, you will learn how to authorize FortiMail in FortiSandbox. In FortiMail 5.2.0 and later, you can configure your FortiMail device to send suspicious files and suspicious attachments to...
View ArticleBootstrapping a FortiGate-AWS
If you are installing and configuring your applications on Amazon Elastic Compute Cloud (EC2) dynamically at instance launch time, you will typically need to pull and install packages, deploy files,...
View ArticleEpisode 6: Hardware Testing
Michael Strickland and Sean Groarke tackle key questions about hardware testing and using FortiTester. More resources FortiTester website FortiTester datasheet RFC 2544 Subscribe to FortiCast...
View ArticleFortiPresence Overview Part 1(Video)
In this video, you’ll learn how to use the Localization features in the FortiPresence dashboard. You’ll find out how to access the information, interpret the results, and how these features can benefit...
View Article