Installing a FortiGate in NAT/Route mode
In this example, you will learn how to connect and configure a new FortiGate unit in NAT/Route mode to securely connect a private network to the Internet. In NAT/Route mode, a FortiGate unit is...
View ArticleSecurity fabric installation
In this example, you will configure a security fabric that consists of four FortiGates and a FortiAnalyzer. One of the FortiGates will be the root (or upstream) FortiGate in the Security Fabric, while...
View ArticleSSL VPN using web and tunnel mode
In this example, you will allow remote users to access the corporate network using an SSL VPN, connecting either by web mode using a web browser or tunnel mode using FortiClient. Web mode allows users...
View ArticleIntroducing NGFW policy-based mode
You can operate your FortiGate or individual VDOMs on your FortiGate in Next Generation Firewall (NGFW) mode when you select flow-based inspection. In the new FortiOS 5.6 NGFW policy-based mode, you...
View ArticleUsing Hair-pinning in a Network
What do hair pins have to do with networking? Hair-pinning, in a networking context, is the method where a packet travels to an interface, goes out towards the Internet but instead of continuing on,...
View ArticleChanging the IPMI Password
In this example, you will learn how to change the IPMI Password in FortiManager and FortiAnalyzer. Some devices include an unused IPMI port, such as the FAZ-1000E. You cannot use the operating system...
View ArticleConfiguring Hair-pinning on a FortiGate
Hair-pinning, also known as NAT loopback, is the technique where a machine accesses another machine on the LAN via an external network. The way it works, is that a packet travel through an internal...
View ArticleRedundant Internet with SD-WAN
The following example demonstrates how to configure redundant Internet using the new SD-WAN feature in FortiOS 5.6. The goal of SD-WAN is to seamlessly manage traffic at the Layer 2 level of the OSI...
View ArticleNot all Ethernet interfaces are equal
The trouble with RJ-45 physical ports is that just from looking at them it’s hard to see any difference between them. Compare two Ethernet ports on any network device. Without knowing the specs of the...
View ArticleUser and Device Authentication
In this video, you will learn how to create schedules that restrict Internet access based on whether users are full-time or part-time employees. You will also deny access to staff members using mobile...
View ArticleEpisode 10: FortiDDoS
Take our FortiCast feedback survey to help us improve the show! Learn all about FortiDDoS in this episode, featuring a discussion between Steve Robinson and Hemant Jain. FortiDDoS resources DDoS...
View ArticleConfiguring Conference Calls in FortiVoice Enterprise (Video)
FortiVoice Enterprise features conference calling, which allows multiple clients to join a live group discussion. The following video details how to create both an ongoing conference call and a...
View ArticleRecording Calls in ForitVoice Enterprise (Video)
The following video guides you through the process of configuring call recording and archiving recorded calls in FortiVoice Enterprise. Was this helpful? Yes No The post Recording Calls in ForitVoice...
View ArticleFortiSandbox in the Security Fabric
In this recipe, you will add a FortiSandbox to your Security Fabric and configure each FortiGate in the fabric to send suspicious files to FortiSandbox for Sandbox Inspection. These files will be...
View ArticleSupported Upgrade Paths – FortiAP
Upgrading to 5.6 The tables below show the upgrade paths from earlier versions of the supported firmware to the latest version of FortiAP and FortiAP-S. To make it easier to find the correct row for...
View ArticleThe Fortinet Knowledge Base
The Fortinet Cookbook site and the Fortinet Documentation site are two excellent sources of information on Fortinet Products and anyone that manages a Fortinet product should have these sites...
View ArticleConfiguring Modems on the FortiGate
Overview This modem configuration document is a reference for system engineers who need help configuring USB modems with the FortiGate. It will also provide specific examples to help you custom...
View ArticleSecurity Fabric
This collection of related recipes shows how to configure a Security Fabric throughout your network, using a range of Fortinet products. This security fabric will link different security sensors and...
View ArticleTransparent Web Proxy
In this recipe, you’ll learn how to create a basic transparent web proxy setup. You can use the transparent proxy to apply web authentication to HTTP traffic accepted by a firewall policy. In previous...
View ArticleOne IP address serving multiple servers
We are going to explore how to use a single IP address to provide connectivity to multiple servers. Before we get into the how, aside from it just being kind of cool to be able to do it, it is useful...
View Article