Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Installing a FortiGate in NAT/Route mode

In this example, you will learn how to connect and configure a new FortiGate unit in NAT/Route mode to securely connect a private network to the Internet. In NAT/Route mode, a FortiGate unit is...

View Article


Image may be NSFW.
Clik here to view.

Security fabric installation

In this example, you will configure a security fabric that consists of four FortiGates and a FortiAnalyzer. One of the FortiGates will be the root (or upstream) FortiGate in the Security Fabric, while...

View Article


Image may be NSFW.
Clik here to view.

SSL VPN using web and tunnel mode

In this example, you will allow remote users to access the corporate network using an SSL VPN, connecting either by web mode using a web browser or tunnel mode using FortiClient. Web mode allows users...

View Article

Image may be NSFW.
Clik here to view.

Introducing NGFW policy-based mode

You can operate your FortiGate or individual VDOMs on your FortiGate in Next Generation Firewall (NGFW) mode when you select flow-based inspection. In the new FortiOS 5.6 NGFW policy-based mode, you...

View Article

Image may be NSFW.
Clik here to view.

Using Hair-pinning in a Network

What do hair pins have to do with networking? Hair-pinning, in a networking context, is the method where a packet travels to an interface, goes out towards the Internet but instead of continuing on,...

View Article


Image may be NSFW.
Clik here to view.

Changing the IPMI Password

In this example, you will learn how to change the IPMI Password in FortiManager and FortiAnalyzer. Some devices include an unused IPMI port, such as the FAZ-1000E. You cannot use the operating system...

View Article

Image may be NSFW.
Clik here to view.

Configuring Hair-pinning on a FortiGate

Hair-pinning, also known as NAT loopback, is the technique where a machine accesses another machine on the LAN via an external network. The way it works, is that a packet travel through an internal...

View Article

Image may be NSFW.
Clik here to view.

Redundant Internet with SD-WAN

The following example demonstrates how to configure redundant Internet using the new SD-WAN feature in FortiOS 5.6.  The goal of SD-WAN is to seamlessly manage traffic at the Layer 2 level of the OSI...

View Article


Not all Ethernet interfaces are equal

The trouble with RJ-45 physical ports is that just from looking at them it’s hard to see any difference between them. Compare two Ethernet ports on any network device. Without knowing the specs of the...

View Article


User and Device Authentication

In this video, you will learn how to create schedules that restrict Internet access based on whether users are full-time or part-time employees. You will also deny access to staff members using mobile...

View Article

Image may be NSFW.
Clik here to view.

Episode 10: FortiDDoS

Take our FortiCast feedback survey to help us improve the show! Learn all about FortiDDoS in this episode, featuring a discussion between Steve Robinson and Hemant Jain. FortiDDoS resources DDoS...

View Article

Configuring Conference Calls in FortiVoice Enterprise (Video)

FortiVoice Enterprise features conference calling, which allows multiple clients to join a live group discussion. The following video details how to create both an ongoing conference call and a...

View Article

Recording Calls in ForitVoice Enterprise (Video)

The following video guides you through the process of configuring call recording and archiving recorded calls in FortiVoice Enterprise. Was this helpful? Yes   No The post Recording Calls in ForitVoice...

View Article


Image may be NSFW.
Clik here to view.

FortiSandbox in the Security Fabric

In this recipe, you will add a FortiSandbox to your Security Fabric and configure each FortiGate in the fabric to send suspicious files to FortiSandbox for Sandbox Inspection. These files will be...

View Article

Supported Upgrade Paths – FortiAP

Upgrading to 5.6 The tables below show the upgrade paths from earlier versions of the supported firmware to the latest version of FortiAP and FortiAP-S. To make it easier to find the correct row for...

View Article


Image may be NSFW.
Clik here to view.

The Fortinet Knowledge Base

The Fortinet Cookbook site and the Fortinet Documentation site are two excellent sources of information on Fortinet Products and anyone that manages a Fortinet product should have these sites...

View Article

Image may be NSFW.
Clik here to view.

Configuring Modems on the FortiGate

Overview This modem configuration document is a reference for system engineers who need help configuring USB modems with the FortiGate. It will also provide specific examples to help you custom...

View Article


Image may be NSFW.
Clik here to view.

Security Fabric

This collection of related recipes shows how to configure a Security Fabric throughout your network, using a range of Fortinet products. This security fabric will link different security sensors and...

View Article

Image may be NSFW.
Clik here to view.

Transparent Web Proxy

In this recipe, you’ll learn how to create a basic transparent web proxy setup. You can use the transparent proxy to apply web authentication to HTTP traffic accepted by a firewall policy. In previous...

View Article

Image may be NSFW.
Clik here to view.

One IP address serving multiple servers

We are going to explore how to use a single IP address to provide connectivity to multiple servers. Before we get into the how, aside from it just being kind of cool to be able to do it,  it is useful...

View Article
Browsing all 690 articles
Browse latest View live