Deploying FortiGate Autoscaling for new VPC OnDemand licenses
In this recipe, you will deploy FortiGate Autoscaling into a new VPC OnDemand license for Amazon Web Services (AWS). If you are not using an existing VPC for your deployment and have not purchased BYOL...
View ArticleFortiOS AntiVirus inspection modes
If in FortiOS 5.0, 5.2, and 5.4, there are several AntiVirus (AV) scanning inspection modes available. FortiOS 5.0 includes proxy and flow-based virus scanning. FortiOS 5.2 also uses proxy-based and...
View ArticleMAC access control with a WiFi network
This recipe demonstrates how to add device definitions to your FortiGate using Media Access Control (MAC) addresses. These definitions are then used to identify which devices can access the WiFi...
View ArticleSetup of FortiAnalyzer in AWS
In this video we will show you how to launch a FortiAnalyzer instance in Amazon Web Services (AWS) and configure a FortiGate to send logs to your new Cloud-Based FortiAnalyzer. Was this helpful? Yes...
View ArticleFortiGate AutoScaling for Existing VPC with On-Demand Deployment
In this recipe, you will deploy FortiGate Autoscaling into an existing VPC OnDemand deployment in Amazon Web Services (AWS). If you do not already have the correct template, it can be found on GitHub....
View ArticleFortiGate AutoScaling for New VPC with Mixed BYOL and On-Demand Deployment
In this recipe, you will deploy FortiGate Autoscaling into a new VPC with mixed BYOL and On-Demand Deployment for Amazon Web Services (AWS). If you are not using an existing VPC for your deployment and...
View ArticleFortiGate AutoScaling for Existing VPC with Mixed BYOL and On-Demand Deployment
In this recipe, you will deploy FortiGate Autoscaling into an existing VPC OnDemand deployment in Amazon Web Services (AWS). If you do not already have the correct template, it can be found on GitHub....
View ArticleEpisode 11: IoT – Is my toothbrush infected?
Take our FortiCast feedback survey to help us improve the show! Michael Strickland and Axelle Apvrille discuss the Internet of Things and some of the threats IoT added to the security landscape. IoT...
View ArticleLimiting bandwidth with traffic shaping
When a particular IP address uses too many resources, you can prevent the device with that IP from consuming your bandwidth indiscriminately. In this recipe, you learn how to use Traffic Shaping on...
View ArticleIPsec VPN with FortiClient
In this example, you will allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient for Mac OS X, Windows, or Android. The remote users Internet...
View ArticlePacket capture
In this example you will look inside the headers of the HTTP and HTTPS packets on your network. Packet capture is also called a network tapping, packet sniffing, or logic analyzing. To use packet...
View ArticleHigh Availability with two FortiGates
In this recipe, a backup FortiGate unit will be installed and connected to a previously installed primary FortiGate to provide redundancy if the primary FortiGate fails. Before you begin, the...
View ArticleFortiManager in the Security Fabric
In this recipe, you will add a FortiManager to a network that is already configured as a Security Fabric. This will simplify network administration because you can manage all of the FortiGates in the...
View ArticleEpisode 12: FortiDDoS Graphing
Hemant Jain and Alenka Chandnani discuss how to graph and analyze FortiDDoS data, as well as integrating it with other products. FortiDDoS resources FortiDDoS website FortiDDoS datasheet Subscribe to...
View ArticleCertificate errors for blocked websites
Avoiding certificate errors when SSL inspection is applied to traffic is an in-demand topic. There are a number of methods that you can use to prevent these warnings: installing self-signed...
View ArticleWide Dynamic Range (WDR) in IP Surveillance Cameras
“Dynamic range” means the difference between the largest and the smallest usable signal level. This term is commonly used in audio, electronics, photography and various other fields. In video, like...
View ArticleUnderstanding IP Surveillance Camera Bandwidth
This whitepaper introduces the video bandwidth generated by IP surveillance camera. It will guide IP surveillance beginner to understand how bandwidth affect the surveillance network using following...
View ArticleTraffic shaping for VoIP
The quality of VoIP phone calls through a firewall often suffers when the firewall is busy and the amount of bandwidth available for the VoIP traffic fluctuates. This can be irritating, leading to...
View ArticleConfiguring a Call Center in FortiVoice (Video)
The following video guides you through the process of configuring a call center in FortiVoice Enterprise. Was this helpful? Yes No The post Configuring a Call Center in FortiVoice (Video) appeared...
View ArticleConfiguring Property Management in FortiVoice (Video)
The following video guides you through the process of connecting the Property Management System (PMS) to the FortiVoice unit. For the purposes of this video, we’ll be focusing on the hospitality...
View Article