Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Deploying FortiGate Autoscaling for new VPC OnDemand licenses

In this recipe, you will deploy FortiGate Autoscaling into a new VPC OnDemand license for Amazon Web Services (AWS). If you are not using an existing VPC for your deployment and have not purchased BYOL...

View Article


FortiOS AntiVirus inspection modes

If in FortiOS 5.0, 5.2, and 5.4, there are several AntiVirus (AV) scanning inspection modes available. FortiOS 5.0 includes proxy and flow-based virus scanning. FortiOS 5.2 also uses proxy-based and...

View Article


Image may be NSFW.
Clik here to view.

MAC access control with a WiFi network

This recipe demonstrates how to add device definitions to your FortiGate using Media Access Control (MAC) addresses. These definitions are then used to identify which devices can access the WiFi...

View Article

Setup of FortiAnalyzer in AWS

In this video we will show you how to launch a FortiAnalyzer instance in Amazon Web Services (AWS) and configure a FortiGate to send logs to your new Cloud-Based FortiAnalyzer. Was this helpful? Yes...

View Article

Image may be NSFW.
Clik here to view.

FortiGate AutoScaling for Existing VPC with On-Demand Deployment

In this recipe, you will deploy FortiGate Autoscaling into an existing VPC OnDemand deployment in Amazon Web Services (AWS). If you do not already have the correct template, it can be found on GitHub....

View Article


Image may be NSFW.
Clik here to view.

FortiGate AutoScaling for New VPC with Mixed BYOL and On-Demand Deployment

In this recipe, you will deploy FortiGate Autoscaling into a new VPC with mixed BYOL and On-Demand Deployment for Amazon Web Services (AWS). If you are not using an existing VPC for your deployment and...

View Article

Image may be NSFW.
Clik here to view.

FortiGate AutoScaling for Existing VPC with Mixed BYOL and On-Demand Deployment

In this recipe, you will deploy FortiGate Autoscaling into an existing VPC OnDemand deployment in Amazon Web Services (AWS). If you do not already have the correct template, it can be found on GitHub....

View Article

Image may be NSFW.
Clik here to view.

Episode 11: IoT – Is my toothbrush infected?

Take our FortiCast feedback survey to help us improve the show! Michael Strickland and Axelle Apvrille discuss the Internet of Things and some of the threats IoT added to the security landscape. IoT...

View Article


Image may be NSFW.
Clik here to view.

Limiting bandwidth with traffic shaping

When a particular IP address uses too many resources, you can prevent the device with that IP from consuming your bandwidth indiscriminately. In this recipe, you learn how to use Traffic Shaping on...

View Article


Image may be NSFW.
Clik here to view.

IPsec VPN with FortiClient

In this example, you will allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient for Mac OS X, Windows, or Android. The remote users Internet...

View Article

Image may be NSFW.
Clik here to view.

Packet capture

In this example you will look inside the headers of the HTTP and HTTPS packets on your network. Packet capture is also called a network tapping, packet sniffing, or logic analyzing. To use packet...

View Article

Image may be NSFW.
Clik here to view.

High Availability with two FortiGates

In this recipe, a backup FortiGate unit will be installed and connected to a previously installed primary FortiGate to provide redundancy if the primary FortiGate fails. Before you begin, the...

View Article

Image may be NSFW.
Clik here to view.

FortiManager in the Security Fabric

In this recipe, you will add a FortiManager to a network that is already configured as a Security Fabric. This will simplify network administration because you can manage all of the FortiGates in the...

View Article


Image may be NSFW.
Clik here to view.

Episode 12: FortiDDoS Graphing

Hemant Jain and Alenka Chandnani discuss how to graph and analyze FortiDDoS data, as well as integrating it with other products. FortiDDoS resources FortiDDoS website FortiDDoS datasheet Subscribe to...

View Article

Certificate errors for blocked websites

Avoiding certificate errors when SSL inspection is applied to traffic is an in-demand topic. There are a number of methods that you can use to prevent these warnings: installing self-signed...

View Article


Wide Dynamic Range (WDR) in IP Surveillance Cameras

“Dynamic range” means the difference between the largest and the smallest usable signal level. This term is commonly used in audio, electronics, photography and various other fields. In video, like...

View Article

Understanding IP Surveillance Camera Bandwidth

This whitepaper introduces the video bandwidth generated by IP surveillance camera. It will guide IP surveillance beginner to understand how bandwidth affect the surveillance network using following...

View Article


Image may be NSFW.
Clik here to view.

Traffic shaping for VoIP

The quality of VoIP phone calls through a firewall often suffers when the firewall is busy and the amount of bandwidth available for the VoIP traffic fluctuates. This can be irritating, leading to...

View Article

Configuring a Call Center in FortiVoice (Video)

The following video guides you through the process of configuring a call center in FortiVoice Enterprise. Was this helpful? Yes   No The post Configuring a Call Center in FortiVoice (Video) appeared...

View Article

Configuring Property Management in FortiVoice (Video)

The following video guides you through the process of connecting the Property Management System (PMS) to the FortiVoice unit. For the purposes of this video, we’ll be focusing on the hospitality...

View Article
Browsing all 690 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>