Security Fabric over IPsec VPN
In this recipe, you will add FortiTelemetry traffic to an existing IPsec VPN site-to-site tunnel between two FortiGates, in order to add a remote FortiGate to your Security Fabric. You will also allow...
View ArticleMulticast over IPsec VPN without PIM
This recipe allows transparent multicast communication between two networks located behind FortiGates connected via IPsec VPN. Multicast is configured to send traffic across the IPsec tunnel without...
View ArticleSecurity Fabric troubleshooting
This section contains tips to help you with some common challenges of the Fortinet Security Fabric. Useful diagnose commands You can use the following diagnose commands as a first step to troubleshoot...
View ArticleFortinet Support Portal Authentication Process Change FAQ
In an effort to enhance the security of your account, the support portal login and authentication process now offers an extra security measure to protect your information. In an age where a simple...
View ArticleWeb Portal Authentication in FortiMail with G Suites
In this recipe we’ll explore how FortiMail can be configured to authenticate G-Suite users accessing their personal spam digest portal to review & release quarantined messages and/or reviewing...
View ArticleDeploying FortiAnalyzer-VM virtual appliance in Microsoft Azure
FortiAnalyzer for Microsoft Azure is deployed as a virtual appliance in Microsoft Azure cloud (IaaS). This recipe shows you how to install and configure a FortiAnalyzer-VM virtual appliance in...
View ArticleConfiguring Alexa for FortiVoice
What if you want to have a conversation with someone, but you don’t remember their phone number? What if you want to leave the office but you don’t want to miss an important phone call? FortiVoice now...
View ArticleNew Security Fabric Docs Experience
This week, join us in exploring the new 5.6 Security Fabric documentation experience: The Fortinet Security Fabric is an end-to-end security solution that gives you control, integration, and easy...
View ArticleDeploying FortiAnalyzer VM in AWS (On-Demand)
In this recipe, you will deploy FortiAnalyzer VM in Amazon Web Services (AWS) in one of two ways: 1-Click Launch on the AWS Marketplace Manual Launch on the AWS Marketplace (for those who require...
View ArticleDeploying FortiAnalyzer VM in AWS (BYOL)
Bring Your Own License (BYOL) is annual perpetual licensing as opposed to On-Demand, which is an hourly subscription. The BYOL license is available from resellers or your distributors. In this recipe,...
View ArticleFortiAuthenticator user self-registration
For this recipe, you will configure the FortiAuthenticator self-service portal to allow users to add their own account and create their own passwords. Note that enabling and using administrator...
View ArticleEpisode 19: Fortinet Innovators – FortiCarrier
Send us your questions! We’re looking to do a Q&A episode of FortiCast and we need your help. If you have a question that needs an answer, email us at forticast@fortinet.com. If your question is...
View ArticleBlocking Facebook
This recipe explains how to block access to Facebook on your network with a Web Filter security profile and an Application Control security profile. This recipe works on FortiGates operating in...
View ArticleFiltering WiFi clients by MAC address
In this recipe, you will configure a managed FortiAP to filter client devices based on MAC address. Only authorized devices will have access to the wireless network. In the example, only a single...
View ArticleFortiAuthenticator as Guest Portal for FortiWLC
In this recipe we will use FortiAuthenticator as Guest Portal for users getting wireless connection provided by FortiWLC. 1. Creating the FortiAuthenticator as RADIUS server on the FortiWLC On the...
View ArticleSupported compression formats
Practically everyone who works in a corporate environment will try this trick at least once. Compressing or zipping a file is a common method of circumventing security measures to get past a firewall...
View ArticleDeploying FortiGate-VM virtual appliance in Amazon Web Services
The FortiGate Enterprise Firewall for Amazon Web Services (AWS) is deployed as a virtual appliance in AWS (IaaS). This recipe shows you how to install and configure a single instance FortiGate-VM...
View ArticleMAC authentication bypass with dynamic VLAN assignment
In this recipe, you will configure MAC authentication bypass in a wired network with dynamic VLAN assignment. The purpose of this recipe is to configure and demonstrate MAC address bypass with...
View ArticleWired 802.1x EAP-TLS with computer authentication
In this recipe, you will configure and demonstrate wired 802.1x EAP-TLS using computer authentication. In the example, you will set up FortiAuthenticator as the Root CA and client certificate issuer....
View ArticleWired 802.1x EAP-TLS with user authentication
In this recipe, you will configure and demonstrate wired 802.1x EAP-TLS with user authentication. In the example, you will set up FortiAuthenticator as the Root CA and client certificate issuer. The...
View Article