Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Security Fabric over IPsec VPN

In this recipe, you will add FortiTelemetry traffic to an existing IPsec VPN site-to-site tunnel between two FortiGates, in order to add a remote FortiGate to your Security Fabric. You will also allow...

View Article


Image may be NSFW.
Clik here to view.

Multicast over IPsec VPN without PIM

This recipe allows transparent multicast communication between two networks located behind FortiGates connected via IPsec VPN.  Multicast is configured to send traffic across the IPsec tunnel without...

View Article


Security Fabric troubleshooting

This section contains tips to help you with some common challenges of the Fortinet Security Fabric. Useful diagnose commands You can use the following diagnose commands as a first step to troubleshoot...

View Article

Fortinet Support Portal Authentication Process Change FAQ

In an effort to enhance the security of your account, the support portal login and authentication process now offers an extra security measure to protect your information. In an age where a simple...

View Article

Image may be NSFW.
Clik here to view.

Web Portal Authentication in FortiMail with G Suites

In this recipe we’ll explore how FortiMail can be configured to authenticate G-Suite users accessing their personal spam digest portal to review & release quarantined messages and/or reviewing...

View Article


Image may be NSFW.
Clik here to view.

Deploying FortiAnalyzer-VM virtual appliance in Microsoft Azure

FortiAnalyzer for Microsoft Azure is deployed as a virtual appliance in Microsoft Azure cloud (IaaS). This recipe shows you how to install and configure a FortiAnalyzer-VM virtual appliance in...

View Article

Image may be NSFW.
Clik here to view.

Configuring Alexa for FortiVoice

What if you want to have a conversation with someone, but you don’t remember their phone number? What if you want to leave the office but you don’t want to miss an important phone call? FortiVoice now...

View Article

Image may be NSFW.
Clik here to view.

New Security Fabric Docs Experience

This week, join us in exploring the new 5.6 Security Fabric documentation experience: The Fortinet Security Fabric is an end-to-end security solution that gives you control, integration, and easy...

View Article


Image may be NSFW.
Clik here to view.

Deploying FortiAnalyzer VM in AWS (On-Demand)

In this recipe, you will deploy FortiAnalyzer VM in Amazon Web Services (AWS) in one of two ways: 1-Click Launch on the AWS Marketplace Manual Launch on the AWS Marketplace (for those who require...

View Article


Image may be NSFW.
Clik here to view.

Deploying FortiAnalyzer VM in AWS (BYOL)

Bring Your Own License (BYOL) is annual perpetual licensing as opposed to On-Demand, which is an hourly subscription. The BYOL license is available from resellers or your distributors. In this recipe,...

View Article

Image may be NSFW.
Clik here to view.

FortiAuthenticator user self-registration

For this recipe, you will configure the FortiAuthenticator self-service portal to allow users to add their own account and create their own passwords. Note that enabling and using administrator...

View Article

Image may be NSFW.
Clik here to view.

Episode 19: Fortinet Innovators – FortiCarrier

Send us your questions! We’re looking to do a Q&A episode of FortiCast and we need your help. If you have a question that needs an answer, email us at forticast@fortinet.com. If your question is...

View Article

Image may be NSFW.
Clik here to view.

Blocking Facebook

This recipe explains how to block access to Facebook on your network with a Web Filter security profile and an Application Control security profile. This recipe works on FortiGates operating in...

View Article


Image may be NSFW.
Clik here to view.

Filtering WiFi clients by MAC address

In this recipe, you will configure a managed FortiAP to filter client devices based on MAC address. Only authorized devices will have access to the wireless network. In the example, only a single...

View Article

Image may be NSFW.
Clik here to view.

FortiAuthenticator as Guest Portal for FortiWLC

In this recipe we will use FortiAuthenticator as Guest Portal for users getting wireless connection provided by FortiWLC. 1. Creating the FortiAuthenticator as RADIUS server on the FortiWLC On the...

View Article


Supported compression formats

Practically everyone who works in a corporate environment will try this trick at least once. Compressing or zipping a file is a common method of circumventing security measures to get past a firewall...

View Article

Image may be NSFW.
Clik here to view.

Deploying FortiGate-VM virtual appliance in Amazon Web Services

The FortiGate Enterprise Firewall for Amazon Web Services (AWS) is deployed as a virtual appliance in AWS (IaaS). This recipe shows you how to install and configure a single instance FortiGate-VM...

View Article


Image may be NSFW.
Clik here to view.

MAC authentication bypass with dynamic VLAN assignment

In this recipe, you will configure MAC authentication bypass in a wired network with dynamic VLAN assignment. The purpose of this recipe is to configure and demonstrate MAC address bypass with...

View Article

Image may be NSFW.
Clik here to view.

Wired 802.1x EAP-TLS with computer authentication

In this recipe, you will configure and demonstrate wired 802.1x EAP-TLS using computer authentication. In the example, you will set up FortiAuthenticator as the Root CA and client certificate issuer....

View Article

Image may be NSFW.
Clik here to view.

Wired 802.1x EAP-TLS with user authentication

In this recipe, you will configure and demonstrate wired 802.1x EAP-TLS with user authentication. In the example, you will set up FortiAuthenticator as the Root CA and client certificate issuer.  The...

View Article
Browsing all 690 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>