Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

[Failover test] Shut down FortiGate A

This recipe is part of the process of deploying FortiGate HA for AWS. See below for the rest of the recipes in this process: Customize the CFT template Check the prerequisites Review the network...

View Article


Image may be NSFW.
Clik here to view.

Invoke the CFT template

This recipe is part of the process of deploying FortiGate HA for AWS. See below for the rest of the recipes in this process: Customize the CFT template Check the prerequisites Review the network...

View Article


Image may be NSFW.
Clik here to view.

Review the network failover diagram

This recipe is part of the process of deploying FortiGate HA for AWS. See below for the rest of the recipes in this process: Customize the CFT template Check the prerequisites Review the network...

View Article

Image may be NSFW.
Clik here to view.

SSL VPN to IPsec VPN

In this recipe, you will configure a site-to-site IPsec VPN that allows access to the remote endpoint via SSL VPN. This involves a pre-existing user group, a tunnel-mode SSL VPN with split-tunneling,...

View Article

Image may be NSFW.
Clik here to view.

Site-to-site IPsec VPN with two FortiGates

In this recipe, you create a route-based IPsec VPN tunnel to allow transparent communication between two networks that are located behind different FortiGates. The VPN will be created on both...

View Article


Image may be NSFW.
Clik here to view.

FortiSandbox and AWS S3 Bucket Scanning

In this recipe, you will learn how to set up the AWS Storage Gateway and FortiSandbox for AWS S3 Bucket scanning. You can use FortiSandbox through NFS mount is to leverage AWS Storage Gateway. By...

View Article

Image may be NSFW.
Clik here to view.

FortiAnalyzer 800F Installation Guide

The FortiAnalyzer unit can be mounted in any standard 19 inch rack unit with the provided mounting hardware. The rack must be stabilized before sliding the unit out for servicing. Failure to stabilize...

View Article

Image may be NSFW.
Clik here to view.

FortiGate-FortiWiFi 60E-DSL

The FortiGate unit can be placed on any flat surface with the provided rubber feet, or mounted to a wall with the provided mounting hardware. Electrostatic discharge (ESD) can damage your Fortinet...

View Article


Image may be NSFW.
Clik here to view.

Site-to-site IPsec VPN with certificate authentication

In this recipe, you create a route-based IPsec VPN tunnel to allow transparent communication between two networks that are located behind different FortiGates. The VPN will be created on both...

View Article


FortiMail WCCP

This recipe guides you through the process of  configuring FortiMail Webmail Single Sign On to work with Active Directory Federation Server (ADFS). The FortiMail unit needs to be in Server Mode in...

View Article

Image may be NSFW.
Clik here to view.

Configuring FortiMail Webmail Single Sign On

This recipe guides you through the process of  configuring FortiMail Webmail Single Sign On to work with Active Directory Federation Server (ADFS). The FortiMail unit needs to be in Server Mode in...

View Article

Using SMTP Authentication in FortiMail

Worried about a brute force password attack? SMTP authentication mitigates the problem by tracking the IP addresses of the offending client attempting to connect to the box. SMTP authentication can...

View Article

Web and DNS filter troubleshooting

This section contains tips to help you with some common challenges of FortiGate web and DNS filtering. The Web Filter menu is missing Go to Feature Select/Feature Visibility and enable Web Filter. You...

View Article


Image may be NSFW.
Clik here to view.

Security Fabric installation and audit

In this recipe, you will configure a Fortinet Security Fabric that consists of four FortiGates and a FortiAnalyzer. One of the FortiGates will act as the network edge firewall and root FortiGate of the...

View Article

FortiOS 5.6.3 Supported Cipher Suites

A Cipher suite is a collection of encryption and authentication algorithms that two participants in secure communication can select from to negotiate a secure transaction. FortiOS uses cipher suites to...

View Article


Image may be NSFW.
Clik here to view.

Basic failover with redundant Internet

The following example demonstrates how to configure a basic failover with redundant Internet setup. The goal of this recipe is to achieve failover, where the primary ISP is used 100% of the time, and...

View Article

FortiMail Security Hardening

This recipe acts as an introduction to increasing the security of your FortiMail unit by providing you a basic checklist of techniques you can employ to harden your security.    Hardening FortiMail Be...

View Article


Image may be NSFW.
Clik here to view.

Using zones to simplify firewall policies

This cookbook recipe shows how grouping multiple interfaces into a zone can simplify firewall policies. In this example, we create VLAN10, VLAN20, and VLAN30 and add them into a zone called the “LAN...

View Article

Image may be NSFW.
Clik here to view.

Create internal network subnet

This recipe is part of the process of deploying FortiGate for OCI. Note OCI is only supported by FortiOS 5.4.8. See below for the rest of the recipes in this process: Create a virtual cloud network and...

View Article

Deploying FortiGate for OCI

This recipe introduces the process of deploying FortiGate for Oracle Call Interface (OCI). Note OCI is only supported by FortiOS 5.4.8. See below for recipes in this process: Create a virtual cloud...

View Article
Browsing all 690 articles
Browse latest View live