[Failover test] Shut down FortiGate A
This recipe is part of the process of deploying FortiGate HA for AWS. See below for the rest of the recipes in this process: Customize the CFT template Check the prerequisites Review the network...
View ArticleInvoke the CFT template
This recipe is part of the process of deploying FortiGate HA for AWS. See below for the rest of the recipes in this process: Customize the CFT template Check the prerequisites Review the network...
View ArticleReview the network failover diagram
This recipe is part of the process of deploying FortiGate HA for AWS. See below for the rest of the recipes in this process: Customize the CFT template Check the prerequisites Review the network...
View ArticleSSL VPN to IPsec VPN
In this recipe, you will configure a site-to-site IPsec VPN that allows access to the remote endpoint via SSL VPN. This involves a pre-existing user group, a tunnel-mode SSL VPN with split-tunneling,...
View ArticleSite-to-site IPsec VPN with two FortiGates
In this recipe, you create a route-based IPsec VPN tunnel to allow transparent communication between two networks that are located behind different FortiGates. The VPN will be created on both...
View ArticleFortiSandbox and AWS S3 Bucket Scanning
In this recipe, you will learn how to set up the AWS Storage Gateway and FortiSandbox for AWS S3 Bucket scanning. You can use FortiSandbox through NFS mount is to leverage AWS Storage Gateway. By...
View ArticleFortiAnalyzer 800F Installation Guide
The FortiAnalyzer unit can be mounted in any standard 19 inch rack unit with the provided mounting hardware. The rack must be stabilized before sliding the unit out for servicing. Failure to stabilize...
View ArticleFortiGate-FortiWiFi 60E-DSL
The FortiGate unit can be placed on any flat surface with the provided rubber feet, or mounted to a wall with the provided mounting hardware. Electrostatic discharge (ESD) can damage your Fortinet...
View ArticleSite-to-site IPsec VPN with certificate authentication
In this recipe, you create a route-based IPsec VPN tunnel to allow transparent communication between two networks that are located behind different FortiGates. The VPN will be created on both...
View ArticleFortiMail WCCP
This recipe guides you through the process of configuring FortiMail Webmail Single Sign On to work with Active Directory Federation Server (ADFS). The FortiMail unit needs to be in Server Mode in...
View ArticleConfiguring FortiMail Webmail Single Sign On
This recipe guides you through the process of configuring FortiMail Webmail Single Sign On to work with Active Directory Federation Server (ADFS). The FortiMail unit needs to be in Server Mode in...
View ArticleUsing SMTP Authentication in FortiMail
Worried about a brute force password attack? SMTP authentication mitigates the problem by tracking the IP addresses of the offending client attempting to connect to the box. SMTP authentication can...
View ArticleWeb and DNS filter troubleshooting
This section contains tips to help you with some common challenges of FortiGate web and DNS filtering. The Web Filter menu is missing Go to Feature Select/Feature Visibility and enable Web Filter. You...
View ArticleSecurity Fabric installation and audit
In this recipe, you will configure a Fortinet Security Fabric that consists of four FortiGates and a FortiAnalyzer. One of the FortiGates will act as the network edge firewall and root FortiGate of the...
View ArticleFortiOS 5.6.3 Supported Cipher Suites
A Cipher suite is a collection of encryption and authentication algorithms that two participants in secure communication can select from to negotiate a secure transaction. FortiOS uses cipher suites to...
View ArticleBasic failover with redundant Internet
The following example demonstrates how to configure a basic failover with redundant Internet setup. The goal of this recipe is to achieve failover, where the primary ISP is used 100% of the time, and...
View ArticleFortiMail Security Hardening
This recipe acts as an introduction to increasing the security of your FortiMail unit by providing you a basic checklist of techniques you can employ to harden your security. Hardening FortiMail Be...
View ArticleUsing zones to simplify firewall policies
This cookbook recipe shows how grouping multiple interfaces into a zone can simplify firewall policies. In this example, we create VLAN10, VLAN20, and VLAN30 and add them into a zone called the “LAN...
View ArticleCreate internal network subnet
This recipe is part of the process of deploying FortiGate for OCI. Note OCI is only supported by FortiOS 5.4.8. See below for the rest of the recipes in this process: Create a virtual cloud network and...
View ArticleDeploying FortiGate for OCI
This recipe introduces the process of deploying FortiGate for Oracle Call Interface (OCI). Note OCI is only supported by FortiOS 5.4.8. See below for recipes in this process: Create a virtual cloud...
View Article