Configuring FortiGuard AntisSpam in FortiMail
The following is a video briefly detailing how to configure FortiGuard AntiSpam in FortiMail. Was this helpful? Yes No The post Configuring FortiGuard AntisSpam in FortiMail appeared first on...
View ArticlePort forwarding
In this recipe, you configure port forwarding to open specific ports and allow connections from the Internet to reach a server located behind the FortiGate. This allows Internet users to reach the...
View ArticleHigh Availability with FGCP (Expert)
This recipe describes how to enhance the reliability of a network protected by a FortiGate by adding a second FortiGate and setting up a FortiGate Clustering Protocol (FGCP) High Availability cluster....
View ArticleConfiguring ADVPN in FortiOS 5.6
This recipe is an updated version of our FortiOS 5.4 recipe covering ADVPN basics. ADVPN (Auto Discovery VPN) is an IPsec technology based on an IETF RFC draft...
View ArticleFortiMail SSO with PortalGuard Setup Guide
The following recipe guides you through the process of enabling FortiMail webmail single sign on and then configuring the PortalGuard Relying Party. Before we begin you’ll need to make sure your...
View ArticleEpisode 25: FortiGate 6000F series
Learn about the new features offered by the FortiGate 6000 series of next-generation firewall devices. FortiGate 6000 series resources Ultra High-Performance Network Security FortiGate 6000 series...
View ArticleTags in the Fortinet Security Fabric
In this recipe, you create tag categories and tags for your network. By applying these tags to different devices, interfaces, and addresses, you identify the location and function of each part of your...
View ArticleFortiManager in the Fortinet Security Fabric
In this recipe, you add a FortiManager to the Security Fabric. This simplifies network administration because you manage all of the FortiGate devices in your network from the FortiManager. This recipe...
View ArticleFortinet Security Fabric over IPsec VPN
In this recipe, you add FortiTelemetry traffic to an existing IPsec VPN site-to-site tunnel between two FortiGate devices, in order to add a remote FortiGate to the Security Fabric. You also allow the...
View ArticleEpisode 26: FortiToolkit
An inside look at FortiToolkit, a tool that helps you use the Fortinet APIs. FortiToolkit is available through the Fortinet Developer Network (FNDN). FortiToolkit series resources The Fortinet...
View ArticleFortiGate SDN Connector for Azure
In this recipe, you configure FortiGate SDN (or Fabric) Connector for use with Microsoft Azure. In the FortiGate interface, these connectors are called Fabric Connectors and are software-defined...
View ArticleSite-to-site IPsec VPN with two FortiGates
In this recipe, you create a site-to-site IPsec VPN tunnel to allow communication between two networks that are located behind different FortiGates. You use the VPN Wizard’s Site to Site – FortiGate...
View ArticleProtecting Against Email Impersonation in FortiMail
Email impersonation is one of the main problems facing the safety of many businesses today. Impersonators create email headers to deceive the recipient into believing the sender is from a legitimate...
View ArticleFGCP Virtual Clustering with two FortiGates (expert)
In this recipe you set up a FortiGate Clustering Protocol (FGCP) virtual clustering configuration with two FortiGates to provide redundancy and failover protection for two networks. The FortiGate...
View ArticleFGCP Virtual Clustering with four FortiGates (expert)
In this recipe you set up a FortiGate Clustering Protocol (FGCP) virtual clustering configuration with four FortiGates to provide redundancy and failover protection for two networks. The FortiGate...
View ArticleEpisode 27: Compliance & Certification
In this episode, two Alans discuss how Fortinet acquires Federal Information Processing Standard (FIPS) and Common Criteria for Information Technology Security Evaluation (CC) for Fortinet products....
View ArticleSite-to-site IPsec VPN with overlapping subnets
In this recipe, you create a route-based IPsec VPN tunnel, as well as configure both source and destination NAT, to allow transparent communication between two overlapping networks that are located...
View ArticleEnterprise FortiSwitch Secure Access
There is no excerpt because this is a protected post. The post Enterprise FortiSwitch Secure Access appeared first on Fortinet Cookbook.
View ArticleEpisode 28: Security Round Table
A round table of Fortinet security experts discuss the latest threats, changes in security methods over the years, and how best to make fun of Canada. Security resources FortiGuard Labs Fortinet Blog:...
View ArticlePreventing certificate warnings (self-signed)
In this recipe, you prevent users from receiving a security certificate warning when your FortiGate performs full SSL inspection on incoming traffic. There are several methods for doing this, depending...
View Article