Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

PRI Gateway Management in FortiVoice

What if you want to connect your legacy telephone infrastructure consisting of PRI lines to IP networks? If you have legacy phone equipment you can use PRI gateways to connect to SIP trunking services...

View Article


FXS Gateway Management in FortiVoice

FXS gateways connect traditional PBX phone lines to a VoIP phone system or provider. To connect the FXO ports to the internet or a VoIP system, you will need an FXS gateway. This recipe guides you...

View Article


FXO Gateway Management in FortiVoice

What if you would like to connect your IP phone system to an outside telephone line? The FXO gateway can translate your analog phone line to a VoIP call. This recipe guides you through the process of...

View Article

Configuring Systems as Survivable Branches in FortiVoice

What if you would like to have all of your routing rules, logs, call records, and call records in one centralized location for easier access and configuration? By establishing a survivability branch...

View Article

Configuring Call Services using Station Managing Detail Record (SMDR) in...

What if you would like your FortiVoice unit to increase the availability of your FortiVoice unit? You can configure your unit to act as a high availability member  Configuring SMDR requires advance...

View Article


Preventing certificate warnings (default certificate)

In this recipe, you prevent users from receiving a security certificate warning when your FortiGate performs full SSL inspection on incoming traffic. There are several methods for doing this, depending...

View Article

Episode 30: FortiExtender Cloud

Learn about FortiExtender Cloud, which allows you to deploy, manage and optimize your LTE modem network. FortiExtender Cloud resources FortiExtender Cloud website Data Sheet Subscribe to FortiCast...

View Article

Preventing certificate warnings (CA-signed certificate)

In this recipe, you prevent users from receiving a security certificate warning when your FortiGate performs full SSL inspection on incoming traffic. There are several methods for doing this, depending...

View Article


Protecting Docker Environments from Security Threats

There is no excerpt because this is a protected post. The post Protecting Docker Environments from Security Threats appeared first on Fortinet Cookbook.

View Article


Client-Side SD-WAN with IPsec VPN Deployment Scenario (Expert)

This advanced deployment scenario provides a high-level picture of how to combine SD-WAN, IPsec VPN, and BGP routing to provide a branch office with redundant connections to two remote data centers and...

View Article

Authentication in FortiConnect with GSuite

FortiConnect can be configured to authenticate GSuite users that access the network. This document focuses on the configuration required to enable the integration of FortiConnect and GSuite. NOTE: This...

View Article

Episode 31: Fortinet & the Cloud

A look into how Fortinet works with public cloud infrastructure. Cloud resources The Fortinet Public Cloud Security Solution Fortinet Solutions for Cloud Service Providers Fortinet Security Fabric...

View Article

FortiToken Mobile two-factor authentication with RADIUS on a FortiAuthenticator

There is no excerpt because this is a protected post. The post FortiToken Mobile two-factor authentication with RADIUS on a FortiAuthenticator appeared first on Fortinet Cookbook.

View Article


Blocking malicious domains using threat feeds

There is no excerpt because this is a protected post. The post Blocking malicious domains using threat feeds appeared first on Fortinet Cookbook.

View Article

Upgrading FortiGate firmware

In this example, you upgrade your FortiGate firmware from FortiOS 6.0.0 to 6.0.1. Find this recipe for other FortiOS versions 5.2 | 5.4 | 6.0 1. Checking the current FortiOS firmware To check which...

View Article


Episode 32: Q&A

In this episode, we answer listener questions about the Fortinet Security Fabric, USB modems, logging solutions, security features, traffic shaping, and the policy lookup tool. If you have any...

View Article

IPsec VPN with FortiClient

In this example, you allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient. The remote users’ Internet traffic is also routed through the...

View Article


Configuring High Availability in FortiVoice

FortiVoice units operate in active-passive high availability (HA) mode, which allows for data synchronization and decreases the chances of data loss in the event of hardware failure. This recipe guides...

View Article

How to Recover from a Heartbeat Link Failure in FortiVoice

Sometimes your heartbeat link will fail due to a disconnected cable and you may want to return both FortiVoice units to operating in their configured modes and rejoin the failed primary unit to the HA...

View Article

SAML 2.0 FSSO with FortiAuthenticator and Centrify

There is no excerpt because this is a protected post. The post SAML 2.0 FSSO with FortiAuthenticator and Centrify appeared first on Fortinet Cookbook.

View Article
Browsing all 690 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>