PRI Gateway Management in FortiVoice
What if you want to connect your legacy telephone infrastructure consisting of PRI lines to IP networks? If you have legacy phone equipment you can use PRI gateways to connect to SIP trunking services...
View ArticleFXS Gateway Management in FortiVoice
FXS gateways connect traditional PBX phone lines to a VoIP phone system or provider. To connect the FXO ports to the internet or a VoIP system, you will need an FXS gateway. This recipe guides you...
View ArticleFXO Gateway Management in FortiVoice
What if you would like to connect your IP phone system to an outside telephone line? The FXO gateway can translate your analog phone line to a VoIP call. This recipe guides you through the process of...
View ArticleConfiguring Systems as Survivable Branches in FortiVoice
What if you would like to have all of your routing rules, logs, call records, and call records in one centralized location for easier access and configuration? By establishing a survivability branch...
View ArticleConfiguring Call Services using Station Managing Detail Record (SMDR) in...
What if you would like your FortiVoice unit to increase the availability of your FortiVoice unit? You can configure your unit to act as a high availability member Configuring SMDR requires advance...
View ArticlePreventing certificate warnings (default certificate)
In this recipe, you prevent users from receiving a security certificate warning when your FortiGate performs full SSL inspection on incoming traffic. There are several methods for doing this, depending...
View ArticleEpisode 30: FortiExtender Cloud
Learn about FortiExtender Cloud, which allows you to deploy, manage and optimize your LTE modem network. FortiExtender Cloud resources FortiExtender Cloud website Data Sheet Subscribe to FortiCast...
View ArticlePreventing certificate warnings (CA-signed certificate)
In this recipe, you prevent users from receiving a security certificate warning when your FortiGate performs full SSL inspection on incoming traffic. There are several methods for doing this, depending...
View ArticleProtecting Docker Environments from Security Threats
There is no excerpt because this is a protected post. The post Protecting Docker Environments from Security Threats appeared first on Fortinet Cookbook.
View ArticleClient-Side SD-WAN with IPsec VPN Deployment Scenario (Expert)
This advanced deployment scenario provides a high-level picture of how to combine SD-WAN, IPsec VPN, and BGP routing to provide a branch office with redundant connections to two remote data centers and...
View ArticleAuthentication in FortiConnect with GSuite
FortiConnect can be configured to authenticate GSuite users that access the network. This document focuses on the configuration required to enable the integration of FortiConnect and GSuite. NOTE: This...
View ArticleEpisode 31: Fortinet & the Cloud
A look into how Fortinet works with public cloud infrastructure. Cloud resources The Fortinet Public Cloud Security Solution Fortinet Solutions for Cloud Service Providers Fortinet Security Fabric...
View ArticleFortiToken Mobile two-factor authentication with RADIUS on a FortiAuthenticator
There is no excerpt because this is a protected post. The post FortiToken Mobile two-factor authentication with RADIUS on a FortiAuthenticator appeared first on Fortinet Cookbook.
View ArticleBlocking malicious domains using threat feeds
There is no excerpt because this is a protected post. The post Blocking malicious domains using threat feeds appeared first on Fortinet Cookbook.
View ArticleUpgrading FortiGate firmware
In this example, you upgrade your FortiGate firmware from FortiOS 6.0.0 to 6.0.1. Find this recipe for other FortiOS versions 5.2 | 5.4 | 6.0 1. Checking the current FortiOS firmware To check which...
View ArticleEpisode 32: Q&A
In this episode, we answer listener questions about the Fortinet Security Fabric, USB modems, logging solutions, security features, traffic shaping, and the policy lookup tool. If you have any...
View ArticleIPsec VPN with FortiClient
In this example, you allow remote users to access the corporate network using an IPsec VPN that they connect to using FortiClient. The remote users’ Internet traffic is also routed through the...
View ArticleConfiguring High Availability in FortiVoice
FortiVoice units operate in active-passive high availability (HA) mode, which allows for data synchronization and decreases the chances of data loss in the event of hardware failure. This recipe guides...
View ArticleHow to Recover from a Heartbeat Link Failure in FortiVoice
Sometimes your heartbeat link will fail due to a disconnected cable and you may want to return both FortiVoice units to operating in their configured modes and rejoin the failed primary unit to the HA...
View ArticleSAML 2.0 FSSO with FortiAuthenticator and Centrify
There is no excerpt because this is a protected post. The post SAML 2.0 FSSO with FortiAuthenticator and Centrify appeared first on Fortinet Cookbook.
View Article