Configuring Survivability in FortiVoice
The following is a video briefly detailing how to configure survivability in FortiVoice: Was this helpful? YesNo The post Configuring Survivability in FortiVoice appeared first on Fortinet Cookbook.
View ArticleEpisode 40: ZoneFox
In the last episode of 2018, find out more about Fortinet’s latest acquisition, ZoneFox, a high-performance insider threat detection solution. Also, there’s another Q&A episode in the works. If you...
View ArticleFortiVoice Best Practices: Call Parking
Sometimes active calls at extensions are put on hold within the FortiVoice for other extensions to pick up. This process is called “parking”. FortiVoice features the ability to easily park calls,...
View ArticleConfiguring Virtual Cell and Native Cell
The ESS profiles are configured with the RF Virtualization Mode as native cell or virtual cell. This configuration is applied to all access points supporting the particular ESS profile. This document...
View ArticleVXLan over IPsec using VTEP
This scenario is intended for network engineers who are familiar with the FortiGate platform and are looking for an example FortiOS 6.0 configuration. It does not include all of the required...
View ArticleFSSO in polling mode for Windows AD
In this recipe, you use Fortinet single sign-on (FSSO) in polling mode to allow users to log in to the network once with their Windows Active Directory (AD) credentials and seamlessly access all...
View ArticleEpisode 41: FortiGuard Labs
Learn about the latest work and discoveries from FortiGuard Labs, Fortinet’s global threat research and response team. FortiGuard Lab resources FortiGuard Labs website FortiGuard Labs on Twitter...
View ArticleSupported Upgrade Paths – FortiAP, FortiAP-S, and FortiAP-W2
Upgrading to latest version The tables below show the upgrade paths from earlier versions of the supported firmware to the latest version of FortiAP, FortiAP-S, and FortiAP-W2. To make it easier to...
View ArticleEpisode 42: Security Round Table 3
Our round table reconvenes to discuss their picks for the top five things chief security officers (CSOs) should be doing. Resources Fortinet Threat Landscape Report CIS Controls™ Fortinet Cyber Threat...
View ArticleDeny bogons and public multicast IPs with FortiDDoS ACLs
This recipe shows you how to deny bogons and public multicast IPs with FortiDDoS ACLs Deny Bogons and public Multicast IPs with Global ACLs – Overview Bogon source IPs should never be seen from the...
View ArticleIntegrating Salesforce into FortiVoice
This recipe details how to configure the FortiVoice Enterprise system to work with Salesforces for calling and CDR logging. Before we begin you’ll require the following to successfully integrate...
View ArticleFortiMail: How to Download Oversized Email Attachments
When an email message exceeds the maximum allowed size, it’s usually blocked by default. The message size limit settings can be found in the following three places: Content profiles — Under Profile...
View ArticleDeny UDP Attack Ports with FortiDDoS ACLs
This recipe shows you how to deny UDP Attack Ports with FortiDDoS ACLs Deny UDP attack ports with FortiDDoS ACLs – overview Several UDP Ports are used only for malicious scanning and DDoS attack...
View ArticleConfiguring FortiDDoS for asymmetric traffic
This recipe shows you how to set up FortiDDoS on networks with asymmetric traffic. Configuring FortiDDoS for asymmetric traffic – overview FortiDDoS Asymmetric Mode is used for a specific BGP-based...
View ArticleEpisode 43: FortiGuard Service
A deeper look at the services provided by FortiGuard and how they can help you protect your network and apply best practices. Resources FortiGuard.com Security Rating Service CIS Benchmarks Fortinet...
View ArticleAuthentication in FortiConnect with Facebook
FortiConnect can be configured to authenticate Facebook users that access the network. This document focuses on the configuration required to enable the integration of FortiConnect and Facebook. NOTE:...
View ArticleEpisode 44: SD-WAN
Learn all about Fortinet’s approach to software-defined wide-area networks (SD-WAN) and how it can improve your network. Resources Fortinet Secure SD-WAN The Fortinet Secure SD-WAN Solution Video:...
View ArticleConfiguring High Availability in FortiVoice
The following is a short video detailing how to configure HA mode in FortiVoice. Was this helpful? YesNo The post Configuring High Availability in FortiVoice appeared first on Fortinet Cookbook.
View ArticleVXLan over IPsec using VTEP
This scenario is intended for network engineers who are familiar with the FortiGate platform and are looking for an example FortiOS 6.0 configuration. It does not include all of the required...
View ArticleEpisode 45: Q&A #2
In this episode, we answer listener questions about FortiCloud, wireless intrusion detection system (WIDS), logging solutions, sandboxing, simplified deployment and configuration management,...
View Article