Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SSO using a FortiGate, FortiAuthenticator, and DC Polling (Expert)

This recipe demonstrates FortiGate user authentication with a FortiAuthenticator as a Single Sign-On server. In this example, the FortiAuthenticator is configured to collect the user logon by polling...

View Article


Image may be NSFW.
Clik here to view.

Configuring third-party authentication with FortiToken Mobile

FortiToken Mobile lets you use FortiToken tokens for two-factor authentication, as well as third-party tokens used by Amazon, Dropbox, Google, and Microsoft. Two-factor authentication with FortiToken...

View Article


Image may be NSFW.
Clik here to view.

Protecting web applications

In this recipe, you will use a Web Application Firewall profile to protect web applications, such as Internet browsers, from being attacked. In this example, the default profile will be targeted to...

View Article

Complete FortiGate Cookbook 5.4 available in PDF

A PDF of the complete FortiGate Cookbook 5.4 is now available here. The post Complete FortiGate Cookbook 5.4 available in PDF appeared first on Fortinet Cookbook.

View Article

Fortinet and the GHOST Vulnerability

For those who follow security news, you are probably aware of an issue in the glibc library called CVE-2015-0235 (making this issue sound even scarier, it is also referred to as GHOST). A number of...

View Article


Image may be NSFW.
Clik here to view.

Captive portal WiFi access control

In this recipe, you will configure the FortiGate for captive portal access so users can log on to your WiFi network. You will create a user account (rgreen), add it to a user group (employees), create...

View Article

Image may be NSFW.
Clik here to view.

WiFi Network Troubleshooting

This page contains information to help you troubleshoot wireless network issues. In the following sections, you will learn basic troubleshooting techniques for a secure Fortinet wireless LAN including:...

View Article

Image may be NSFW.
Clik here to view.

Captive portal WiFi access with a FortiToken-200

In this recipe, you will enforce two-factor authentication for WiFi users who have physical FortiToken-200s through a captive portal. FortiToken-200 users who attempt to browse the Internet will be...

View Article


Image may be NSFW.
Clik here to view.

Blocking Facebook with Web Filtering

This recipe explains how to use a static URL filter to block access to Facebook and its subdomains. By using SSL inspection, you ensure that Facebook and its subdomains are also blocked when accessed...

View Article


Basic Firewall Policies (Video)

In this video, you will learn how to create and order multiple security policies in the policy table, to control and limit different types of network traffic. You will create three policies: a basic...

View Article

Image may be NSFW.
Clik here to view.

FortiToken two-factor authentication with RADIUS on a FortiAuthenticator

In this recipe, you will set up FortiAuthenticator to function as a RADIUS server to allow SSL VPN users to authenticate with a FortiToken-200. You will configure a user (gthreepwood), FortiToken-200,...

View Article

IPsec VPN troubleshooting

This section contains tips to help you with some common challenges of IPsec VPNs. A VPN connection has multiple stages that can be confirmed to ensure the connection is working properly. It is easiest...

View Article

SSL VPN troubleshooting

This page contains tips to help you with some common challenges for SSL VPN. Enter the following to display debug messages for SSL VPN: diagnose debug application sslvpn -1 This command enables...

View Article


Image may be NSFW.
Clik here to view.

IPsec VPN for Windows Phone 10

In this recipe, you will learn how to create an IPsec VPN on a FortiGate, and securely connect to an internal network using a Windows Phone 10. Using the IPsec Wizard, you will create an IPsec VPN...

View Article

Image may be NSFW.
Clik here to view.

Skill-Based Routing in FortiVoice Enterprise

When a customer dials an organization’s support line they are commonly greeted with an automated attendant that transfers the customer’s call to a specific department based on the number the customer...

View Article


Image may be NSFW.
Clik here to view.

Cookbook Website Activity Report for 2015

2015 was the first full year of the Cookbook website being in operation. To mark this occasion, a report was written about the website’s performance during the year. This way we can look back on the...

View Article

Virtual Wire Pair (Video)

In this video, you will learn how to create a virtual wire pair, to make it easier to protect a web server behind a FortiGate that is acting as an Internal Segmentation Firewall, or ISFW. A virtual...

View Article


Image may be NSFW.
Clik here to view.

Monitoring and blocking P2P traffic

In this recipe, you will use Application Control to monitor application traffic on your network and then selectively block unwanted traffic. Peer-to-peer (P2P) traffic is blocked in this example. 1....

View Article

Image may be NSFW.
Clik here to view.

IPsec VPN two-factor authentication with FortiToken 200

In this recipe, you will configure two-factor authentication using a FortiToken 200 for IPsec VPN connections. This recipe assumes that you have already created a user (elainemarley) and a user group...

View Article

Image may be NSFW.
Clik here to view.

Preventing data leaks

In this recipe, you will keep files containing sensitive information from leaving your network. To do this, criteria for retaining files are created and applied in a Data Leak Prevention (DLP) security...

View Article
Browsing all 690 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>