SSO using a FortiGate, FortiAuthenticator, and DC Polling (Expert)
This recipe demonstrates FortiGate user authentication with a FortiAuthenticator as a Single Sign-On server. In this example, the FortiAuthenticator is configured to collect the user logon by polling...
View ArticleConfiguring third-party authentication with FortiToken Mobile
FortiToken Mobile lets you use FortiToken tokens for two-factor authentication, as well as third-party tokens used by Amazon, Dropbox, Google, and Microsoft. Two-factor authentication with FortiToken...
View ArticleProtecting web applications
In this recipe, you will use a Web Application Firewall profile to protect web applications, such as Internet browsers, from being attacked. In this example, the default profile will be targeted to...
View ArticleComplete FortiGate Cookbook 5.4 available in PDF
A PDF of the complete FortiGate Cookbook 5.4 is now available here. The post Complete FortiGate Cookbook 5.4 available in PDF appeared first on Fortinet Cookbook.
View ArticleFortinet and the GHOST Vulnerability
For those who follow security news, you are probably aware of an issue in the glibc library called CVE-2015-0235 (making this issue sound even scarier, it is also referred to as GHOST). A number of...
View ArticleCaptive portal WiFi access control
In this recipe, you will configure the FortiGate for captive portal access so users can log on to your WiFi network. You will create a user account (rgreen), add it to a user group (employees), create...
View ArticleWiFi Network Troubleshooting
This page contains information to help you troubleshoot wireless network issues. In the following sections, you will learn basic troubleshooting techniques for a secure Fortinet wireless LAN including:...
View ArticleCaptive portal WiFi access with a FortiToken-200
In this recipe, you will enforce two-factor authentication for WiFi users who have physical FortiToken-200s through a captive portal. FortiToken-200 users who attempt to browse the Internet will be...
View ArticleBlocking Facebook with Web Filtering
This recipe explains how to use a static URL filter to block access to Facebook and its subdomains. By using SSL inspection, you ensure that Facebook and its subdomains are also blocked when accessed...
View ArticleBasic Firewall Policies (Video)
In this video, you will learn how to create and order multiple security policies in the policy table, to control and limit different types of network traffic. You will create three policies: a basic...
View ArticleFortiToken two-factor authentication with RADIUS on a FortiAuthenticator
In this recipe, you will set up FortiAuthenticator to function as a RADIUS server to allow SSL VPN users to authenticate with a FortiToken-200. You will configure a user (gthreepwood), FortiToken-200,...
View ArticleIPsec VPN troubleshooting
This section contains tips to help you with some common challenges of IPsec VPNs. A VPN connection has multiple stages that can be confirmed to ensure the connection is working properly. It is easiest...
View ArticleSSL VPN troubleshooting
This page contains tips to help you with some common challenges for SSL VPN. Enter the following to display debug messages for SSL VPN: diagnose debug application sslvpn -1 This command enables...
View ArticleIPsec VPN for Windows Phone 10
In this recipe, you will learn how to create an IPsec VPN on a FortiGate, and securely connect to an internal network using a Windows Phone 10. Using the IPsec Wizard, you will create an IPsec VPN...
View ArticleSkill-Based Routing in FortiVoice Enterprise
When a customer dials an organization’s support line they are commonly greeted with an automated attendant that transfers the customer’s call to a specific department based on the number the customer...
View ArticleCookbook Website Activity Report for 2015
2015 was the first full year of the Cookbook website being in operation. To mark this occasion, a report was written about the website’s performance during the year. This way we can look back on the...
View ArticleVirtual Wire Pair (Video)
In this video, you will learn how to create a virtual wire pair, to make it easier to protect a web server behind a FortiGate that is acting as an Internal Segmentation Firewall, or ISFW. A virtual...
View ArticleMonitoring and blocking P2P traffic
In this recipe, you will use Application Control to monitor application traffic on your network and then selectively block unwanted traffic. Peer-to-peer (P2P) traffic is blocked in this example. 1....
View ArticleIPsec VPN two-factor authentication with FortiToken 200
In this recipe, you will configure two-factor authentication using a FortiToken 200 for IPsec VPN connections. This recipe assumes that you have already created a user (elainemarley) and a user group...
View ArticlePreventing data leaks
In this recipe, you will keep files containing sensitive information from leaving your network. To do this, criteria for retaining files are created and applied in a Data Leak Prevention (DLP) security...
View Article