FortiVoice Enterprise Profiles: SIP Profiles and Caller ID
FortiVoice phone profiles let you create user privileges and SIP profiles for configuring extensions and SIP trunks. It also allows you to modify caller IDs, schedule the FortiVoice unit, and configure...
View ArticleConfiguring Sound Files in FortiVoice Enterprise
FortiVoice Enterprise supports customizable sound files that administrators can use to play during conference calls, call holding periods, and special announcements. The following recipe details how to...
View ArticleFortiMail: Preventing ISPs from Being Blacklisted
Often times companies can unknowingly find themselves blacklisted. One infected computer could lead to an entire company having its email blocked. This recipe guides you through the process of...
View ArticleFortiMail Best Practices: System Maintenance
Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security. The Best Practices recipes will...
View ArticleFortiMail Best Practices: Network Topology
Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security. The Best Practices recipes will...
View ArticleFortiMail Email Authentication: SPF, DKIM and DMARC
Domain-based Message Authentication, Reporting & Conformance (DMARC) performs email authentication with Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) checking. SPF compares...
View ArticleFortiMail Best Practices: Performance Tuning
Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security. The Best Practices recipes will...
View ArticleFortiMail Best Practices: System Security
Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security. The Best Practices recipes will...
View ArticleFortiMail Best Practices: High Availability
Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security. The Best Practices recipes will...
View ArticleFortiMail Best Practices: SMTP Connectivity
Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security. The Best Practices recipes will...
View ArticleFortiMail Best Practices: Antispam Tuning
Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security. The Best Practices recipes will...
View ArticleDefault exemptions in the SSL deep-inspection profile
In the default configuration for FortiOS 5.2, several FortiGuard categories and firewall addresses appear in the Exempt from SSL Inspection list. However, if you upgrade your FortiGate to 5.2 from an...
View ArticleIPsec VPN Two-Factor Authentication with FortiToken (Video)
In this video, you will configure two-factor authentication using FortiToken for IPsec VPN connections. You will add a FortiToken-200 to the FortiGate, assign the token to the user, and add the user to...
View ArticleFortiMail Troubleshooting: Access Difficulty
The Troubleshooting recipes are here to assist you in diagnosing and remedying any problems you experience when using your FortiMail unit. This recipe guides you through the process of troubleshooting...
View ArticleSetting up an internal network with a managed FortiSwitch
In this recipe, you will set up a FortiGate to connect to and manage an internal wired network consisting of client PCs connected to a managed FortiSwitch. This recipe is part of the Cooperative...
View ArticleAdding endpoint control to a security fabric
In this example, you will use endpoint control on an ISFW FortiGate that is part of a Cooperative Security Fabric (CSF). To do this, you will create a FortiClient Profile that only allows traffic from...
View ArticleInstalling internal FortiGates and enabling a security fabric
In this example, you will install two Internal Segmentation Firewalls (ISFWs) behind your External FortiGate. One of these FortiGates will be used to protect your Accounting team’s network, while the...
View ArticleHigh Availability with two FortiGates
In this recipe, a backup FortiGate unit will be installed and connected to a previously installed primary FortiGate to provide redundancy if the primary FortiGate fails. This recipe is part of the...
View ArticleInstalling FortiAuthenticator VM in vSphere
In this recipe, you will install and register FortiAuthenticator VM in a VMware ESXi environment and configure basic network settings in the vSphere console tab. This recipe assumes that you have...
View ArticleCooperative Security Fabric
This collection of related recipes shows how to configure a Cooperative Security Fabric (CSF) throughout your network, using a range of Fortinet products. This security fabric will link different...
View Article