Quantcast
Channel: Fortinet Cookbook
Browsing all 690 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

FortiVoice Enterprise Profiles: SIP Profiles and Caller ID

FortiVoice phone profiles let you create user privileges and SIP profiles for configuring extensions and SIP trunks. It also allows you to modify caller IDs, schedule the FortiVoice unit, and configure...

View Article


Image may be NSFW.
Clik here to view.

Configuring Sound Files in FortiVoice Enterprise

FortiVoice Enterprise supports customizable sound files that administrators can use to play during conference calls, call holding periods, and special announcements. The following recipe details how to...

View Article


Image may be NSFW.
Clik here to view.

FortiMail: Preventing ISPs from Being Blacklisted

Often times companies can unknowingly find themselves blacklisted. One infected computer could lead to an entire company having its email blocked. This recipe guides you through the process of...

View Article

FortiMail Best Practices: System Maintenance

Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security.  The Best Practices recipes will...

View Article

FortiMail Best Practices: Network Topology

Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security.  The Best Practices recipes will...

View Article


Image may be NSFW.
Clik here to view.

FortiMail Email Authentication: SPF, DKIM and DMARC

Domain-based Message Authentication, Reporting & Conformance (DMARC) performs email authentication with Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) checking.  SPF compares...

View Article

FortiMail Best Practices: Performance Tuning

Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security.  The Best Practices recipes will...

View Article

FortiMail Best Practices: System Security

Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security.  The Best Practices recipes will...

View Article


FortiMail Best Practices: High Availability

Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security.  The Best Practices recipes will...

View Article


FortiMail Best Practices: SMTP Connectivity

Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security.  The Best Practices recipes will...

View Article

FortiMail Best Practices: Antispam Tuning

Although your FortiMail unit will catch almost all threats that are sent to your network, there are some things you should be aware of if you want to maximize security.  The Best Practices recipes will...

View Article

Image may be NSFW.
Clik here to view.

Default exemptions in the SSL deep-inspection profile

In the default configuration for FortiOS 5.2, several FortiGuard categories and firewall addresses appear in the Exempt from SSL Inspection list. However, if you upgrade your FortiGate to 5.2 from an...

View Article

IPsec VPN Two-Factor Authentication with FortiToken (Video)

In this video, you will configure two-factor authentication using FortiToken for IPsec VPN connections. You will add a FortiToken-200 to the FortiGate, assign the token to the user, and add the user to...

View Article


FortiMail Troubleshooting: Access Difficulty

The Troubleshooting recipes are here to assist you in diagnosing and remedying any problems you experience when using your FortiMail unit. This recipe guides you through the process of troubleshooting...

View Article

Image may be NSFW.
Clik here to view.

Setting up an internal network with a managed FortiSwitch

In this recipe, you will set up a FortiGate to connect to and manage an internal wired network consisting of client PCs connected to a managed FortiSwitch. This recipe is part of the Cooperative...

View Article


Image may be NSFW.
Clik here to view.

Adding endpoint control to a security fabric

In this example, you will use endpoint control on an ISFW FortiGate that is part of a Cooperative Security Fabric (CSF). To do this, you will create a FortiClient Profile that only allows traffic from...

View Article

Image may be NSFW.
Clik here to view.

Installing internal FortiGates and enabling a security fabric

In this example, you will install two Internal Segmentation Firewalls (ISFWs) behind your External FortiGate. One of these FortiGates will be used to protect your Accounting team’s network, while the...

View Article


Image may be NSFW.
Clik here to view.

High Availability with two FortiGates

In this recipe, a backup FortiGate unit will be installed and connected to a previously installed primary FortiGate to provide redundancy if the primary FortiGate fails. This recipe is part of the...

View Article

Image may be NSFW.
Clik here to view.

Installing FortiAuthenticator VM in vSphere

In this recipe, you will install and register FortiAuthenticator VM in a VMware ESXi environment and configure basic network settings in the vSphere console tab. This recipe assumes that you have...

View Article

Image may be NSFW.
Clik here to view.

Cooperative Security Fabric

This collection of related recipes shows how to configure a Cooperative Security Fabric (CSF) throughout your network, using a range of Fortinet products. This security fabric will link different...

View Article
Browsing all 690 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>