Inspection mode feature comparison
Inspection mode feature comparison The following table shows which UTM profile can be configured on a flow mode or proxy mode inspection policy. Remember that some UTM profiles are hidden in the GUI,...
View ArticleInspection mode differences for Antivirus
Inspection mode differences for Antivirus This section identifies the behavioral differences between Antivirus operating in flow and proxy inspection. Feature comparison between Antivirus inspection...
View ArticleInspection mode differences for Data Leak Prevention
Inspection mode differences for Data Leak Prevention This section identifies the behavioral differences between Data Leak Prevention (DLP) operating in flow and proxy inspection. Feature comparison...
View ArticleInspection mode differences for Email Filter
Inspection mode differences for Email Filter This section identifies the behavioral differences between Email Filter operating in flow and proxy inspection. Feature comparison between Email Filter...
View ArticleConfiguring DNS Servers On A FortiGate To Split DNS Traffic Out
FortiGate Split DNS Use Case: Client has multiple branches that are spread out geographically. These locations utilize a central domain controller for active directory driven resources but need to be...
View ArticleInspection mode differences for Web Filter
Inspection mode differences for Web Filter This section identifies the behavioral differences between Web Filter operating in flow and proxy inspection. Feature comparison between Web Filter inspection...
View ArticleProxy mode inspection use case
Proxy mode inspection use case Because proxy mode provides the most thorough inspection, it is recommended that you apply proxy inspection to policies where preventing a data leak or malicious content...
View ArticleFlow mode inspection use case
Flow mode inspection use case It is recommended that flow inspection is applied to policies that prioritize traffic throughput, such as allowing connections to be made towards a streaming or file...
View ArticleSSL Inspection – Certificate Inspection – Deep Inspection
SSL Inspection Certificate inspection FortiGate supports certificate inspection. The default configuration has a built-in certificate-inspection profile which you can use directly. When you use...
View ArticleBasic site-to-site VPN
Basic site-to-site VPN IPsec VPN in an HA environment This recipe provides sample configuration of site-to-site IPsec VPN in an HA environment. You must enable two options to ensure IPsec VPN traffic...
View ArticleOSPF with IPsec VPN to achieve network redundancy
OSPF with IPsec VPN to achieve network redundancy This recipe provides sample configuration of using OSPF with IPsec VPN to achieve network redundancy. Route selection is based on OSPF cost...
View ArticleIPsec aggregate to achieve redundancy and traffic load-balancing
IPsec aggregate to achieve redundancy and traffic load-balancing The recipe gives a sample configuration of using IPsec aggregate to achieve redundancy and traffic load-balancing: l Multiple...
View ArticleRedundant hub and spoke VPN
Redundant hub and spoke VPN This recipe provides sample configuration of hub and spoke IPsec VPN. The following applies for this scenario: l The spokes have two WAN interfaces and two IPsec VPN tunnels...
View ArticleDialup VPN Options
Dialup VPN FortiGate as dialup client This recipe provides sample configuration of dialup IPsec VPN and the dialup client. In this example, a branch office FortiGate connects via dialup IPsec VPN to...
View ArticleADVPN with BGP as the routing protocol
ADVPN with BGP as the routing protocol This recipe provides sample configuration of ADVPN with BGP as the routing protocol. The following options must be enabled for this configuration: l On the hub...
View ArticleADVPN with OSPF as the routing protocol
ADVPN with OSPF as the routing protocol This recipe provides sample configuration of ADVPN with OSPF as the routing protocol. The following options must be enabled for this configuration: l On the hub...
View ArticleADVPN with RIP as the routing protocol
ADVPN with RIP as the routing protocol This recipe provides sample configuration of ADVPN with RIP as routing protocol. The following options must be enabled for this configuration: l On the hub...
View ArticleFull mesh OCVPN
Full mesh OCVPN This topic provides an example configuration of full mesh Overlay Controller VPN (OCVPN). OCVPN is a cloud based solution to simplify IPsec VPN setup. When Overlay Controller VPN is...
View ArticleHub-spoke OCVPN with ADVPN shortcut
Hub-spoke OCVPN with ADVPN shortcut This topic provides a sample configuration of a hub-spoke One-Click VPN (OCVPN) with an Auto Discovery VPN (ADVPN) shortcut. OCVPN automatically detects the network...
View Article