Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

Inspection mode feature comparison

Inspection mode feature comparison The following table shows which UTM profile can be configured on a flow mode or proxy mode inspection policy. Remember that some UTM profiles are hidden in the GUI,...

View Article


Inspection mode differences for Antivirus

Inspection mode differences for Antivirus This section identifies the behavioral differences between Antivirus operating in flow and proxy inspection. Feature comparison between Antivirus inspection...

View Article


Inspection mode differences for Data Leak Prevention

Inspection mode differences for Data Leak Prevention This section identifies the behavioral differences between Data Leak Prevention (DLP) operating in flow and proxy inspection. Feature comparison...

View Article

Inspection mode differences for Email Filter

Inspection mode differences for Email Filter This section identifies the behavioral differences between Email Filter operating in flow and proxy inspection. Feature comparison between Email Filter...

View Article

Configuring DNS Servers On A FortiGate To Split DNS Traffic Out

FortiGate Split DNS Use Case: Client has multiple branches that are spread out geographically. These locations utilize a central domain controller for active directory driven resources but need to be...

View Article


Inspection mode differences for Web Filter

Inspection mode differences for Web Filter This section identifies the behavioral differences between Web Filter operating in flow and proxy inspection. Feature comparison between Web Filter inspection...

View Article

Proxy mode inspection use case

Proxy mode inspection use case Because proxy mode provides the most thorough inspection, it is recommended that you apply proxy inspection to policies where preventing a data leak or malicious content...

View Article

Flow mode inspection use case

Flow mode inspection use case It is recommended that flow inspection is applied to policies that prioritize traffic throughput, such as allowing connections to be made towards a streaming or file...

View Article


SSL Inspection – Certificate Inspection – Deep Inspection

SSL Inspection Certificate inspection FortiGate supports certificate inspection. The default configuration has a built-in certificate-inspection profile which you can use directly. When you use...

View Article


4500 Youtube Followers and 4400 visitors to the site!

Big milestones have occurred!!

View Article

Basic site-to-site VPN

Basic site-to-site VPN IPsec VPN in an HA environment This recipe provides sample configuration of site-to-site IPsec VPN in an HA environment. You must enable two options to ensure IPsec VPN traffic...

View Article

OSPF with IPsec VPN to achieve network redundancy

OSPF with IPsec VPN to achieve network redundancy This recipe provides sample configuration of using OSPF with IPsec VPN to achieve network redundancy. Route selection is based on OSPF cost...

View Article

IPsec aggregate to achieve redundancy and traffic load-balancing

IPsec aggregate to achieve redundancy and traffic load-balancing The recipe gives a sample configuration of using IPsec aggregate to achieve redundancy and traffic load-balancing: l Multiple...

View Article


Redundant hub and spoke VPN

Redundant hub and spoke VPN This recipe provides sample configuration of hub and spoke IPsec VPN. The following applies for this scenario: l The spokes have two WAN interfaces and two IPsec VPN tunnels...

View Article

Dialup VPN Options

Dialup VPN FortiGate as dialup client This recipe provides sample configuration of dialup IPsec VPN and the dialup client. In this example, a branch office FortiGate connects via dialup IPsec VPN to...

View Article


ADVPN with BGP as the routing protocol

ADVPN with BGP as the routing protocol This recipe provides sample configuration of ADVPN with BGP as the routing protocol. The following options must be enabled for this configuration: l On the hub...

View Article

ADVPN with OSPF as the routing protocol

ADVPN with OSPF as the routing protocol This recipe provides sample configuration of ADVPN with OSPF as the routing protocol. The following options must be enabled for this configuration: l On the hub...

View Article


ADVPN with RIP as the routing protocol

ADVPN with RIP as the routing protocol This recipe provides sample configuration of ADVPN with RIP as routing protocol. The following options must be enabled for this configuration: l On the hub...

View Article

Full mesh OCVPN

Full mesh OCVPN This topic provides an example configuration of full mesh Overlay Controller VPN (OCVPN). OCVPN is a cloud based solution to simplify IPsec VPN setup. When Overlay Controller VPN is...

View Article

Hub-spoke OCVPN with ADVPN shortcut

Hub-spoke OCVPN with ADVPN shortcut This topic provides a sample configuration of a hub-spoke One-Click VPN (OCVPN) with an Auto Discovery VPN (ADVPN) shortcut. OCVPN automatically detects the network...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>