Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

Supported log types to FortiAnalyzer, Syslog, and FortiAnalyzer Cloud

Supported log types to FortiAnalyzer, Syslog, and FortiAnalyzer Cloud This topic describes which log messages are supported by each logging destination. Log Type FortiAnalyzer Syslog   FortiAnalyzer...

View Article


Log-related diagnose commands

Log-related diagnose commands This topic shows commonly used examples of log-related diagnose commands. Use the following diagnose commands to identify log issues: The following commands enable...

View Article


Back up log files or dump log messages

Back up log files or dump log messages When a log issue is caused by a particular log message, it is very help to get logs from that FortiGate. This topic provides steps for using exe log backup or...

View Article

VoIP Solutions – General Use Cases

General use cases There are three scenarios in which the FortiOS SIP solution are usually deployed: The SIP server is in a private network, protected from the internet by a FortiOS device. The SIP...

View Article

VoIP Solutions – SIP Message Inspection and Filtering

SIP message inspection and filtering SIP ALG provides users with security features to inspect and control SIP messages that are transported through FortiOS devices, including: l Verifying the SIP...

View Article


VoIP Solutions – SIP pinholes

SIP pinholes When SIP ALG processes a SIP call, it usually opens pinholes for SIP signaling and RTP/RTCP packets. NAT usually takes place during the process at both the network and SIP application...

View Article

VoIP Solutions – SIP over TLS

SIP over TLS Some SIP phones and servers can communicate using TLS to encrypt the SIP signaling traffic. To allow SIP over TLS calls to pass through the FortiGate, the encrypted signaling traffic must...

View Article

Explicit web proxy

Explicit web proxy Explicit web proxy can be configured on FortiGate for proxying HTTP and HTTPS traffic. To deploy explicit proxy, individual client browsers can be manually configured to send...

View Article


Transparent proxy

Transparent proxy In a transparent proxy deployment, the user’s client software, such as a browser, is unaware that it is communicating with a proxy. Users request Internet content as usual, without...

View Article


FTP Proxy

FTP proxy FTP proxies can be configured on the FortiGate so that FTP traffic can be proxied. When the FortiGate is configured as an FTP proxy, FTP client applications should be configured to send FTP...

View Article

Proxy policy addresses

Proxy policy addresses Proxy addresses are designed to be used only by proxy policies. Fast policy match The fast policy match function improves the performance of IPv4 explicit and transparent web...

View Article

Proxy policy security profiles

Proxy policy security profiles Web proxy policies support most security profile types. Explicit web proxy policy The security profiles supported by explicit web proxy policies are: AntiVirus, l Web...

View Article

Explicit proxy authentication

Explicit proxy authentication FortiGate supports multiple authentication methods. This topic explains using an external authentication server with Kerberos as the primary and NTLM as the fallback. To...

View Article


What is Sandbox inspection?

What is Sandbox inspection? Sandbox inspection is a network process that allows files to be sent to a separate device, such as FortiSandbox, to be inspected without risking network security. This...

View Article

FAQ for Sandbox inspection

FAQ for Sandbox inspection The following are some frequently asked questions about using sandbox inspection with FortiSandbox and FortiGate. Why is the FortiSandbox Cloud option not available when...

View Article


FortiSandbox Appliance or FortiSandbox Cloud

FortiSandbox Appliance or FortiSandbox Cloud FortiSandbox is available as a physical or virtual appliance (FortiSandbox Appliance), or as a cloud advanced threat protection service integrated with...

View Article

Recipes for Sandbox inspection

Recipes for Sandbox inspection AntiVirus The following recipes provide information about Sandbox inspection with AntiVirus: Use FortiSandbox Appliance with AntiVirus Feature overview AntiVirus can use...

View Article


Best Practices – General Considerations

General Considerations For security purposes, NAT mode is preferred because all of the internal or DMZ networks can have secure private addresses. NAT mode policies use network address translation to...

View Article

Best Practices – Performance

Performance Disable any management features you do not need. If you don’t need SSH or SNMP, disable them. SSH also provides another possibility for would-be hackers to infiltrate your FortiGate unit....

View Article

Best Practices – Shutting Down

Shutting down Always shut down the FortiGate operating system properly before turning off the power switch to avoid potentially catastrophic hardware problems. To power off the FortiGate unit –...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>