Supported log types to FortiAnalyzer, Syslog, and FortiAnalyzer Cloud
Supported log types to FortiAnalyzer, Syslog, and FortiAnalyzer Cloud This topic describes which log messages are supported by each logging destination. Log Type FortiAnalyzer Syslog FortiAnalyzer...
View ArticleLog-related diagnose commands
Log-related diagnose commands This topic shows commonly used examples of log-related diagnose commands. Use the following diagnose commands to identify log issues: The following commands enable...
View ArticleBack up log files or dump log messages
Back up log files or dump log messages When a log issue is caused by a particular log message, it is very help to get logs from that FortiGate. This topic provides steps for using exe log backup or...
View ArticleVoIP Solutions – General Use Cases
General use cases There are three scenarios in which the FortiOS SIP solution are usually deployed: The SIP server is in a private network, protected from the internet by a FortiOS device. The SIP...
View ArticleVoIP Solutions – SIP Message Inspection and Filtering
SIP message inspection and filtering SIP ALG provides users with security features to inspect and control SIP messages that are transported through FortiOS devices, including: l Verifying the SIP...
View ArticleVoIP Solutions – SIP pinholes
SIP pinholes When SIP ALG processes a SIP call, it usually opens pinholes for SIP signaling and RTP/RTCP packets. NAT usually takes place during the process at both the network and SIP application...
View ArticleVoIP Solutions – SIP over TLS
SIP over TLS Some SIP phones and servers can communicate using TLS to encrypt the SIP signaling traffic. To allow SIP over TLS calls to pass through the FortiGate, the encrypted signaling traffic must...
View ArticleExplicit web proxy
Explicit web proxy Explicit web proxy can be configured on FortiGate for proxying HTTP and HTTPS traffic. To deploy explicit proxy, individual client browsers can be manually configured to send...
View ArticleTransparent proxy
Transparent proxy In a transparent proxy deployment, the user’s client software, such as a browser, is unaware that it is communicating with a proxy. Users request Internet content as usual, without...
View ArticleFTP Proxy
FTP proxy FTP proxies can be configured on the FortiGate so that FTP traffic can be proxied. When the FortiGate is configured as an FTP proxy, FTP client applications should be configured to send FTP...
View ArticleProxy policy addresses
Proxy policy addresses Proxy addresses are designed to be used only by proxy policies. Fast policy match The fast policy match function improves the performance of IPv4 explicit and transparent web...
View ArticleProxy policy security profiles
Proxy policy security profiles Web proxy policies support most security profile types. Explicit web proxy policy The security profiles supported by explicit web proxy policies are: AntiVirus, l Web...
View ArticleExplicit proxy authentication
Explicit proxy authentication FortiGate supports multiple authentication methods. This topic explains using an external authentication server with Kerberos as the primary and NTLM as the fallback. To...
View ArticleWhat is Sandbox inspection?
What is Sandbox inspection? Sandbox inspection is a network process that allows files to be sent to a separate device, such as FortiSandbox, to be inspected without risking network security. This...
View ArticleFAQ for Sandbox inspection
FAQ for Sandbox inspection The following are some frequently asked questions about using sandbox inspection with FortiSandbox and FortiGate. Why is the FortiSandbox Cloud option not available when...
View ArticleFortiSandbox Appliance or FortiSandbox Cloud
FortiSandbox Appliance or FortiSandbox Cloud FortiSandbox is available as a physical or virtual appliance (FortiSandbox Appliance), or as a cloud advanced threat protection service integrated with...
View ArticleRecipes for Sandbox inspection
Recipes for Sandbox inspection AntiVirus The following recipes provide information about Sandbox inspection with AntiVirus: Use FortiSandbox Appliance with AntiVirus Feature overview AntiVirus can use...
View ArticleBest Practices – General Considerations
General Considerations For security purposes, NAT mode is preferred because all of the internal or DMZ networks can have secure private addresses. NAT mode policies use network address translation to...
View ArticleBest Practices – Performance
Performance Disable any management features you do not need. If you don’t need SSH or SNMP, disable them. SSH also provides another possibility for would-be hackers to infiltrate your FortiGate unit....
View ArticleBest Practices – Shutting Down
Shutting down Always shut down the FortiGate operating system properly before turning off the power switch to avoid potentially catastrophic hardware problems. To power off the FortiGate unit –...
View Article