Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

Best Practices For Firewall Migration

Migration Network administrators are often reluctant to change firewall vendors due to the perception that the migration process is difficult. Indeed, there is no point hiding the fact that moving to a...

View Article


Best Practices – Environmental Specifications

Environmental specifications Keep the following environmental specifications in mind when installing and setting up your FortiGate unit. Operating temperature: 32 to 104°F (0 to 40°C). Temperatures may...

View Article


Best Practices – Firmware

Firmware Firmware upgrading and downgrading sounds pretty simple, anyone can do it, right? The mark of a professional is not that they can do something correctly, or even do it correctly over and over...

View Article

Best Practices – Performing a Firewall Upgrade

Performing a firmware upgrade Upgrading a firewall is something that should be compared to upgrading the operating system on your computer. It’s not to be taken lightly! You want to make sure...

View Article

Best Practices – Performing a firmware downgrade

Performing a firmware downgrade Just like upgrading, you need to make sure it’s done properly. While similar, the steps are somewhat different since there are other pitfalls in this case. Locate...

View Article


Best Practices – Performing a configuration backup

Performing a configuration backup Once you configure the FortiGate unit and it is working correctly, it is extremely important that you backup the configuration. In some cases, you may need to reset...

View Article

Best Practices – Backing up a configuration file using SCP

Backing up a configuration file using SCP You can use secure copy protocol (SCP) to download the configuration file from the FortiGate unit as an alternative method of backing up the configuration file...

View Article

Email filter

Email filter Spam is a common means by which attacks are delivered. Users often open email attachments they should not, and infect their own machine. l Enable email filtering at the network edge for...

View Article


Best Practices – Policy configuration

Policy configuration Configuring the FortiGate unit with an ‘allow all’ traffic policy is very undesirable. While this does greatly simplify the configuration, it is less secure. As a security measure,...

View Article


Best Practices – Security Profiles (AV, Web Filtering etc.)

Security Profiles (AV, Web Filtering etc.) Infection can come from many sources and have many different effects. Because of this, there is no single means to effectively protect your network. Instead,...

View Article

Best Practices – Web filtering and Patch Management

Web filtering FortiGuard Web Filtering can help stop infections from malware sites and help prevent communication if an infection occurs. Enable FortiGuard Web Filtering at the network edge. l Install...

View Article

Best Practices – Networking

Networking When configuring your network, ensure that there is no ‘back door’ access to the protected network. For example, if there is a wireless access point, it must be appropriately protected with...

View Article

Best Practices – FGCP High Availability

FGCP High Availability Fortinet suggests the following practices related to high availability: Use Active-Active HA to distribute TCP and UTM sessions among multiple cluster units. An active-active...

View Article


Best Practices – WAN Optimization

WAN Optimization WAN Optimization features require significant memory resources and generate a high amount of I/O on disk. Before enabling WAN Optimization, ensure that the memory usage is not too...

View Article

Best Practices – Virtual Domains (VDOMs)

Virtual Domains (VDOMs) VDOMs can provide separate firewall policies and, in NAT/Route mode, completely separate configurations for routing and VPN services for each connected network or organization....

View Article


Best Practice – Explicit proxy

Explicit proxy For explicit proxies, when configuring limits on the number of concurrent users, you need to allow for the number of users based on their authentication method. Otherwise you may run out...

View Article

Best Practice – Wireless

Wireless The following section contains a list of best practices for wireless network configurations with regard to encryption and authentication, geographic location, network planning, power usage,...

View Article


Best Practices – Using static IPs in a CAPWAP configuration

Using static IPs in a CAPWAP configuration In a large FortiAP deployment with more than 20 FortiAPs connecting to a Fortigate Wireless Controller (AC), it is recommended to use static IPs on the access...

View Article

Best Practices – Logging and reporting

Logging and reporting The default log device settings must be modified so that system performance is not compromised. The FortiGate unit, by default, has all logging of FortiGate features enabled,...

View Article

Image may be NSFW.
Clik here to view.

FortiOS 6.2.3 Release Notes

Change Log Date Change Description 2019-12-19 Initial release. 2019-12-19 Updated Resolved issues and Known issues. 2019-12-20 Updated Changes in CLI defaults. 2019-12-30 Added 585122 to Resolved...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>