Best Practices For Firewall Migration
Migration Network administrators are often reluctant to change firewall vendors due to the perception that the migration process is difficult. Indeed, there is no point hiding the fact that moving to a...
View ArticleBest Practices – Environmental Specifications
Environmental specifications Keep the following environmental specifications in mind when installing and setting up your FortiGate unit. Operating temperature: 32 to 104°F (0 to 40°C). Temperatures may...
View ArticleBest Practices – Firmware
Firmware Firmware upgrading and downgrading sounds pretty simple, anyone can do it, right? The mark of a professional is not that they can do something correctly, or even do it correctly over and over...
View ArticleBest Practices – Performing a Firewall Upgrade
Performing a firmware upgrade Upgrading a firewall is something that should be compared to upgrading the operating system on your computer. It’s not to be taken lightly! You want to make sure...
View ArticleBest Practices – Performing a firmware downgrade
Performing a firmware downgrade Just like upgrading, you need to make sure it’s done properly. While similar, the steps are somewhat different since there are other pitfalls in this case. Locate...
View ArticleBest Practices – Performing a configuration backup
Performing a configuration backup Once you configure the FortiGate unit and it is working correctly, it is extremely important that you backup the configuration. In some cases, you may need to reset...
View ArticleBest Practices – Backing up a configuration file using SCP
Backing up a configuration file using SCP You can use secure copy protocol (SCP) to download the configuration file from the FortiGate unit as an alternative method of backing up the configuration file...
View ArticleEmail filter
Email filter Spam is a common means by which attacks are delivered. Users often open email attachments they should not, and infect their own machine. l Enable email filtering at the network edge for...
View ArticleBest Practices – Policy configuration
Policy configuration Configuring the FortiGate unit with an ‘allow all’ traffic policy is very undesirable. While this does greatly simplify the configuration, it is less secure. As a security measure,...
View ArticleBest Practices – Security Profiles (AV, Web Filtering etc.)
Security Profiles (AV, Web Filtering etc.) Infection can come from many sources and have many different effects. Because of this, there is no single means to effectively protect your network. Instead,...
View ArticleBest Practices – Web filtering and Patch Management
Web filtering FortiGuard Web Filtering can help stop infections from malware sites and help prevent communication if an infection occurs. Enable FortiGuard Web Filtering at the network edge. l Install...
View ArticleBest Practices – Networking
Networking When configuring your network, ensure that there is no ‘back door’ access to the protected network. For example, if there is a wireless access point, it must be appropriately protected with...
View ArticleBest Practices – FGCP High Availability
FGCP High Availability Fortinet suggests the following practices related to high availability: Use Active-Active HA to distribute TCP and UTM sessions among multiple cluster units. An active-active...
View ArticleBest Practices – WAN Optimization
WAN Optimization WAN Optimization features require significant memory resources and generate a high amount of I/O on disk. Before enabling WAN Optimization, ensure that the memory usage is not too...
View ArticleBest Practices – Virtual Domains (VDOMs)
Virtual Domains (VDOMs) VDOMs can provide separate firewall policies and, in NAT/Route mode, completely separate configurations for routing and VPN services for each connected network or organization....
View ArticleBest Practice – Explicit proxy
Explicit proxy For explicit proxies, when configuring limits on the number of concurrent users, you need to allow for the number of users based on their authentication method. Otherwise you may run out...
View ArticleBest Practice – Wireless
Wireless The following section contains a list of best practices for wireless network configurations with regard to encryption and authentication, geographic location, network planning, power usage,...
View ArticleBest Practices – Using static IPs in a CAPWAP configuration
Using static IPs in a CAPWAP configuration In a large FortiAP deployment with more than 20 FortiAPs connecting to a Fortigate Wireless Controller (AC), it is recommended to use static IPs on the access...
View ArticleBest Practices – Logging and reporting
Logging and reporting The default log device settings must be modified so that system performance is not compromised. The FortiGate unit, by default, has all logging of FortiGate features enabled,...
View ArticleFortiOS 6.2.3 Release Notes
Change Log Date Change Description 2019-12-19 Initial release. 2019-12-19 Updated Resolved issues and Known issues. 2019-12-20 Updated Changes in CLI defaults. 2019-12-30 Added 585122 to Resolved...
View Article