SSL VPN (5.6.1)
SSL VPN (5.6.1) New SSL VPN features added to FortiOS 5.6.1. Added a button to send Ctrl-Alt-Delete to the remote host for VNC and RDP desktop connections (401807) Previously, users were unable to send...
View ArticleSSL VPN (5.6)
SSL VPN (5.6) New SSL VPN features added to FortiOS 5.6. Remote desktop configuration changes (410648) If NLA security is chosen when creating an RDP bookmark, a username and password must be provided....
View ArticleSystem (5.6.1)
System (5.6.1) New system administration features added to FortiOS 5.6.1. Use self-sign as default GUI certificate if BIOS cert is using SHA-1 (403152) For increased security, SHA-1 certificate has...
View ArticleSystem (5.6)
System (5.6) New system administration features added to FortiOS 5.6. Remove CLI commands from 1-CPU platforms (405321) Two CLI commands that set CPU affinity have been removed from 1-CPU platforms...
View ArticleVDOMs (5.6.1)
VDOMs (5.6.1) This section describes new VDOM features added to FortiOS 5.6.1. Create a virtual switch that allows multiple VDOMs to use the same physical interface or VLAN (436206) This feature allows...
View ArticleVoIP/SIP (5.6)
VoIP/SIP (5.6) This chapter describes new VoIP and SIP features added to FortiOS 5.6. SIP strict-register enabled by default in VoIP Profiles (380830) If strict-register is disabled, when REGISTER is...
View ArticleWiFi (5.6.1)
WiFi (5.6.1) New WiFi features added to FortiOS 5.6.1. Support for various FortiAP models (416177) (435638) FortiAP units FAP-U321EV, FAP-U323EV, FAP-S221E, FAP-S223E, and FAP-222E are supported by...
View ArticleWiFi (5.6)
WiFi (5.6) New WiFi features added to FortiOS 5.6. Captive Portal Authentication with FortiAP in Bridge Mode (408915) The FortiGate can operate as a web captive portal server to serve the captive...
View ArticleFortiOS 5.6.2 What’s New
Executive Summary This chapter briefly highlights some of the higher profile new FortiOS 5.6 features, some of which have been enhanced for FortiOS 5.6.2. Security Fabric enhancements Security Fabric...
View ArticleFortiGate Authentication 5.6
Introduction Welcome and thank you for selecting Fortinet products for your network protection. This chapter contains the following topics: l Before you begin l How this guide is organized Before you...
View ArticleFortiGate Authentication What’s New
Whats New in FortiOS 5.6 The following section describes new authentication features added to FortiOS 5.6.0. and 5.6.1. FortiOS 5.6.1 These features first appeared in FortiOS 5.6.1. IPv6 RADIUS Support...
View ArticleWhat is authentication?
What is authentication? Businesses need to authenticate people who have access to company resources. In the physical world this may be a swipe card to enter the building, or a code to enter a locked...
View ArticleMethods of authentication
Methods of authentication FortiGate unit authentication is divided into three basic types: password authentication for people, certificate authentication for hosts or endpoints, and two-factor...
View ArticleTypes of authentication
Types of authentication FortiOS supports two different types of authentication based on your situation and needs. Security policy authentication is easily applied to all users logging on to a network,...
View ArticleVPN authentication
VPN authentication Authentication involves authenticating the user. In IPsec VPNs authenticating the user is optional, but authentication of the peer device is required. This section includes: l...
View ArticleSingle Sign-On authentication for users
Single Sign-On authentication for users “Single Sign-On” means that users logged on to a computer network are authenticated for access to network resources through the FortiGate unit without having to...
View ArticleUser’s view of authentication
User’s view of authentication From the user’s point of view, they see a request for authentication when they try to access a protected resource, such as an FTP repository of intellectual property or...
View ArticleFortiGate administrator’s view of authentication
FortiGate administrator’s view of authentication Authentication is based on user groups. The FortiGate administrator configures authentication for security policies and VPN tunnels by specifying the...
View ArticleArticle 2
Authentication servers FortiGate units support the use of external authentication servers. An authentication server can provide password checking for selected FortiGate users or it can be added as a...
View ArticleUsers and user groups
Users and user groups FortiGate authentication controls system access by user group. By assigning individual users to the appropriate user groups you can control each user’s access to network...
View Article