Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

Hosted NAT traversal

Hosted NAT traversal With the increase in the use of VoIP and other media traffic over the Internet, service provider network administrators must defend their networks from threats while allowing voice...

View Article


SIP over IPv6

SIP over IPv6 FortiGates operating in NAT/Route and in transparent mode support SIP over IPv6. The SIP ALG can process SIP messages that use IPv6 addresses in the headers, bodies, and in the transport...

View Article


Deep SIP message inspection

Deep SIP message inspection Deep SIP message syntax inspection (also called Deep SIP header inspection or SIP fuzzing protection) provides protection against malicious SIP messages by applying SIP...

View Article

Blocking SIP request messages

Blocking SIP request messages You may want to block different types of SIP requests: to prevent SIP attacks using these messages. If your SIP server cannot process some SIP messages because of a...

View Article

SIP rate limiting

SIP rate limiting Configurable threshold for SIP message rates per request method. Protects SIP servers from SIP overload and DoS attacks. SIP rate limiting FortiGates support rate limiting for the...

View Article


SIP logging

SIP logging You can enable SIP logging and logging of SIP violations in a VoIP profile. config voip profile edit VoIP_Pro_Name config sip set log-call-summary enable set log-violations enable end end...

View Article

Inspecting SIP over SSL/TLS (secure SIP)

Inspecting SIP over SSL/TLS (secure SIP) Some SIP phones and SIP servers can communicate using SSL or TLS to encrypt the SIP signaling traffic. To allow SIP over SSL/TLS calls to pass through the...

View Article

SIP and HA–session failover and geographic redundancy

SIP and HA–session failover and geographic redundancy FortiGate high availability supports SIP session failover (also called stateful failover) for active-passive HA. To support SIP session failover,...

View Article


SIP and IPS

SIP and IPS You can enable IPS in security policies that also accept SIP sessions to protect the SIP traffic from SIP-based attacks. If you enable IPS in this way then by default the pinholes that the...

View Article


SIP debugging

SIP debugging This chapter includes some information to help with debugging SIP configurations. SIP debug log format Assuming that diagnose debug console timestamp is enabled then the following shows...

View Article

Create, Delete, and Edit Hardware Switches In FortiOS

In this video I cover how to do some editing, deleting, and creating of Hardware Switches in FortiOS. The GUI leaves a lot of stuff out. Get Flexible and have some fun!

View Article

Managing “Bring Your Own Device”

Managing “bring your own device” FortiOS can control network access for different types of personal mobile devices that your employees bring onto your premises. You can: identify and monitor the types...

View Article

FortiGate firewall components

FortiGate firewall components The FortiGate firewall is made up of a number of different components that are used to build an impressive list of features that have flexibility of scope and granularity...

View Article


How does a FortiGate protect your network?

How does a FortiGate protect your network? The FortiGate firewall protects your network by taking the various components and using them together to build a kind of wall or access control point so that...

View Article

FortiGate 30E For Entry Level

If you are looking for a good device to get started on then check out the FortiGate 30E. It is an inexpensive entry point and will enable you to get experience on a quality infrastructure. Definitely...

View Article


What is a firewall?

What is a firewall? The term firewall originally referred to a wall intended to confine a fire or potential fire within a building. Later uses refer to similar structures, such as the metal sheet...

View Article

Network layer or packet filter firewalls

Network layer or packet filter firewalls Stateless firewalls Stateless firewalls are the oldest form of these firewalls. They are faster and simple in design requiring less memory because they process...

View Article


Application layer firewalls

Application layer firewalls Application layer filtering is yet another approach and as the name implies it works primarily on the Application Layer of the OSI Model. Application Layer Firewalls...

View Article

Proxy servers

Proxy servers A proxy server is an appliance or application that acts as an intermediary for communicating between computers. A computer has a request for information. The packets are sent to the...

View Article

UTM/ NGFW

UTM/ NGFW Unified Threat Management and Next Generation Firewall are terms originally coined by market research firms and refer to the concept of a comprehensive security solution provided in a single...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>