Hosted NAT traversal
Hosted NAT traversal With the increase in the use of VoIP and other media traffic over the Internet, service provider network administrators must defend their networks from threats while allowing voice...
View ArticleSIP over IPv6
SIP over IPv6 FortiGates operating in NAT/Route and in transparent mode support SIP over IPv6. The SIP ALG can process SIP messages that use IPv6 addresses in the headers, bodies, and in the transport...
View ArticleDeep SIP message inspection
Deep SIP message inspection Deep SIP message syntax inspection (also called Deep SIP header inspection or SIP fuzzing protection) provides protection against malicious SIP messages by applying SIP...
View ArticleBlocking SIP request messages
Blocking SIP request messages You may want to block different types of SIP requests: to prevent SIP attacks using these messages. If your SIP server cannot process some SIP messages because of a...
View ArticleSIP rate limiting
SIP rate limiting Configurable threshold for SIP message rates per request method. Protects SIP servers from SIP overload and DoS attacks. SIP rate limiting FortiGates support rate limiting for the...
View ArticleSIP logging
SIP logging You can enable SIP logging and logging of SIP violations in a VoIP profile. config voip profile edit VoIP_Pro_Name config sip set log-call-summary enable set log-violations enable end end...
View ArticleInspecting SIP over SSL/TLS (secure SIP)
Inspecting SIP over SSL/TLS (secure SIP) Some SIP phones and SIP servers can communicate using SSL or TLS to encrypt the SIP signaling traffic. To allow SIP over SSL/TLS calls to pass through the...
View ArticleSIP and HA–session failover and geographic redundancy
SIP and HA–session failover and geographic redundancy FortiGate high availability supports SIP session failover (also called stateful failover) for active-passive HA. To support SIP session failover,...
View ArticleSIP and IPS
SIP and IPS You can enable IPS in security policies that also accept SIP sessions to protect the SIP traffic from SIP-based attacks. If you enable IPS in this way then by default the pinholes that the...
View ArticleSIP debugging
SIP debugging This chapter includes some information to help with debugging SIP configurations. SIP debug log format Assuming that diagnose debug console timestamp is enabled then the following shows...
View ArticleCreate, Delete, and Edit Hardware Switches In FortiOS
In this video I cover how to do some editing, deleting, and creating of Hardware Switches in FortiOS. The GUI leaves a lot of stuff out. Get Flexible and have some fun!
View ArticleManaging “Bring Your Own Device”
Managing “bring your own device” FortiOS can control network access for different types of personal mobile devices that your employees bring onto your premises. You can: identify and monitor the types...
View ArticleFortiGate firewall components
FortiGate firewall components The FortiGate firewall is made up of a number of different components that are used to build an impressive list of features that have flexibility of scope and granularity...
View ArticleHow does a FortiGate protect your network?
How does a FortiGate protect your network? The FortiGate firewall protects your network by taking the various components and using them together to build a kind of wall or access control point so that...
View ArticleFortiGate 30E For Entry Level
If you are looking for a good device to get started on then check out the FortiGate 30E. It is an inexpensive entry point and will enable you to get experience on a quality infrastructure. Definitely...
View ArticleWhat is a firewall?
What is a firewall? The term firewall originally referred to a wall intended to confine a fire or potential fire within a building. Later uses refer to similar structures, such as the metal sheet...
View ArticleNetwork layer or packet filter firewalls
Network layer or packet filter firewalls Stateless firewalls Stateless firewalls are the oldest form of these firewalls. They are faster and simple in design requiring less memory because they process...
View ArticleApplication layer firewalls
Application layer firewalls Application layer filtering is yet another approach and as the name implies it works primarily on the Application Layer of the OSI Model. Application Layer Firewalls...
View ArticleProxy servers
Proxy servers A proxy server is an appliance or application that acts as an intermediary for communicating between computers. A computer has a request for information. The packets are sent to the...
View ArticleUTM/ NGFW
UTM/ NGFW Unified Threat Management and Next Generation Firewall are terms originally coined by market research firms and refer to the concept of a comprehensive security solution provided in a single...
View Article