Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

Wireless mesh

Wireless mesh The access points of a WiFi network are usually connected to the WiFi controller through Ethernet wiring. A wireless mesh eliminates the need for Ethernet wiring by connecting WiFi access...

View Article


Combining WiFi and wired networks with a software switch

Combining WiFi and wired networks with a software switch Combining WiFi and wired networks with a software switch FortiAP local bridging (Private cloud-managed AP) Using bridged FortiAPs to increase...

View Article


Using remote WLAN FortiAPs

Using remote WLAN FortiAPs Remote WLAN FortiAP models enable you to provide a pre-configured WiFi access point to a remote or traveling employee. Once plugged in at home or in a hotel room, the FortiAP...

View Article

Protecting the WiFi network

Protecting the WiFi network Wireless IDS WiFi data channel encryption Protected Management Frames and Opportunisitc Key Caching support Preventing local bridge traffic from reaching the LAN FortiAP-S...

View Article

Wireless network monitoring

Wireless network monitoring You can monitor both your wireless clients and other wireless networks that are available in your coverage area. Monitoring wireless clients Monitoring rogue APs Suppressing...

View Article


Configuring wireless network clients

Configuring wireless network clients This chapter shows how to configure typical wireless network clients to connect to a wireless network with WPAEnterprise security. Windows XP client Windows 7...

View Article

Wireless network examples

Wireless network examples This chapter provides an example wireless network configuration. Basic wireless network A more complex example Basic wireless network This example uses automatic configuration...

View Article

Image may be NSFW.
Clik here to view.

Managing a FortiAP with FortiCloud

Managing a FortiAP with FortiCloud This chapter provides a few FortiCloud-managed FortiAP configuration examples. FortiCloud-managed FortiAP WiFi FortiCloud-managed FortiAP WiFi without a key You can...

View Article


Using a FortiWiFi unit as a client

Using a FortiWiFi unit as a client A FortiWiFi operates by default as a wireless access point. But a FortiWiFi can also operate as a wireless client, connecting the FortiGate to another wireless...

View Article


Support for location-based services

Support for location-based services FortiOS supports location-based services by collecting information about WiFi devices near FortiGate-managed access points, even if the devices don’t associate with...

View Article

WIFI Troubleshooting

Troubleshooting In the following section, you will learn basic troubleshooting techniques for a secure Fortinet wireless LAN including: l strategies for troubleshooting Fortinet wireless devices l how...

View Article

WIFI Reference

Reference FortiAP web-based manager You can access the FortiAP unit’s built-in web-based manager. This is useful to adjust settings that are not available through the FortiGate unit’s WiFi Controller....

View Article

Parallel Path Processing

Introduction Directed by security policies, a FortiGate screens network traffic from the IP layer up through the application layer of the TCP/IP stack. The steps involved in this inspection depend on...

View Article


Introduction to authentication

Introduction to authentication What is authentication? Businesses need to authenticate people who have access to company resources. In the physical world this may be a swipe card to enter the building,...

View Article

Local password authentication

Local password authentication The simplest authentication is based on user accounts stored locally on the FortiGate unit. For each account, a username and password is stored. The account also has a...

View Article


Server-based password authentication

Server-based password authentication Using external authentication servers is desirable when multiple FortiGate units need to authenticate the same users, or where the FortiGate unit is added to a...

View Article

Certificate-based authentication

Certificate-based authentication An RSA X.509 server certificate is a small file issued by a certificate authority (CA) that is installed on a computer or FortiGate unit to authenticate itself to other...

View Article


Two-factor authentication

Two-factor authentication A user can be required to provide both something they know (their username and password combination) and something they have (certificate or a random token code). Certificates...

View Article

Virtual IPs for Port Forwarding

Quick hit back to basics video explaining how to use VIPs for Port Forwarding  

View Article

Authentication binds to MAC address

Authentication binds to MAC address In previous FortiOS versions, firewall authentication was source IP based, thus there was no action in response to a MAC address change. This was a security flaw...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>