Wireless mesh
Wireless mesh The access points of a WiFi network are usually connected to the WiFi controller through Ethernet wiring. A wireless mesh eliminates the need for Ethernet wiring by connecting WiFi access...
View ArticleCombining WiFi and wired networks with a software switch
Combining WiFi and wired networks with a software switch Combining WiFi and wired networks with a software switch FortiAP local bridging (Private cloud-managed AP) Using bridged FortiAPs to increase...
View ArticleUsing remote WLAN FortiAPs
Using remote WLAN FortiAPs Remote WLAN FortiAP models enable you to provide a pre-configured WiFi access point to a remote or traveling employee. Once plugged in at home or in a hotel room, the FortiAP...
View ArticleProtecting the WiFi network
Protecting the WiFi network Wireless IDS WiFi data channel encryption Protected Management Frames and Opportunisitc Key Caching support Preventing local bridge traffic from reaching the LAN FortiAP-S...
View ArticleWireless network monitoring
Wireless network monitoring You can monitor both your wireless clients and other wireless networks that are available in your coverage area. Monitoring wireless clients Monitoring rogue APs Suppressing...
View ArticleConfiguring wireless network clients
Configuring wireless network clients This chapter shows how to configure typical wireless network clients to connect to a wireless network with WPAEnterprise security. Windows XP client Windows 7...
View ArticleWireless network examples
Wireless network examples This chapter provides an example wireless network configuration. Basic wireless network A more complex example Basic wireless network This example uses automatic configuration...
View ArticleManaging a FortiAP with FortiCloud
Managing a FortiAP with FortiCloud This chapter provides a few FortiCloud-managed FortiAP configuration examples. FortiCloud-managed FortiAP WiFi FortiCloud-managed FortiAP WiFi without a key You can...
View ArticleUsing a FortiWiFi unit as a client
Using a FortiWiFi unit as a client A FortiWiFi operates by default as a wireless access point. But a FortiWiFi can also operate as a wireless client, connecting the FortiGate to another wireless...
View ArticleSupport for location-based services
Support for location-based services FortiOS supports location-based services by collecting information about WiFi devices near FortiGate-managed access points, even if the devices don’t associate with...
View ArticleWIFI Troubleshooting
Troubleshooting In the following section, you will learn basic troubleshooting techniques for a secure Fortinet wireless LAN including: l strategies for troubleshooting Fortinet wireless devices l how...
View ArticleWIFI Reference
Reference FortiAP web-based manager You can access the FortiAP unit’s built-in web-based manager. This is useful to adjust settings that are not available through the FortiGate unit’s WiFi Controller....
View ArticleParallel Path Processing
Introduction Directed by security policies, a FortiGate screens network traffic from the IP layer up through the application layer of the TCP/IP stack. The steps involved in this inspection depend on...
View ArticleIntroduction to authentication
Introduction to authentication What is authentication? Businesses need to authenticate people who have access to company resources. In the physical world this may be a swipe card to enter the building,...
View ArticleLocal password authentication
Local password authentication The simplest authentication is based on user accounts stored locally on the FortiGate unit. For each account, a username and password is stored. The account also has a...
View ArticleServer-based password authentication
Server-based password authentication Using external authentication servers is desirable when multiple FortiGate units need to authenticate the same users, or where the FortiGate unit is added to a...
View ArticleCertificate-based authentication
Certificate-based authentication An RSA X.509 server certificate is a small file issued by a certificate authority (CA) that is installed on a computer or FortiGate unit to authenticate itself to other...
View ArticleTwo-factor authentication
Two-factor authentication A user can be required to provide both something they know (their username and password combination) and something they have (certificate or a random token code). Certificates...
View ArticleVirtual IPs for Port Forwarding
Quick hit back to basics video explaining how to use VIPs for Port Forwarding
View ArticleAuthentication binds to MAC address
Authentication binds to MAC address In previous FortiOS versions, firewall authentication was source IP based, thus there was no action in response to a MAC address change. This was a security flaw...
View Article