Site-to-site IPsec VPN with Overlapping Subnets (Video)
In this video, you will learn how to construct a site-to-site IPsec VPN connection between two networks with overlapping subnets. Without the proper configuration, connecting two networks with...
View ArticleSMS two-factor authentication for SSL VPN
In this recipe, you will create an SSL VPN with two-factor authentication consisting of a username/password and an SMS token. When a user attempts to connect to this SSL VPN, they are prompted to enter...
View ArticleSSL VPN with certificate authentication
In this recipe, you will configure an SSL VPN tunnel that requires users to authenticate using a certificate. This recipe requires that you have three certificates: CA certificate server certificate...
View ArticleIPsec VPN with Native OS X Client (Video)
In this video, you will learn how to set up IPsec VPN between a FortiGate and a MAC using the default MAC client. This VPN configuration allows Mac users to securely access an internal network, and...
View ArticleBlocking Ultrasurf
In this recipe, you will use antivirus scanning and application control to block network users from downloading and using Ultrasurf. As mentioned in a recent SysAdmin Note, Ultrasurf is an application...
View ArticleSocial WiFi Captive Portal with FortiAuthenticator (Form-based)
WiFi authentication using a forms-based portal provides access control without having to manually create guest accounts. This recipe involves setting up a social portal RADIUS service on the...
View ArticleManaging a FortiSwitch with a FortiGate (5.2)
Manage up to 16 FortiSwitches from the FortiGate web-based manager or CLI. You can create and assign VLANs and configure port information. The connection between the FortiSwitch and the FortiGate is...
View ArticlePreventing Data Leaks (Video)
In this video, you will learn how to prevent files that contain sensitive information from leaving your internal network. You will create a Data Leak Prevention (or DLP) profile to block files that...
View ArticleSocial WiFi Captive Portal – Twitter (Video)
This video will show how to configure an API for Twitter accounts, set up a portal RADIUS service on the FortiAuthenticator, and configure the FortiGate for Captive Portal access. The recipe for this...
View ArticleSLBC Dual-Mode with four FortiController-5903Cs and two chassis
This example describes how to setup a dual-mode session-aware load balancing cluster (SLBC) consisting of two FortiGate-5144C chassis, four FortiController-5903Cs (two in each chassis), and six...
View ArticleSMS Two-Factor Authentication for SSL VPN (Video)
This video will show how to create an SSL VPN with two-factor authentication consisting of a username, password, and an SMS token. The SMS token is provided by FortiAuthenticator using the FortiGuard...
View ArticleMulti-realm SSL VPN tunnel
In this recipe you will learn how to create a simple multi-realm SSL VPN tunnel that provides different portals for different user groups. You will create the necessary user definitions and configure...
View ArticleSSL VPN w/ Certificate Auth (Video)
In this video, you will configure an SSL VPN tunnel that requires users to authenticate with a certificate. The certificate, username, and password are used for two-factor authentication. When...
View ArticleLimiting bandwidth with traffic shaping
When a particular IP address uses too many resources you can prevent that IP from consuming your bandwidth indiscriminately. In this recipe, you learn how to use Traffic Shaping on your Fortigate to...
View ArticleLimiting bandwidth with traffic shaping (Video)
In this video, you learn how to use Traffic Shaping on your Fortigate to limit the bandwidth for a specific IP address. When a particular IP address uses too many resources you can prevent that IP from...
View ArticleExempting Websites from SSL Deep Inspection (Video)
In this video, you will learn how to exempt specific websites from SSL Deep Inspection. Exempting a website from SSL Inspection allows a user’s browser to access it without errors, as deep inspection...
View ArticleFortiAuthenticator as a Certificate Authority
For this recipe, you will configure the FortiAuthenticator as a Certificate Authority (CA). This will allow the FortiAuthenticator to sign certificates that the FortiGate will use to secure...
View ArticleFortiAuthenticator Certificate with SSL Inspection
For this recipe, you will create a certificate on the FortiGate, have it signed on the FortiAuthenticator, and configure the FortiGate so that the certificate can be used for SSL deep inspection of...
View ArticleIPsec VPN troubleshooting (Video)
In this video, you will learn how to troubleshoot a site-to-site IPsec VPN that provides transparent communication between a Headquarters FortiGate and Branch office FortiGate. This video will show you...
View ArticleFortiAuthenticator Certificate with SSL Inspection (Video)
In this example, you will create a certificate on the FortiGate, have it signed on the FortiAuthenticator, and configure the FortiGate so that the certificate can be used for SSL deep inspection of...
View Article