Quantcast
Channel: FortiOS 5.2.3 – Fortinet Cookbook
Browsing all 52 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Social WiFi Captive Portal with FortiAuthenticator (Facebook)

WiFi authentication using social media provides access control without having to manually create guest accounts. This recipe involves configuring an API for Facebook accounts, setting up a social...

View Article


Encryption hash used by FortiOS for local pwd/psk

In these days of heightened security awareness it makes sense to understand what is protecting your passwords from prying eyes. For anyone that has seen the configuration file of a FortiGate device,...

View Article


Preventing Data Leaks (Video)

In this video, you will learn how to prevent files that contain sensitive information from leaving your internal network. You will create a Data Leak Prevention (or DLP) profile to block files that...

View Article

Social WiFi Captive Portal – Twitter (Video)

This video will show how to configure an API for Twitter accounts, set up a portal RADIUS service on the FortiAuthenticator, and configure the FortiGate for Captive Portal access. The recipe for this...

View Article

Image may be NSFW.
Clik here to view.

SLBC Dual-Mode with four FortiController-5903Cs and two chassis

This example describes how to setup a dual-mode session-aware load balancing cluster (SLBC) consisting of two FortiGate-5144C chassis, four FortiController-5903Cs (two in each chassis), and six...

View Article


SMS Two-Factor Authentication for SSL VPN (Video)

This video will show how to create an SSL VPN with two-factor authentication consisting of a username, password, and an SMS token. The SMS token is provided by FortiAuthenticator using the FortiGuard...

View Article

Image may be NSFW.
Clik here to view.

Multi-realm SSL VPN tunnel

In this recipe you will learn how to create a simple multi-realm SSL VPN tunnel that provides different portals for different user groups. You will create the necessary user definitions and configure...

View Article

SSL VPN w/ Certificate Auth (Video)

In this video, you will configure an SSL VPN tunnel that requires users to authenticate with a certificate. The certificate, username, and password are used for two-factor authentication. When...

View Article


Why you should use SSL inspection

Most of us are familiar with Hypertext Transfer Protocol Secure (HTTPS) and how it protects a variety of activities on the Internet by applying Secure Sockets Layer (SSL) encryption to the web traffic....

View Article


Image may be NSFW.
Clik here to view.

Viewing the FortiGate or FortiExtender Modem List

This article shows how to view the most recent version of the supported modem list for FortiGate or FortiExtender. These lists depend on the modem database version, not the version of FortiOS used. The...

View Article

Image may be NSFW.
Clik here to view.

Limiting bandwidth with traffic shaping

When a particular IP address uses too many resources you can prevent that IP from consuming your bandwidth indiscriminately. In this recipe, you learn how to use Traffic Shaping on your Fortigate to...

View Article

Limiting bandwidth with traffic shaping (Video)

In this video, you learn how to use Traffic Shaping on your Fortigate to limit the bandwidth for a specific IP address. When a particular IP address uses too many resources you can prevent that IP from...

View Article

Image may be NSFW.
Clik here to view.

Traffic Shaping Priority Queueing (PRIQ)

This traffic shaping document describes Priority Queueing (PRIQ), Type of Service (ToS) priority, and Quality of Service (QoS). It also explains the following: Why traffic shaping only occurs when...

View Article


Exempting Websites from SSL Deep Inspection (Video)

In this video, you will learn how to exempt specific websites from SSL Deep Inspection. Exempting a website from SSL Inspection allows a user’s browser to access it without errors, as deep inspection...

View Article

Image may be NSFW.
Clik here to view.

WiFi Network Troubleshooting

This page contains information to help you troubleshoot wireless network issues. In the following sections, you will learn basic troubleshooting techniques for a secure Fortinet wireless LAN including:...

View Article


IPsec VPN troubleshooting

This section contains tips to help you with some common challenges of IPsec VPNs. A VPN connection has multiple stages that can be confirmed to ensure the connection is working properly. It is easiest...

View Article

SSL VPN troubleshooting

This page contains tips to help you with some common challenges for SSL VPN. Enter the following to display debug messages for SSL VPN: diagnose debug application sslvpn -1 This command enables...

View Article


Offloading flow-based content inspection with NTurbo and IPSA

NTurbo and IPSA are two hardware acceleration technologies that FortiGates can use to improve performance by offloading and accelerating flow-based UTM/NGFW content processing. NTurbo offloading and...

View Article

Image may be NSFW.
Clik here to view.

FortiAuthenticator as a Certificate Authority

For this recipe, you will configure the FortiAuthenticator as a Certificate Authority (CA). This will allow the FortiAuthenticator to sign certificates that the FortiGate will use to secure...

View Article

Image may be NSFW.
Clik here to view.

FortiAuthenticator certificate for SSL inspection

For this recipe, you will create a certificate on the FortiGate, have it signed on the FortiAuthenticator, and configure the FortiGate so that the certificate can be used for SSL deep inspection of...

View Article
Browsing all 52 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>