Default exemptions in the SSL deep-inspection profile
In the default configuration for FortiOS 5.2, several FortiGuard categories and firewall addresses appear in the Exempt from SSL Inspection list. However, if you upgrade your FortiGate to 5.2 from an...
View ArticleIPsec VPN Troubleshooting (Video)
In this video, you will learn how to troubleshoot a site-to-site IPsec VPN that provides transparent communication between a Headquarters FortiGate and Branch office FortiGate. This video will show you...
View ArticleFortiAuthenticator Certificate with SSL Inspection (Video)
In this example, you will create a certificate on the FortiGate, have it signed on the FortiAuthenticator, and configure the FortiGate so that the certificate can be used for SSL deep inspection of...
View ArticleSocial WiFi Captive Portal with FortiAuthenticator (Facebook)
WiFi authentication using social media provides access control without having to manually create guest accounts. This recipe involves configuring an API for Facebook accounts, setting up a social...
View ArticlePreventing Data Leaks (Video)
In this video, you will learn how to prevent files that contain sensitive information from leaving your internal network. You will create a Data Leak Prevention (or DLP) profile to block files that...
View ArticleManaging a FortiSwitch with a FortiGate (5.2)
Manage up to 16 FortiSwitches from the FortiGate web-based manager or CLI. You can create and assign VLANs and configure port information. The connection between the FortiSwitch and the FortiGate is...
View ArticleIPsec VPN with Native OS X Client (Video)
In this video, you will learn how to set up IPsec VPN between a FortiGate and a MAC using the default MAC client. This VPN configuration allows Mac users to securely access an internal network, and...
View ArticleBlocking Ultrasurf
In this recipe, you will use antivirus scanning and application control to block network users from downloading and using Ultrasurf. As mentioned in a recent SysAdmin Note, Ultrasurf is an application...
View ArticleSocial WiFi Captive Portal with FortiAuthenticator (Form-based)
WiFi authentication using a forms-based portal provides access control without having to manually create guest accounts. This recipe involves setting up a social portal RADIUS service on the...
View ArticleSSL VPN with certificate authentication
In this recipe, you will configure an SSL VPN tunnel that requires users to authenticate using a certificate. This recipe requires that you have three certificates: CA certificate server certificate...
View ArticleSite-to-site IPsec VPN with Overlapping Subnets (Video)
In this video, you will learn how to construct a site-to-site IPsec VPN connection between two networks with overlapping subnets. Without the proper configuration, connecting two networks with...
View ArticleSMS two-factor authentication for SSL VPN
In this recipe, you will create an SSL VPN with two-factor authentication consisting of a username/password and an SMS token. When a user attempts to connect to this SSL VPN, they are prompted to enter...
View ArticleSite-to-site IPsec VPN with Overlapping Subnets (Video)
In this video, you will learn how to construct a site-to-site IPsec VPN connection between two networks with overlapping subnets. Without the proper configuration, connecting two networks with...
View ArticleSMS two-factor authentication for SSL VPN
In this recipe, you will create an SSL VPN with two-factor authentication consisting of a username/password and an SMS token. When a user attempts to connect to this SSL VPN, they are prompted to enter...
View ArticleSSL VPN with certificate authentication
In this recipe, you will configure an SSL VPN tunnel that requires users to authenticate using a certificate. This recipe requires that you have three certificates: CA certificate server certificate...
View ArticleIPsec VPN with Native OS X Client (Video)
In this video, you will learn how to set up IPsec VPN between a FortiGate and a MAC using the default MAC client. This VPN configuration allows Mac users to securely access an internal network, and...
View ArticleBlocking Ultrasurf
In this recipe, you will use antivirus scanning and application control to block network users from downloading and using Ultrasurf. As mentioned in a recent SysAdmin Note, Ultrasurf is an application...
View ArticleSocial WiFi Captive Portal with FortiAuthenticator (Form-based)
WiFi authentication using a forms-based portal provides access control without having to manually create guest accounts. This recipe involves setting up a social portal RADIUS service on the...
View ArticleManaging a FortiSwitch with a FortiGate (5.2)
Manage up to 16 FortiSwitches from the FortiGate web-based manager or CLI. You can create and assign VLANs and configure port information. The connection between the FortiSwitch and the FortiGate is...
View ArticlePreventing Data Leaks (Video)
In this video, you will learn how to prevent files that contain sensitive information from leaving your internal network. You will create a Data Leak Prevention (or DLP) profile to block files that...
View Article