This article shows how to setup an active-passive session-aware load balancing cluster (SLBC) consisting of two FortiGate-5000 chassis, four FortiController-5103Bs two in each chassis, and six FortiGate-5001Bs acting as workers, three in each chassis.
In this example, you will configure logging to record information about sessions processed by your FortiGate. You will then use FortiView to look at the traffic logs and see how your network is being used.
This example verifies the current version of FortiOS firmware and, if necessary, updates it to the latest version. And this recipe is only for FortiOS releases 5.2.2 and higher.
In this example, user authentication and device authentication provide different access for staff members based on whether they are full-time or part-time employees, while denying all traffic from mobile phones.
In this recipe, you will create multiple security policies, which will apply security inspection to different users based on which user group they belong to.
In this recipe, you create a site-to-site IPsec VPN tunnel to allow communication between two networks that are located behind different FortiGate devices. You use the VPN Wizard’s Site to Site – FortiGate template to create the VPN tunnel on both FortiGate devices.
In this example you will learn how to create a wan1 to Internal port pair to make it easier to allow access to a web server protected by a FortiGate in Transparent mode for devices with FortiOS 5.2 and above.
Failure of secondary WAN IP for admin access, changing of category numbers and web filter category removal and FortiManager will also affect the success of FortiOS upgrade.
In this recipe, you add FortiTelemetry traffic to an existing IPsec VPN site-to-site tunnel between two FortiGate devices, in order to add a remote FortiGate to the Security Fabric. You also allow the remote FortiGate to access the FortiAnalyzer for logging.
In this recipe you will create a FortiGate administrator account that is limited to read and write access for user and device authentication and read access for logging and reporting. In addition you will use the Trusted Hosts feature to control the IP address that the administrator can log in from.
This recipe demonstrates FortiGate user authentication with the use of a FortiAuthenticator as a Single Sign-On server. In this example, the FortiAuthenticator is configured to collect the user logon by polling the Domain Controller logs. User authentication controls Internet access and applies different security profiles for different users.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.