Fortinet white logo
Fortinet white logo

User Guide

Network

Network

After you complete onboarding, you can navigate to the pages under Network if you want to change the network settings, or configure advanced settings, such as specifying the SSL certificate for HTTPS connections, adding origin servers, etc.

Before setting up the network, it is helpful to understand the traffic flow between the clients, FortiAppSec Cloud WAF, and origin servers.

The figure above illustrates the following points:

  1. When users visit your application, the traffic is directed to the endpoints on FortiAppSec Cloud.
  2. FortiAppSec Cloud WAF filters the incoming traffic from users, blocking the OWASP Top 10 attacks, zero day threats, and other application layer attacks.
  3. Legitimate traffic arrives at origin servers. Load balancing algorithm is used to distribute traffic among servers.
  4. When FortiAppSec Cloud sends responses to your users, it obfuscates sensitive data such as the credit card number and other information that are likely to be used by hackers to damage your business.

Network

Network

After you complete onboarding, you can navigate to the pages under Network if you want to change the network settings, or configure advanced settings, such as specifying the SSL certificate for HTTPS connections, adding origin servers, etc.

Before setting up the network, it is helpful to understand the traffic flow between the clients, FortiAppSec Cloud WAF, and origin servers.

The figure above illustrates the following points:

  1. When users visit your application, the traffic is directed to the endpoints on FortiAppSec Cloud.
  2. FortiAppSec Cloud WAF filters the incoming traffic from users, blocking the OWASP Top 10 attacks, zero day threats, and other application layer attacks.
  3. Legitimate traffic arrives at origin servers. Load balancing algorithm is used to distribute traffic among servers.
  4. When FortiAppSec Cloud sends responses to your users, it obfuscates sensitive data such as the credit card number and other information that are likely to be used by hackers to damage your business.