DOCUMENT LIBRARY
DOCUMENT LIBRARY
Products
Best Practices
Hardware Guides
Products A-Z
Summary
By Solution
By 4D Pillars
By Cloud
Secure Networking
Unified SASE
Security Operations
Secure SD-WAN
Secure Access Service Edge (SASE)
ZTNA
LAN Edge
Identity and Access Management
Next Generation Firewall
Public Cloud
Private Cloud
FortiCloud
Secure Networking
Hybrid Mesh Firewall
FortiGate/ FortiOS
FortiGate-5000
/
6000
/
7000
NOC Management
FortiManager
/
FortiManager Cloud
Managed Fortigate Service
LAN
FortiSwitch
FortiAP / FortiWiFi
FortiEdge Cloud
FortiNAC-F
WAN
Secure SD-WAN
FortiExtender
More >>
Unified SASE
Single Vendor SASE
FortiSASE
Secure SD-WAN
Zero Trust Network Access (ZTNA)
FortiProxy
FortiMonitor
Cloud Network Security
FortiGate Public Cloud
FortiGate Private Cloud
FortiGate CNF
FortiFlex
Lacework FortiCNAPP
Secure Endpoint Connectivity
FortiClient
/
FortiClient Cloud
Web Application / API Protection
FortiWeb
FortiADC
FortiDAST
More >>
Security Operations
Security Operations Automation
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
SOC-as-a-Service (SOCaaS)
Identity
FortiAuthenticator
FortiTrust Identity
FortiPAM
Early Detection & Prevention
FortiSandbox
/
FortiSandbox Cloud
FortiNDR
FortiDeceptor
FortiRecon
More >>
Secure Networking
Hybrid Mesh Firewall
FortiGate/ FortiOS
FortiGate-5000
/
6000
/
7000
NOC Management
FortiManager
/
FortiManager Cloud
Managed Fortigate Service
FortiAIOps
LAN
FortiSwitch
FortiAP / FortiWiFi
FortiAP-U Series
FortiEdge Cloud
FortiNAC-F
WAN
Secure SD-WAN
FortiExtender
Communication & Surveillance
FortiVoice
/
FortiVoice Cloud
FortiFone
FortiCamera
FortiRecorder
FortiCentral
Unified SASE
Single Vendor SASE
FortiSASE
Secure SD-WAN
Zero Trust Network Access (ZTNA)
FortiProxy
FortiMonitor
Secure Endpoint Connectivity
FortiClient
/
FortiClient Cloud
Cloud Network Security
FortiGate Public Cloud
FortiGate Private Cloud
FortiGate CNF
FortiFlex
Cloud-Native Security
Lacework FortiCNAPP
FortiDevSec
Web Application / API Protection
FortiWeb
FortiADC
FortiDAST
Security Operations
Security Operations Automation
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
Endpoint
FortiClient
/
FortiClient Cloud
FortiEDR/XDR
Data Protection
FortiDLP
FortiDLP Agent
FortiDLP Policies
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken
/
FortiToken Cloud
FortiPAM
Email
FortiMail
FortiPhish
Early Detection & Prevention
FortiSandbox
/
FortiSandbox Cloud
FortiNDR
FortiDeceptor
FortiRecon
Expert Services
SOC-as-a-Service (SOCaaS)
Edge Firewall
FortiGate/FortiOS
FortiGate-5000
/
6000
/
7000
FortiGate Public Cloud
FortiGate Private Cloud
Orchestration & management
FortiManager
/
FortiManager Cloud
FortiAnalyzer
/
FortiAnalyzer Cloud
Overlay-as-a-Service
SD Branch
FortiSwitch
FortiAP / FortiWiFi
FortiExtender
/
FortiExtender Cloud
Application Delivery
FortiADC
/
FortiGSLB
Single Vendor SASE
FortiSASE
Secure Endpoint Connectivity
FortiClient
/
FortiClient Cloud
Secure Private Access
Secure SD-WAN
Zero Trust Network Access (ZTNA)
Thin Edge
FortiGate/ FortiOS
FortiAP / FortiWiFi
FortiExtender
/
FortiExtender Cloud
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Application Gateway
FortiGate/ FortiOS
FortiProxy
FortiADC
/
FortiGSLB
Enterprise Asset Management
FortiClient EMS
Endpoint Agent
FortiClient
/
FortiClient Cloud
Agentless Security Posture
FortiNAC-F
FortiSIEM
/
FortiSIEM Cloud
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Wireless
FortiAP / FortiWiFi
FortiAP-U Series
FortiGate Cloud
Switching
FortiSwitch
FortiEdge Cloud
FortiNAC-F
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Privilege Acccess Management
FortiPAM
Next Generation Firewall
FortiGate / FortiOS
FortiGate-5000
/
6000
/
7000
FortiGate Public Cloud
FortiGate Private Cloud
Orchestration & management
FortiManager
/
FortiManager Cloud
FortiAnalyzer
/
FortiAnalyzer Cloud
Expert Services
SOC-as-a-Service (SOCaaS)
Managed Fortigate Service
All
FortiADC Public Cloud
FortiAnalyzer Public Cloud
FortiAuthenticator Public Cloud
FortiDeceptor Public Cloud
FortiGate Public Cloud
FortiIsolator Public Cloud
FortiManager Public Cloud
FortiNDR Public Cloud
FortiPAM Public Cloud
FortiPortal Public Cloud
FortiProxy Public Cloud
FortiSandbox Public Cloud
FortiTester Public Cloud
FortiVoice Public Cloud
FortiWeb Manager Public Cloud
FortiWeb Public Cloud
All
FortiADC Private Cloud
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Private Cloud
FortiAuthenticator Private Cloud
FortiDeceptor Private Cloud
FortiGate Private Cloud
FortiManager Private Cloud
FortiNDR Private Cloud
FortiPAM Private Cloud
FortiProxy Private Cloud
FortiSandbox Private Cloud
FortiTester Private Cloud
FortiVoice Private Cloud
FortiWeb Manager Private Cloud
FortiWeb Private Cloud
Account Management
FortiCloud Services
SAAS Management
FortiGate Cloud
FortiEdge Cloud
FortiEdge Cloud
FortiExtender Cloud
FortiPresence Cloud
FortiToken Cloud
FortiTrust Identity
FortiZTP
FortiCamera Cloud
SAAS Application Security
FortiWeb Cloud
FortiGSLB
FortiCASB
FortiCNP
FortiInsight
FortiPhish
FortiGate CNF
Managed Services
SOC-as-a-Service (SOCaaS)
Managed Fortigate Service
Platform as a service (PAAS)
FortiSASE
FortiAnalyzer Cloud
FortiManager Cloud
FortiClient Cloud
FortiSandbox Cloud
FortiMail Cloud
FortiSOAR Cloud
Other SAAS Services
Overlay-as-a-Service
FortiRecon
FortiConverter
ForiIPAM
FortiFlex
FortiCare Elite
4D Resources
Solution Hubs
Define, design, deploy, demo
4D Pillars
Secure SD-WAN
Zero Trust Network Access
Wireless
Switching
Secure Access Service Edge
Identity and Access Management
Next Generation Firewall
Curated Links by Solution
Cloud
FortiCloud
Public & Private Cloud
Popular Solutions
Secure SD-WAN
Zero Trust Network Access
Secure Access
Security Fabric
Tele-Working
Multi-Factor Authentication
FortiASIC
Operational Technology
MSSP
Next Generation Firewall
FortiAnalyzer
FortiAnalyzer Big-Data
FortiADC
FortiAP / FortiWiFi
FortiAP U-Series
FortiAuthenticator
FortiCache
FortiCarrier
FortiController
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiExtender
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiHypervisor
FortiIsolator
FortiMail
FortiManager
FortiNAC
FortiNDR
FortiProxy
FortiRecorder
FortiGate
FortiRPS
FortiSandbox
FortiSIEM
FortiSwitch
FortiTester
FortiToken
FortiVoice
FortiWAN
FortiWeb
FortiWLC
FortiWLM
AscenLink
AV Engine
AWS Firewall Rules
Container FortiOS
FortiADC
FortiADC E Series
FortiADC Manager
FortiADC Private Cloud
FortiADC Public Cloud
FortiAIOps
FortiAnalyzer
FortiAnalyzer BigData
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Cloud
FortiAnalyzer Private Cloud
FortiAnalyzer Public Cloud
FortiAP / FortiWiFi
FortiAP-U Series
FortiAuthenticator
FortiAuthenticator Private Cloud
FortiAuthenticator Public Cloud
FortiAuthProxy
FortiBalancer
FortiBranchSASE
FortiBridge
FortiCache
FortiCamera
FortiCamera Cloud
FortiCare Elite
FortiCarrier
FortiCASB
FortiCentral
FortiClient
FortiClient Cloud
FortiCloud Services
FortiCNP
FortiConnect
FortiController
FortiConverter Service
FortiConverter Tool
FortiCore
FortiCSPM
FortiCWP
FortiDAST
FortiDB
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiDeceptor DaaS
FortiDeceptor Private Cloud
FortiDeceptor Public Cloud
FortiDevSec
FortiDLP
FortiDLP Agent
FortiDLP Policies
FortiDNS
FortiEdge Cloud
FortiEDR/XDR
FortiEndpoint
FortiExplorer
FortiExplorer Go
FortiExtender
FortiFlex
FortiFone
FortiGate / FortiOS
FortiGate Cloud
FortiGate CNF
FortiGate Private Cloud
FortiGate Public Cloud
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiGate-as-a-Service
FortiGSLB
FortiGuard Advanced Bot Protection
FortiGuest
FortiHypervisor
FortiInsight
FortiInsight Cloud
FortiIPAM
FortiIsolator
FortiIsolator Public Cloud
FortiLAN Cloud
FortiMail
FortiMail Cloud
FortiManager
FortiManager Cloud
FortiManager Private Cloud
FortiManager Public Cloud
FortiMonitor
FortiNAC
FortiNAC-F
FortiNDR
FortiNDR (on-premise) Private Cloud
FortiNDR (on-premise) Public Cloud
FortiNDR Cloud
FortiNDR Cloud Sensors
FortiPAM
FortiPAM Private Cloud
FortiPAM Public Cloud
FortiPhish
FortiPlanner
FortiPolicy
FortiPortal
FortiPortal Public Cloud
FortiPresence
FortiPresence VM
FortiProxy
FortiProxy Private Cloud
FortiProxy Public Cloud
FortiRecon
FortiRecorder
FortiRPS
FortiSandbox
FortiSandbox Cloud
FortiSandbox Private Cloud
FortiSandbox Public Cloud
FortiSASE
FortiScanner
FortiSIEM
FortiSIEM Cloud
FortiSOAR
FortiSOAR Cloud
FortiSRA
FortiSwitch
FortiSwitch Manager
FortiTap
FortiTester
FortiTester Private Cloud
FortiTester Public Cloud
FortiToken
FortiToken Cloud
FortiTrust Identity
FortiVoice
FortiVoice Cloud
FortiVoice Private Cloud
FortiVoice Public Cloud
FortiWAN
FortiWAN Controller
FortiWeb
FortiWeb Cloud
FortiWeb Manager Private Cloud
FortiWeb Manager Public Cloud
FortiWeb Private Cloud
FortiWeb Public Cloud
FortiWLM
FortiZTP
IPS Engine
Lacework FortiCNAPP
Managed FortiGate Service
Overlay-as-a-Service
Security Awareness and Training
SOCaaS
Wireless Controller
Search documents and hardware ...
Cookbook
Getting started
Using the GUI
Connecting using a web browser
Menus
Tables
Entering values
Text strings
Numbers
Using the CLI
Connecting to the CLI
CLI basics
Command syntax
Subcommands
Permissions
FortiExplorer for iOS
Getting started with FortiExplorer
Connecting FortiExplorer to a FortiGate via WiFi
Running a security rating
Upgrading to FortiExplorer Pro
Basic administration
Registration
FortiCare and FortiGate Cloud login
FortiGate Cloud
Troubleshooting your installation
Zero touch provisioning
Zero touch provisioning with FortiDeploy
Zero touch provisioning with FortiManager
Dashboard
Dashboard CLI
Configuration backups
Fortinet Security Fabric
Security Fabric settings and usage
Components
Configuring the root FortiGate and downstream FortiGates
Configuring FortiAnalyzer
Configuring other Security Fabric devices
FortiAnalyzer Cloud service
FortiManager
FortiManager Cloud service
FortiSandbox
FortiClient EMS
FortiAP and FortiSwitch
Additional devices
Using the Security Fabric
Dashboard widgets
Topology
Topology view — consolidated risk
Viewing and controlling network risks via topology view
Deploying the Security Fabric
Security Fabric over IPsec VPN
Leveraging LLDP to simplify Security Fabric negotiation
Configuring the Security Fabric with SAML
Configuring single-sign-on in the Security Fabric
Configuring the root FortiGate as the IdP
Configuring a downstream FortiGate as an SP
Configuring certificates for SAML SSO
Verifying the single-sign-on configuration
CLI commands for SAML SSO
SAML SSO with pre-authorized FortiGates
Navigating between Security Fabric members with SSO
Advanced option - FortiGate SP changes
Advanced option - unique SAML attribute types
Security rating
Security Fabric score
Comprehensive report extensions
Verifying FortiAnalyzer configurations
Fabric connectors
SDN connectors
AliCloud SDN connector
AWS SDN connector with IAM credentials
Azure Stack SDN connector
Azure SDN connector for non-VM resources
VMware ESXi SDN connector
VMware NSX-T manager SDN connector
OpenStack (Horizon) SDN connector with domain filter
OCI SDN connector
ClearPass endpoint connector via FortiManager
Cisco pxGrid fabric connector
Cisco ACI SDN connector
Nuage SDN connector
Multiple concurrent SDN connectors
Filter lookup in SDN connectors
Support for wildcard SDN connectors in filter configurations
Kubernetes (K8s) SDN connectors
Private Cloud K8s SDN connector
AWS Kubernetes (EKS) SDN connector
GCP Kubernetes (GKE) SDN connector
Azure Kubernetes (AKS) SDN connector
Oracle Kubernetes (OKE) SDN connector
SSO/Identity connectors
Fortinet single sign-on agent
Poll Active Directory server
FortiClient EMS connector
FortiNAC endpoint connector
Symantec endpoint connector
RADIUS single sign-on (RSSO) agent
Threat feeds
External Block List (Threat Feed) – Policy
External Block List (Threat Feed) - Authentication
External Block List (Threat Feed) - File Hashes
External resources for DNS filter
Automation stitches
Creating automation stitches
Chaining and delaying actions
Triggers
FortiAnalyzer event handler trigger
Actions
CLI script action
NSX Quarantine action
AWS Lambda action
Azure Function action
Google Cloud Function action
AliCloud Function action
Webhook action
Slack integration webhook
Execute a CLI script based on CPU and memory thresholds
Troubleshooting
Viewing a summary of all connected FortiGates in a Security Fabric
Diagnosing automation stitches
FortiView
FortiView interface
FortiView from disk
FortiView from FortiAnalyzer
Cloud application view
FortiView Sources usability
FortiView from FortiGate Cloud
Supported views for different log sources
FortiGate Cloud-based IOC
FortiView — subnet filters
FortiView dashboards and widgets
FortiView object names
Network
Interfaces
Interface settings
Aggregation and redundancy
VLANs
Enhanced MAC VLANs
Inter-VDOM routing
Software switch
Hardware switch
Zone
Virtual Wire Pair
Virtual switch support for FortiGate 300E series
Failure detection for aggregate and redundant interfaces
VLAN inside VXLAN
Virtual Wire Pair with VXLAN
Interface MTU packet size
One-arm sniffer
DNS
Important DNS CLI commands
DNS domain list
FortiGate DNS server
DDNS
DNS latency information
DNS over TLS
DNS troubleshooting
Explicit and transparent proxies
Explicit web proxy
FTP proxy
Transparent proxy
Proxy policy addresses
Proxy policy security profiles
Explicit proxy authentication
Transparent web proxy forwarding
Multiple dynamic header count
Restricted SaaS access (Office 365, G Suite, Dropbox)
Explicit proxy and FortiSandbox Cloud
DHCP server
IP address assignment with relay agent information option
Static routing
Routing concepts
Policy routes
Equal cost multi-path
Dual internet connections
Multicast
Multicast routing and PIM support
Configuring multicast forwarding
Direct IP support for LTE/4G
LLDP reception
NetFlow
NetFlow templates
SD-WAN
SD-WAN quick start
Configuring the SD-WAN interface
Adding a static route
Selecting the implicit SD-WAN algorithm
Configuring security policies for SD-WAN
Link monitoring and failover
Results
Configuring SD-WAN in the CLI
WAN path control
Performance SLA - link monitoring
Performance SLA - SLA targets
Factory default health checks
Implicit rule
SD-WAN rules - best quality
SD-WAN rules - lowest cost (SLA)
SD-WAN rules - maximize bandwidth (SLA)
Application steering using SD-WAN rules
Static application steering with a manual strategy
Dynamic application steering with lowest cost and best quality strategies
SD-WAN traffic shaping and QoS
Per-link controls for policies and SLA checks
DSCP tag-based traffic steering in SD-WAN
Configuring IPsec tunnels
Configuring SD-WAN interfaces
Configuring firewall policies
Configuring Performance SLA test
Configuring SD-WAN rules
Results
Advanced configuration
Self-originating traffic
SDN dynamic connector addresses in SD-WAN rules
Forward error correction on VPN overlay networks
Using BGP tags with SD-WAN rules
BGP multiple path support
Controlling traffic with BGP route mapping and service rules
Applying BGP route-map to multiple BGP neighbors
ADVPN and shortcut paths
DSCP matching (shaping)
Dual VPN tunnel wizard
SD-WAN with FGCP HA
Enable dynamic connector addresses in SD-WAN policies
SD-WAN cloud on-ramp
Configuring the VPN overlay between the HQ FortiGate and cloud FortiGate-VM
Configuring the VPN overlay between the HQ FortiGate and AWS native VPN gateway
Configuring the VIP to access the remote servers
Configuring the SD-WAN to steer traffic between the overlays
Verifying the traffic
Hub and spoke SD-WAN deployment example
Datacenter configuration
Configure dial-up (dynamic) VPN
Configure VPN interfaces
Configure loopback interface
Configure BGP
Firewall policies
Configure a black hole route
Branch configuration
Configure VPN to the hub
Configure VPN interfaces
Configure BGP
Configure SD-WAN
Firewall configuration
Validation
Dynamic definition of SD-WAN routes
Adding another datacenter
Configuring SD-WAN in an HA cluster using internal hardware switches
Troubleshooting SD-WAN
Tracking SD-WAN sessions
Understanding SD-WAN related logs
SD-WAN related diagnose commands
SLA logging
SLA monitoring using the REST API
SD-WAN bandwidth monitoring service
System
Administrators
Administrator profiles
Add a local administrator
Remote authentication for administrators
Password policy
Associating a FortiToken to an administrator account
Firmware
Downloading a firmware image
Testing a firmware version
Upgrading the firmware
Downgrading to a previous firmware version
Installing firmware from system reboot
Restoring from a USB drive
Controlled upgrade
Settings
Default administrator password
Changing the host name
Setting the system time
SHA-1 authentication support (for NTPv4)
PTPv2
Configuring ports
Custom default service port range
Setting the idle timeout time
Setting the password policy
Changing the view settings
Setting the administrator password retries and lockout time
TLS configuration
Controlling return path with auxiliary session
Email alerts
Trusted platform module support
Virtual Domains
Split-task VDOM mode
Assign interfaces to a VDOM
Create per-VDOM administrators
Multi VDOM mode
Multi VDOM configuration examples
NAT mode
NAT and transparent mode
High Availability
Introduction to the FGCP cluster
Failover protection
FGSP (session synchronization) peer setup
Synchronizing sessions between FGCP clusters
Using standalone configuration synchronization
Troubleshoot an HA formation
Check HA sync status
Disabling stateful SCTP inspection
Upgrading FortiGates in an HA cluster
Out-of-band management with reserved management interfaces
In-band management
HA cluster setup examples
HA active-passive cluster setup
HA active-active cluster setup
HA virtual cluster setup
HA using a hardware switch to replace a physical switch
SNMP
Interface access
MIB files
SNMP agent
SNMP v1/v2c communities
SNMP v3 users
Important SNMP traps
Replacement messages
Replacement message groups
FortiGuard
IPv6 FortiGuard connections
Configuring antivirus and IPS options
Manual updates
Automatic updates
Sending malware statistics to FortiGuard
Update server location
Filtering
Override FortiGuard servers
Online security tools
FortiGuard third party SSL validation and anycast support
Configuration scripts
Workspace mode
Feature visibility
Certificates
Microsoft CA deep packet inspection
Procure and import a signed SSL certificate
Provision a trusted certificate with Let's Encrypt
Policy and Objects
Policies
Firewall policy parameters
Profile-based NGFW vs policy-based NGFW
NGFW policy mode application default service
Policy views and policy lookup
Policy with source NAT
Static SNAT
Dynamic SNAT
Central SNAT
Policy with destination NAT
Static virtual IPs
Virtual IP with services
Virtual IPs with port forwarding
Virtual server
Policy with Internet Service
Using Internet Service in policy
Using custom Internet Service in policy
Using extension Internet Service in policy
Global IP address information database
IP reputation filtering
Internet service groups in policies
Internet service customization
NAT64 policy and DNS64 (DNS proxy)
NAT46 policy
Local-in policies
DoS protection
IPv4/IPv6 access control lists
Mirroring SSL traffic in policies
Inspection mode per policy
Combined IPv4 and IPv6 policy
FortiGuard DNS filter for IPv6 policies
OSPFv3 neighbor authentication
Firewall anti-replay option per policy
Enabling advanced policy options in the GUI
Recognize anycast addresses in geo-IP blocking
Authentication policy extensions
NTLM extensions
HTTP to HTTPS redirect for load balancing
GTPv2 in policies
Use active directory objects directly in policies
FortiGate Cloud / FDN communication through an explicit proxy
Objects
Address group exclusions
MAC addressed-based policies
Dynamic policy — fabric devices
FSSO dynamic address subtype
ClearPass integration for dynamic address objects
Using wildcard FQDN addresses in firewall policies
Traffic shaping
Determining your QoS requirements
Packet rates
Interface bandwidth limit
Changing traffic shaper bandwidth unit of measurement
Shared traffic shaper
Per-IP traffic shaper
Type of Service-based prioritization and policy-based traffic shaping
Interface-based traffic shaping profile
Classifying traffic by source interface
Configuring traffic class IDs
Traffic shaping schedules
QoS assignment and rate limiting for quarantined VLANs
Weighted random early detection queuing
Security Profiles
Antivirus
Content disarm and reconstruction for antivirus
FortiGuard outbreak prevention for antivirus
External malware block list for antivirus
Checking flow antivirus statistics
CIFS support
Databases
Using FortiSandbox appliance with antivirus
Using FortiSandbox Cloud with antivirus
Web filter
URL filter
FortiGuard filter
Usage quota
Web content filter
File filter
Advanced filters 1
Advanced filters 2
External resources for web filter
Reliable web filter statistics
Flow-based web filtering
URL certificate blocklist
DNS filter
How to configure and apply a DNS filter profile
FortiGuard category-based DNS domain filtering
Botnet C&C domain blocking
DNS safe search
Local domain filter
DNS translation
Using a FortiGate as a DNS server
Troubleshooting for DNS filter
Application control
Basic category filters and overrides
Port enforcement check
Protocol enforcement
Intrusion prevention
Botnet C&C IP blocking
Email filter
Local-based filters
FortiGuard-based filters
File type-based filters
Protocols and actions
Configuring webmail filtering
Data leak prevention
Basic DLP filter types
DLP fingerprinting
DLP watermarking
VoIP solutions
General use cases
SIP message inspection and filtering
SIP pinholes
SIP over TLS
Custom SIP RTP port range support
Voice VLAN auto-assignment
ICAP
ICAP configuration example
Web application firewall
Protecting a server running web applications
Inspection modes
About inspection modes
Flow mode inspection (default mode)
Proxy mode inspection
Inspection mode feature comparison
Inspection mode differences for antivirus
Inspection mode differences for data leak prevention
Inspection mode differences for email filter
Inspection mode differences for web filter
SSL Inspection
Certificate inspection
Deep inspection
Protecting an SSL server
Ignoring the AUTH TLS command
SSH traffic file scanning
Overrides
Web rating override
Web profile override
Custom signatures
Application groups in policies
VPN
IPsec VPNs
General IPsec VPN configuration
Network topologies
Phase 1 configuration
Choosing IKE version 1 and 2
Pre-shared key vs digital certificates
Using XAuth authentication
Dynamic IPsec route control
Dynamic tunnel interface creation
Phase 2 configuration
VPN security policies
Blocking unwanted IKE negotiations and ESP packets with a local-in policy
Site-to-site VPN
FortiGate-to-FortiGate
Basic site-to-site VPN with pre-shared key
Site-to-site VPN with digital certificate
Site-to-site VPN with overlapping subnets
GRE over IPsec
Policy-based IPsec tunnel
FortiGate-to-third-party
IKEv2 IPsec site-to-site VPN to an AWS VPN gateway
IPsec VPN to Azure with virtual network gateway
IPsec VPN to an Azure with virtual WAN
IPSec VPN between a FortiGate and a Cisco ASA with multiple subnets
Cisco GRE-over-IPsec VPN
Remote access
FortiGate as dialup client
FortiClient as dialup client
Add FortiToken multi-factor authentication
Add LDAP user authentication
iOS device as dialup client
IKE Mode Config clients
IPsec VPN with external DHCP service
L2TP over IPsec
Tunneled Internet browsing
Aggregate and redundant VPN
Manual redundant VPN configuration
OSPF with IPsec VPN for network redundancy
IPsec VPN in an HA environment
IPsec aggregate for redundancy and traffic load-balancing
Per packet distribution and tunnel aggregation
Redundant hub and spoke VPN
Overlay Controller VPN (OCVPN)
Full mesh OCVPN
Hub-spoke OCVPN with ADVPN shortcut
Hub-spoke OCVPN with inter-overlay source NAT
OCVPN portal
Troubleshooting OCVPN
ADVPN
IPsec VPN wizard hub-and-spoke ADVPN support
ADVPN with BGP as the routing protocol
ADVPN with OSPF as the routing protocol
ADVPN with RIP as the routing protocol
Other VPN topics
VPN and ASIC offload
Encryption algorithms
Fragmenting IP packets before IPsec encapsulation
VXLAN over IPsec tunnel
VPN IPsec troubleshooting
Understanding VPN related logs
IPsec related diagnose command
SSL VPN
SSL VPN best practices
SSL VPN quick start
SSL VPN split tunnel for remote user
Connecting from FortiClient VPN client
Set up FortiToken multi-factor authentication
Connecting from FortiClient with FortiToken
SSL VPN tunnel mode
SSL VPN full tunnel for remote user
SSL VPN tunnel mode host check
SSL VPN web mode for remote user
Quick Connection tool
SSL VPN authentication
SSL VPN with LDAP user authentication
SSL VPN with LDAP user password renew
SSL VPN with LDAP-integrated certificate authentication
SSL VPN for remote users with MFA and user case sensitivity
SSL VPN with FortiToken mobile push authentication
SSL VPN with RADIUS on FortiAuthenticator
SSL VPN with RADIUS and FortiToken mobile push on FortiAuthenticator
SSL VPN with RADIUS password renew on FortiAuthenticator
SSL VPN with RADIUS on Windows NPS
SSL VPN with multiple RADIUS servers
SSL VPN with local user password policy
SSL VPN with certificate authentication
Dynamic address support for SSL VPN policies
SSL VPN multi-realm
SSL VPN to IPsec VPN
SSL VPN protocols
TLS 1.3 support
SMBv2 support
SSL VPN troubleshooting
Debug commands
Troubleshooting common scenarios
User & Device
Endpoint control and compliance
Per-policy disclaimer messages
Compliance
FortiSandbox Cloud region selection
FortiGate VM unique certificate
Running a file system check automatically
FortiGuard distribution of updated Apple certificates
User Definition
User types
Removing a user
User Groups
Configuring POP3 authentication
Dynamic policies - FortiClient EMS
Guest Management
Configuring guest access
Retail environment guest access
Device Inventory
Device summary and filtering
Adding MAC-based addresses to devices
LDAP Servers
FSSO polling connector agent installation
Enabling Active Directory recursive search
Configuring LDAP dial-in using a member attribute
Configuring wildcard admin accounts
Configuring least privileges for LDAP admin account authentication in Active Directory
RADIUS Servers
Configuring RADIUS SSO authentication
RSA ACE (SecurID) servers
TACACS+ Servers
Authentication Settings
FortiTokens
FortiToken Mobile Quick Start Guide
Registering FortiToken Mobile
Provisioning FortiToken Mobile
Activating FortiToken Mobile on a Mobile Phone
Applying Multi-Factor Authentication
FortiToken Cloud
Registering hard tokens
Managing FortiTokens
FortiToken Mobile Push
Troubleshooting and diagnosis
Configuring the maximum log in attempts and lockout period
Creating a PKI/peer user
Configuring firewall authentication
Wireless configuration
Switch Controller
FortiLink setup
FortiLink auto network configuration policy
FortiLink network sniffer extension
FortiLink MCLAG configuration
Standalone FortiGate as switch controller
Standalone FortiGate as switch controller
Multiple FortiSwitches managed via hardware/software switch
Multiple FortiSwitches in tiers via aggregate interface with redundant link enabled
Multiple FortiSwitches in tiers via aggregate interface with MCLAG enabled only on distribution
HA (A-P) mode FortiGate pairs as switch controller
Multiple FortiSwitches managed via hardware/software switch
Multiple FortiSwitches in tiers via aggregate interface with redundant link enabled
Multiple FortiSwitches in tiers via aggregate interface with MCLAG enabled on all tiers
Authentication and security
MAC-based 802.1X authentication
Port-based 802.1X authentication
MAC layer control - Sticky MAC and MAC Learning-limit
Quarantine
Flow and Device Detection
Data statistic
Security Fabric showing
FortiSwitch multi-tenant support
Persistent MAC learning
Split port mode (for QSFP / QSFP28)
Dynamic VLAN name assignment from RADIUS attribute
MSTI support
Netflow and IPFIX support
Log and Report
Viewing event logs
Sample logs by log type
Checking the email filter log
Supported log types to FortiAnalyzer, syslog, and FortiAnalyzer Cloud
Configuring multiple FortiAnalyzers on a multi-VDOM FortiGate
Configuring multiple FortiAnalyzers (or syslog servers) per VDOM
Source and destination UUID logging
Troubleshooting
Log-related diagnose commands
Backing up log files or dumping log messages
SNMP OID for logs that failed to send
Monitor
Policy and route checks
WiFi client monitor
WiFi health monitor
Running processes
Aggregate processes information
VM
Amazon Web Services
Microsoft Azure
Google Cloud Platform
Oracle OCI
AliCloud
Private cloud
FortiGate multiple connector support
Adding VDOMs with FortiGate v-series
Terraform: FortiOS as a provider
PF SR-IOV driver support
Troubleshooting
Troubleshooting methodologies
Troubleshooting scenarios
Checking the system date and time
Checking the hardware connections
Checking FortiOS network settings
Troubleshooting CPU and network resources
Troubleshooting high CPU usage
Checking the modem status
Running ping and traceroute
Checking the logs
Verifying routing table contents in NAT mode
Verifying the correct route is being used
Verifying the correct firewall policy is being used
Checking the bridging information in transparent mode
Checking the number of sessions that UTM proxy uses
Checking wireless information
Performing a sniffer trace (CLI and packet capture)
Debugging the packet flow
Testing a proxy operation
Displaying detail Hardware NIC information
Performing a traffic trace
Using a session table
Finding object dependencies
Diagnosing NPU-based interfaces
Running the TAC report
Other commands
ARP table
IP address
FortiGuard troubleshooting
Verifying connectivity to FortiGuard
Troubleshooting process for FortiGuard updates
FortiGuard server settings
Additional resources
Change Log
Home
FortiGate / FortiOS 6.2.7
Cookbook
6.2.7
6.2.16
6.2.15
6.2.14
6.2.13
6.2.12
6.2.11
6.2.10
6.2.9
6.2.8
6.2.7
6.2.6
6.2.5
6.2.4
6.2.3
6.2.2
6.2.0
6.0.0
5.6.0
5.4.0
SSL VPN
SSL VPN
The following topics provide information about SSL VPN:
SSL VPN best practices
SSL VPN quick start
SSL VPN tunnel mode
SSL VPN web mode for remote user
SSL VPN authentication
SSL VPN to IPsec VPN
SSL VPN protocols
SSL VPN troubleshooting
Restricting VPN access to rogue/non-compliant devices with Security Fabric
Previous
Next
Related Videos
Setup SSL VPN: Tunnel & Web Modes
17,615 views
5 years ago
SSL VPN
SSL VPN
The following topics provide information about SSL VPN:
SSL VPN best practices
SSL VPN quick start
SSL VPN tunnel mode
SSL VPN web mode for remote user
SSL VPN authentication
SSL VPN to IPsec VPN
SSL VPN protocols
SSL VPN troubleshooting
Restricting VPN access to rogue/non-compliant devices with Security Fabric
Previous
Next
Home
Product Pillars
Network Security
Network Security
FortiGate / FortiOS
FortiGate 5000
FortiGate 6000
FortiGate 7000
FortiProxy
NOC & SOC Management
FortiManager
FortiManager Cloud
FortiAnalyzer
FortiAnalyzer Cloud
FortiMonitor
FortiGate Cloud
Enterprise Networking
Secure SD-WAN
FortiLAN Cloud
FortiSwitch
FortiAP / FortiWiFi
FortiAP-U Series
FortiNAC-F
FortiExtender
FortiExtender Cloud
FortiAIOps
Business Communications
FortiFone
FortiVoice
FortiVoice Cloud
FortiRecorder
FortiCamera
Zero Trust Access
ZTNA
Zero Trust Network Access
FortiClient EMS
SASE
FortiSASE
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Cloud Security
Hybrid Cloud Security
FortiGate Public Cloud
FortiGate Private Cloud
FortiFlex
Cloud Native Protection
FortiCNP
FortiDevSec
Web Application / API Protection
FortiWeb
FortiWeb Cloud
FortiADC
FortiGSLB
FortiGuard ABP
SAAS Security
FortiMail
FortiMail Cloud
FortiCASB
Security Operations
SOC Platform
FortiAnalyzer
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
FortiPhish
Advanced Threat Protection
FortiSandbox
FortiSandbox Cloud
FortiNDR
FortiNDR Cloud
FortiDeceptor
FortiInsight
FortiInsight Cloud
FortiIsolator
Endpoint Security
FortiClient
FortiClient Cloud
FortiEDR
Best Practices
Solution Hubs
Cloud
FortiCloud
Public & Private Cloud
Popular Solutions
Secure SD-WAN
Zero Trust Network Access
Secure Access
Next Generation Firewall
Security Fabric
Tele-Working
Multi-Factor Authentication
FortiASIC
Operational Technology
MSSP
4-D Resources
Secure SD-WAN
Zero Trust Network Access
Wireless
Switching
Secure Access Service Edge
Identity and Access Management
Next Generation Firewall
Hardware Guides
FortiAnalyzer
FortiAnalyzer Big-Data
FortiADC
FortiAP / FortiWiFi
FortiAP U-Series
FortiAuthenticator
FortiCache
FortiCarrier
FortiController
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiExtender
FortiGate
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiHypervisor
FortiIsolator
FortiMail
FortiManager
FortiNAC
FortiNDR
FortiProxy
FortiRecorder
FortiRPS
FortiSandbox
FortiSIEM
FortiSwitch
FortiTester
FortiToken
FortiVoice
FortiWAN
FortiWeb
FortiWLC
FortiWLM
Product A-Z
AscenLink
AV Engine
AWS Firewall Rules
Container FortiOS
FortiADC
FortiADC E Series
FortiADC Manager
FortiADC Private Cloud
FortiADC Public Cloud
FortiAIOps
FortiAnalyzer
FortiAnalyzer BigData
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Cloud
FortiAnalyzer Private Cloud
FortiAnalyzer Public Cloud
FortiAP / FortiWiFi
FortiAP-U Series
FortiAuthenticator
FortiAuthenticator Private Cloud
FortiAuthenticator Public Cloud
FortiAuthProxy
FortiBalancer
FortiBranchSASE
FortiBridge
FortiCache
FortiCamera
FortiCamera Cloud
FortiCare Elite
FortiCarrier
FortiCASB
FortiCentral
FortiClient
FortiClient Cloud
FortiCloud Services
FortiCNP
FortiConnect
FortiController
FortiConverter Service
FortiConverter Tool
FortiCore
FortiCSPM
FortiCWP
FortiDAST
FortiDB
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiDeceptor DaaS
FortiDeceptor Private Cloud
FortiDeceptor Public Cloud
FortiDevSec
FortiDLP
FortiDLP Agent
FortiDLP Policies
FortiDNS
FortiEdge Cloud
FortiEDR/XDR
FortiEndpoint
FortiExplorer
FortiExplorer Go
FortiExtender
FortiFlex
FortiFone
FortiGate / FortiOS
FortiGate Cloud
FortiGate CNF
FortiGate Private Cloud
FortiGate Public Cloud
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiGate-as-a-Service
FortiGSLB
FortiGuard Advanced Bot Protection
FortiGuest
FortiHypervisor
FortiInsight
FortiInsight Cloud
FortiIPAM
FortiIsolator
FortiIsolator Public Cloud
FortiLAN Cloud
FortiMail
FortiMail Cloud
FortiManager
FortiManager Cloud
FortiManager Private Cloud
FortiManager Public Cloud
FortiMonitor
FortiNAC
FortiNAC-F
FortiNDR
FortiNDR (on-premise) Private Cloud
FortiNDR (on-premise) Public Cloud
FortiNDR Cloud
FortiNDR Cloud Sensors
FortiPAM
FortiPAM Private Cloud
FortiPAM Public Cloud
FortiPhish
FortiPlanner
FortiPolicy
FortiPortal
FortiPortal Public Cloud
FortiPresence
FortiPresence VM
FortiProxy
FortiProxy Private Cloud
FortiProxy Public Cloud
FortiRecon
FortiRecorder
FortiRPS
FortiSandbox
FortiSandbox Cloud
FortiSandbox Private Cloud
FortiSandbox Public Cloud
FortiSASE
FortiScanner
FortiSIEM
FortiSIEM Cloud
FortiSOAR
FortiSOAR Cloud
FortiSRA
FortiSwitch
FortiSwitch Manager
FortiTap
FortiTester
FortiTester Private Cloud
FortiTester Public Cloud
FortiToken
FortiToken Cloud
FortiTrust Identity
FortiVoice
FortiVoice Cloud
FortiVoice Private Cloud
FortiVoice Public Cloud
FortiWAN
FortiWAN Controller
FortiWeb
FortiWeb Cloud
FortiWeb Manager Private Cloud
FortiWeb Manager Public Cloud
FortiWeb Private Cloud
FortiWeb Public Cloud
FortiWLM
FortiZTP
IPS Engine
Lacework FortiCNAPP
Managed FortiGate Service
Overlay-as-a-Service
Security Awareness and Training
SOCaaS
Wireless Controller
Ordering Guides
Download PDF
Table of Contents
Getting started
Using the GUI
Connecting using a web browser
Menus
Tables
Entering values
Text strings
Numbers
Using the CLI
Connecting to the CLI
CLI basics
Command syntax
Subcommands
Permissions
FortiExplorer for iOS
Getting started with FortiExplorer
Connecting FortiExplorer to a FortiGate via WiFi
Running a security rating
Upgrading to FortiExplorer Pro
Basic administration
Registration
FortiCare and FortiGate Cloud login
FortiGate Cloud
Troubleshooting your installation
Zero touch provisioning
Zero touch provisioning with FortiDeploy
Zero touch provisioning with FortiManager
Dashboard
Dashboard CLI
Configuration backups
Fortinet Security Fabric
Security Fabric settings and usage
Components
Configuring the root FortiGate and downstream FortiGates
Configuring FortiAnalyzer
Configuring other Security Fabric devices
FortiAnalyzer Cloud service
FortiManager
FortiManager Cloud service
FortiSandbox
FortiClient EMS
FortiAP and FortiSwitch
Additional devices
Using the Security Fabric
Dashboard widgets
Topology
Topology view — consolidated risk
Viewing and controlling network risks via topology view
Deploying the Security Fabric
Security Fabric over IPsec VPN
Leveraging LLDP to simplify Security Fabric negotiation
Configuring the Security Fabric with SAML
Configuring single-sign-on in the Security Fabric
Configuring the root FortiGate as the IdP
Configuring a downstream FortiGate as an SP
Configuring certificates for SAML SSO
Verifying the single-sign-on configuration
CLI commands for SAML SSO
SAML SSO with pre-authorized FortiGates
Navigating between Security Fabric members with SSO
Advanced option - FortiGate SP changes
Advanced option - unique SAML attribute types
Security rating
Security Fabric score
Comprehensive report extensions
Verifying FortiAnalyzer configurations
Fabric connectors
SDN connectors
AliCloud SDN connector
AWS SDN connector with IAM credentials
Azure Stack SDN connector
Azure SDN connector for non-VM resources
VMware ESXi SDN connector
VMware NSX-T manager SDN connector
OpenStack (Horizon) SDN connector with domain filter
OCI SDN connector
ClearPass endpoint connector via FortiManager
Cisco pxGrid fabric connector
Cisco ACI SDN connector
Nuage SDN connector
Multiple concurrent SDN connectors
Filter lookup in SDN connectors
Support for wildcard SDN connectors in filter configurations
Kubernetes (K8s) SDN connectors
Private Cloud K8s SDN connector
AWS Kubernetes (EKS) SDN connector
GCP Kubernetes (GKE) SDN connector
Azure Kubernetes (AKS) SDN connector
Oracle Kubernetes (OKE) SDN connector
SSO/Identity connectors
Fortinet single sign-on agent
Poll Active Directory server
FortiClient EMS connector
FortiNAC endpoint connector
Symantec endpoint connector
RADIUS single sign-on (RSSO) agent
Threat feeds
External Block List (Threat Feed) – Policy
External Block List (Threat Feed) - Authentication
External Block List (Threat Feed) - File Hashes
External resources for DNS filter
Automation stitches
Creating automation stitches
Chaining and delaying actions
Triggers
FortiAnalyzer event handler trigger
Actions
CLI script action
NSX Quarantine action
AWS Lambda action
Azure Function action
Google Cloud Function action
AliCloud Function action
Webhook action
Slack integration webhook
Execute a CLI script based on CPU and memory thresholds
Troubleshooting
Viewing a summary of all connected FortiGates in a Security Fabric
Diagnosing automation stitches
FortiView
FortiView interface
FortiView from disk
FortiView from FortiAnalyzer
Cloud application view
FortiView Sources usability
FortiView from FortiGate Cloud
Supported views for different log sources
FortiGate Cloud-based IOC
FortiView — subnet filters
FortiView dashboards and widgets
FortiView object names
Network
Interfaces
Interface settings
Aggregation and redundancy
VLANs
Enhanced MAC VLANs
Inter-VDOM routing
Software switch
Hardware switch
Zone
Virtual Wire Pair
Virtual switch support for FortiGate 300E series
Failure detection for aggregate and redundant interfaces
VLAN inside VXLAN
Virtual Wire Pair with VXLAN
Interface MTU packet size
One-arm sniffer
DNS
Important DNS CLI commands
DNS domain list
FortiGate DNS server
DDNS
DNS latency information
DNS over TLS
DNS troubleshooting
Explicit and transparent proxies
Explicit web proxy
FTP proxy
Transparent proxy
Proxy policy addresses
Proxy policy security profiles
Explicit proxy authentication
Transparent web proxy forwarding
Multiple dynamic header count
Restricted SaaS access (Office 365, G Suite, Dropbox)
Explicit proxy and FortiSandbox Cloud
DHCP server
IP address assignment with relay agent information option
Static routing
Routing concepts
Policy routes
Equal cost multi-path
Dual internet connections
Multicast
Multicast routing and PIM support
Configuring multicast forwarding
Direct IP support for LTE/4G
LLDP reception
NetFlow
NetFlow templates
SD-WAN
SD-WAN quick start
Configuring the SD-WAN interface
Adding a static route
Selecting the implicit SD-WAN algorithm
Configuring security policies for SD-WAN
Link monitoring and failover
Results
Configuring SD-WAN in the CLI
WAN path control
Performance SLA - link monitoring
Performance SLA - SLA targets
Factory default health checks
Implicit rule
SD-WAN rules - best quality
SD-WAN rules - lowest cost (SLA)
SD-WAN rules - maximize bandwidth (SLA)
Application steering using SD-WAN rules
Static application steering with a manual strategy
Dynamic application steering with lowest cost and best quality strategies
SD-WAN traffic shaping and QoS
Per-link controls for policies and SLA checks
DSCP tag-based traffic steering in SD-WAN
Configuring IPsec tunnels
Configuring SD-WAN interfaces
Configuring firewall policies
Configuring Performance SLA test
Configuring SD-WAN rules
Results
Advanced configuration
Self-originating traffic
SDN dynamic connector addresses in SD-WAN rules
Forward error correction on VPN overlay networks
Using BGP tags with SD-WAN rules
BGP multiple path support
Controlling traffic with BGP route mapping and service rules
Applying BGP route-map to multiple BGP neighbors
ADVPN and shortcut paths
DSCP matching (shaping)
Dual VPN tunnel wizard
SD-WAN with FGCP HA
Enable dynamic connector addresses in SD-WAN policies
SD-WAN cloud on-ramp
Configuring the VPN overlay between the HQ FortiGate and cloud FortiGate-VM
Configuring the VPN overlay between the HQ FortiGate and AWS native VPN gateway
Configuring the VIP to access the remote servers
Configuring the SD-WAN to steer traffic between the overlays
Verifying the traffic
Hub and spoke SD-WAN deployment example
Datacenter configuration
Configure dial-up (dynamic) VPN
Configure VPN interfaces
Configure loopback interface
Configure BGP
Firewall policies
Configure a black hole route
Branch configuration
Configure VPN to the hub
Configure VPN interfaces
Configure BGP
Configure SD-WAN
Firewall configuration
Validation
Dynamic definition of SD-WAN routes
Adding another datacenter
Configuring SD-WAN in an HA cluster using internal hardware switches
Troubleshooting SD-WAN
Tracking SD-WAN sessions
Understanding SD-WAN related logs
SD-WAN related diagnose commands
SLA logging
SLA monitoring using the REST API
SD-WAN bandwidth monitoring service
System
Administrators
Administrator profiles
Add a local administrator
Remote authentication for administrators
Password policy
Associating a FortiToken to an administrator account
Firmware
Downloading a firmware image
Testing a firmware version
Upgrading the firmware
Downgrading to a previous firmware version
Installing firmware from system reboot
Restoring from a USB drive
Controlled upgrade
Settings
Default administrator password
Changing the host name
Setting the system time
SHA-1 authentication support (for NTPv4)
PTPv2
Configuring ports
Custom default service port range
Setting the idle timeout time
Setting the password policy
Changing the view settings
Setting the administrator password retries and lockout time
TLS configuration
Controlling return path with auxiliary session
Email alerts
Trusted platform module support
Virtual Domains
Split-task VDOM mode
Assign interfaces to a VDOM
Create per-VDOM administrators
Multi VDOM mode
Multi VDOM configuration examples
NAT mode
NAT and transparent mode
High Availability
Introduction to the FGCP cluster
Failover protection
FGSP (session synchronization) peer setup
Synchronizing sessions between FGCP clusters
Using standalone configuration synchronization
Troubleshoot an HA formation
Check HA sync status
Disabling stateful SCTP inspection
Upgrading FortiGates in an HA cluster
Out-of-band management with reserved management interfaces
In-band management
HA cluster setup examples
HA active-passive cluster setup
HA active-active cluster setup
HA virtual cluster setup
HA using a hardware switch to replace a physical switch
SNMP
Interface access
MIB files
SNMP agent
SNMP v1/v2c communities
SNMP v3 users
Important SNMP traps
Replacement messages
Replacement message groups
FortiGuard
IPv6 FortiGuard connections
Configuring antivirus and IPS options
Manual updates
Automatic updates
Sending malware statistics to FortiGuard
Update server location
Filtering
Override FortiGuard servers
Online security tools
FortiGuard third party SSL validation and anycast support
Configuration scripts
Workspace mode
Feature visibility
Certificates
Microsoft CA deep packet inspection
Procure and import a signed SSL certificate
Provision a trusted certificate with Let's Encrypt
Policy and Objects
Policies
Firewall policy parameters
Profile-based NGFW vs policy-based NGFW
NGFW policy mode application default service
Policy views and policy lookup
Policy with source NAT
Static SNAT
Dynamic SNAT
Central SNAT
Policy with destination NAT
Static virtual IPs
Virtual IP with services
Virtual IPs with port forwarding
Virtual server
Policy with Internet Service
Using Internet Service in policy
Using custom Internet Service in policy
Using extension Internet Service in policy
Global IP address information database
IP reputation filtering
Internet service groups in policies
Internet service customization
NAT64 policy and DNS64 (DNS proxy)
NAT46 policy
Local-in policies
DoS protection
IPv4/IPv6 access control lists
Mirroring SSL traffic in policies
Inspection mode per policy
Combined IPv4 and IPv6 policy
FortiGuard DNS filter for IPv6 policies
OSPFv3 neighbor authentication
Firewall anti-replay option per policy
Enabling advanced policy options in the GUI
Recognize anycast addresses in geo-IP blocking
Authentication policy extensions
NTLM extensions
HTTP to HTTPS redirect for load balancing
GTPv2 in policies
Use active directory objects directly in policies
FortiGate Cloud / FDN communication through an explicit proxy
Objects
Address group exclusions
MAC addressed-based policies
Dynamic policy — fabric devices
FSSO dynamic address subtype
ClearPass integration for dynamic address objects
Using wildcard FQDN addresses in firewall policies
Traffic shaping
Determining your QoS requirements
Packet rates
Interface bandwidth limit
Changing traffic shaper bandwidth unit of measurement
Shared traffic shaper
Per-IP traffic shaper
Type of Service-based prioritization and policy-based traffic shaping
Interface-based traffic shaping profile
Classifying traffic by source interface
Configuring traffic class IDs
Traffic shaping schedules
QoS assignment and rate limiting for quarantined VLANs
Weighted random early detection queuing
Security Profiles
Antivirus
Content disarm and reconstruction for antivirus
FortiGuard outbreak prevention for antivirus
External malware block list for antivirus
Checking flow antivirus statistics
CIFS support
Databases
Using FortiSandbox appliance with antivirus
Using FortiSandbox Cloud with antivirus
Web filter
URL filter
FortiGuard filter
Usage quota
Web content filter
File filter
Advanced filters 1
Advanced filters 2
External resources for web filter
Reliable web filter statistics
Flow-based web filtering
URL certificate blocklist
DNS filter
How to configure and apply a DNS filter profile
FortiGuard category-based DNS domain filtering
Botnet C&C domain blocking
DNS safe search
Local domain filter
DNS translation
Using a FortiGate as a DNS server
Troubleshooting for DNS filter
Application control
Basic category filters and overrides
Port enforcement check
Protocol enforcement
Intrusion prevention
Botnet C&C IP blocking
Email filter
Local-based filters
FortiGuard-based filters
File type-based filters
Protocols and actions
Configuring webmail filtering
Data leak prevention
Basic DLP filter types
DLP fingerprinting
DLP watermarking
VoIP solutions
General use cases
SIP message inspection and filtering
SIP pinholes
SIP over TLS
Custom SIP RTP port range support
Voice VLAN auto-assignment
ICAP
ICAP configuration example
Web application firewall
Protecting a server running web applications
Inspection modes
About inspection modes
Flow mode inspection (default mode)
Proxy mode inspection
Inspection mode feature comparison
Inspection mode differences for antivirus
Inspection mode differences for data leak prevention
Inspection mode differences for email filter
Inspection mode differences for web filter
SSL Inspection
Certificate inspection
Deep inspection
Protecting an SSL server
Ignoring the AUTH TLS command
SSH traffic file scanning
Overrides
Web rating override
Web profile override
Custom signatures
Application groups in policies
VPN
IPsec VPNs
General IPsec VPN configuration
Network topologies
Phase 1 configuration
Choosing IKE version 1 and 2
Pre-shared key vs digital certificates
Using XAuth authentication
Dynamic IPsec route control
Dynamic tunnel interface creation
Phase 2 configuration
VPN security policies
Blocking unwanted IKE negotiations and ESP packets with a local-in policy
Site-to-site VPN
FortiGate-to-FortiGate
Basic site-to-site VPN with pre-shared key
Site-to-site VPN with digital certificate
Site-to-site VPN with overlapping subnets
GRE over IPsec
Policy-based IPsec tunnel
FortiGate-to-third-party
IKEv2 IPsec site-to-site VPN to an AWS VPN gateway
IPsec VPN to Azure with virtual network gateway
IPsec VPN to an Azure with virtual WAN
IPSec VPN between a FortiGate and a Cisco ASA with multiple subnets
Cisco GRE-over-IPsec VPN
Remote access
FortiGate as dialup client
FortiClient as dialup client
Add FortiToken multi-factor authentication
Add LDAP user authentication
iOS device as dialup client
IKE Mode Config clients
IPsec VPN with external DHCP service
L2TP over IPsec
Tunneled Internet browsing
Aggregate and redundant VPN
Manual redundant VPN configuration
OSPF with IPsec VPN for network redundancy
IPsec VPN in an HA environment
IPsec aggregate for redundancy and traffic load-balancing
Per packet distribution and tunnel aggregation
Redundant hub and spoke VPN
Overlay Controller VPN (OCVPN)
Full mesh OCVPN
Hub-spoke OCVPN with ADVPN shortcut
Hub-spoke OCVPN with inter-overlay source NAT
OCVPN portal
Troubleshooting OCVPN
ADVPN
IPsec VPN wizard hub-and-spoke ADVPN support
ADVPN with BGP as the routing protocol
ADVPN with OSPF as the routing protocol
ADVPN with RIP as the routing protocol
Other VPN topics
VPN and ASIC offload
Encryption algorithms
Fragmenting IP packets before IPsec encapsulation
VXLAN over IPsec tunnel
VPN IPsec troubleshooting
Understanding VPN related logs
IPsec related diagnose command
SSL VPN
SSL VPN best practices
SSL VPN quick start
SSL VPN split tunnel for remote user
Connecting from FortiClient VPN client
Set up FortiToken multi-factor authentication
Connecting from FortiClient with FortiToken
SSL VPN tunnel mode
SSL VPN full tunnel for remote user
SSL VPN tunnel mode host check
SSL VPN web mode for remote user
Quick Connection tool
SSL VPN authentication
SSL VPN with LDAP user authentication
SSL VPN with LDAP user password renew
SSL VPN with LDAP-integrated certificate authentication
SSL VPN for remote users with MFA and user case sensitivity
SSL VPN with FortiToken mobile push authentication
SSL VPN with RADIUS on FortiAuthenticator
SSL VPN with RADIUS and FortiToken mobile push on FortiAuthenticator
SSL VPN with RADIUS password renew on FortiAuthenticator
SSL VPN with RADIUS on Windows NPS
SSL VPN with multiple RADIUS servers
SSL VPN with local user password policy
SSL VPN with certificate authentication
Dynamic address support for SSL VPN policies
SSL VPN multi-realm
SSL VPN to IPsec VPN
SSL VPN protocols
TLS 1.3 support
SMBv2 support
SSL VPN troubleshooting
Debug commands
Troubleshooting common scenarios
User & Device
Endpoint control and compliance
Per-policy disclaimer messages
Compliance
FortiSandbox Cloud region selection
FortiGate VM unique certificate
Running a file system check automatically
FortiGuard distribution of updated Apple certificates
User Definition
User types
Removing a user
User Groups
Configuring POP3 authentication
Dynamic policies - FortiClient EMS
Guest Management
Configuring guest access
Retail environment guest access
Device Inventory
Device summary and filtering
Adding MAC-based addresses to devices
LDAP Servers
FSSO polling connector agent installation
Enabling Active Directory recursive search
Configuring LDAP dial-in using a member attribute
Configuring wildcard admin accounts
Configuring least privileges for LDAP admin account authentication in Active Directory
RADIUS Servers
Configuring RADIUS SSO authentication
RSA ACE (SecurID) servers
TACACS+ Servers
Authentication Settings
FortiTokens
FortiToken Mobile Quick Start Guide
Registering FortiToken Mobile
Provisioning FortiToken Mobile
Activating FortiToken Mobile on a Mobile Phone
Applying Multi-Factor Authentication
FortiToken Cloud
Registering hard tokens
Managing FortiTokens
FortiToken Mobile Push
Troubleshooting and diagnosis
Configuring the maximum log in attempts and lockout period
Creating a PKI/peer user
Configuring firewall authentication
Wireless configuration
Switch Controller
FortiLink setup
FortiLink auto network configuration policy
FortiLink network sniffer extension
FortiLink MCLAG configuration
Standalone FortiGate as switch controller
Standalone FortiGate as switch controller
Multiple FortiSwitches managed via hardware/software switch
Multiple FortiSwitches in tiers via aggregate interface with redundant link enabled
Multiple FortiSwitches in tiers via aggregate interface with MCLAG enabled only on distribution
HA (A-P) mode FortiGate pairs as switch controller
Multiple FortiSwitches managed via hardware/software switch
Multiple FortiSwitches in tiers via aggregate interface with redundant link enabled
Multiple FortiSwitches in tiers via aggregate interface with MCLAG enabled on all tiers
Authentication and security
MAC-based 802.1X authentication
Port-based 802.1X authentication
MAC layer control - Sticky MAC and MAC Learning-limit
Quarantine
Flow and Device Detection
Data statistic
Security Fabric showing
FortiSwitch multi-tenant support
Persistent MAC learning
Split port mode (for QSFP / QSFP28)
Dynamic VLAN name assignment from RADIUS attribute
MSTI support
Netflow and IPFIX support
Log and Report
Viewing event logs
Sample logs by log type
Checking the email filter log
Supported log types to FortiAnalyzer, syslog, and FortiAnalyzer Cloud
Configuring multiple FortiAnalyzers on a multi-VDOM FortiGate
Configuring multiple FortiAnalyzers (or syslog servers) per VDOM
Source and destination UUID logging
Troubleshooting
Log-related diagnose commands
Backing up log files or dumping log messages
SNMP OID for logs that failed to send
Monitor
Policy and route checks
WiFi client monitor
WiFi health monitor
Running processes
Aggregate processes information
VM
Amazon Web Services
Microsoft Azure
Google Cloud Platform
Oracle OCI
AliCloud
Private cloud
FortiGate multiple connector support
Adding VDOMs with FortiGate v-series
Terraform: FortiOS as a provider
PF SR-IOV driver support
Troubleshooting
Troubleshooting methodologies
Troubleshooting scenarios
Checking the system date and time
Checking the hardware connections
Checking FortiOS network settings
Troubleshooting CPU and network resources
Troubleshooting high CPU usage
Checking the modem status
Running ping and traceroute
Checking the logs
Verifying routing table contents in NAT mode
Verifying the correct route is being used
Verifying the correct firewall policy is being used
Checking the bridging information in transparent mode
Checking the number of sessions that UTM proxy uses
Checking wireless information
Performing a sniffer trace (CLI and packet capture)
Debugging the packet flow
Testing a proxy operation
Displaying detail Hardware NIC information
Performing a traffic trace
Using a session table
Finding object dependencies
Diagnosing NPU-based interfaces
Running the TAC report
Other commands
ARP table
IP address
FortiGuard troubleshooting
Verifying connectivity to FortiGuard
Troubleshooting process for FortiGuard updates
FortiGuard server settings
Additional resources
Change Log