Search Results: ''

Search

×
×
×
×
20 results for ""
FortiOS Handbook V2, Chapter 16: Deploying Wireless Networks By Fortinet Technologies Inc
eBook (PDF): $0.00
This document describes how to configure wireless networks with FortiWiFi, FortiGate, and FortiAP units.
FortiOS Handbook V2, Chapter 11: Virtual Domains By Fortinet Technologies Inc
eBook (PDF): $0.00
This guide provides detailed information about FortiGate VDOMs. It is intended for administrators who need guidance on solutions to suit different network needs and information on basic and advanced... More > configuration of VDOMs. Virtual Domains (VDOMs) multiply the capabilities of your FortiGate unit by using virtualization to partition your resources. VDOMs enable your FortiGate unit to split its resources and function as multiple independent units with common administration.< Less
FortiOS Handbook V2, Chapter 5: Troubleshooting By Fortinet Technologies Inc
eBook (PDF): $0.00
This handbook chapter describes concepts of troubleshooting and solving issues that may occur with FortiGate units.
FortiOS Handbook V2, Chapter 17: VoIP Solutions: SIP By Fortinet Technologies Inc
eBook (PDF): $0.00
This document contains detailed information about how FortiGate units processes SIP VoIP calls and how to configure the FortiGate unit to apply security features to SIP calls. This document also... More > describes all FortiGate SIP configuration options and contains detailed configuration examples.< Less
FortiOS Handbook V2, Chapter 12: High Availability By Fortinet Technologies Inc
eBook (PDF): $0.00
This document contains detailed information about how FortiGate HA and the FortiGate Clustering Protocol (FGCP) works. This document all describes all FortiGate HA configuration options, contains... More > detailed configuration examples, and describes how to operate FortiGate clusters.< Less
FortiOS Handbook V2, Chapter 14: Traffic Shaping By Fortinet Technologies Inc
eBook (PDF): $0.00
FortiGate units can implement Quality of Service (QoS) by applying bandwidth limits and prioritization. Using traffic shaping, you can adjust how your FortiGate unit allocates resources to different... More > traffic types to improve the performance and stability of latency sensitive or bandwidth intensive network applications. This document discusses Quality of Service (QoS) and traffic shaping, describes FortiGate traffic shaping algorithms, and provides procedures and tips on how to configure traffic shaping on FortiGate units.< Less
FortiOS Handbook V2, Chapter 3: System Administration By Fortinet Technologies Inc
eBook (PDF): $0.00
This guide describes a number of administrative tasks to configure and setup the FortiGate unit for the first time. It also describes the best practices and sample configuration tips to secure your... More > network and the FortiGate unit itself.< Less
FortiOS Handbook V2, Chapter 4: Logging and Reporting By Fortinet Technologies Inc
eBook (PDF): $0.00
This document provides detailed information that explains how to begin choosing a log device for your logging requirements, the types of log files, how to configure your chosen log device, including... More > detailed explanations of each log type of log messages. Logging is an integral component of the FortiGate system. Logging allows you to view the activity and status of the traffic passing through your network, and monitor for anomalies.< Less
FortiOS Handbook V2, Chapter 10: Advanced Routing By Fortinet Technologies Inc
eBook (PDF): $0.00
Dynamic routing is required in complex and changing network configurations where static routing does not provide sufficient convergence, redundancy, or other extended functionality. This guide... More > provides detailed information about FortiGate dynamic routing including common dynamic routing features, troubleshooting, and each of the protocols including RIP, BGP, and OSPF.< Less
FortiOS Handbook V2, Chapter 8: IPsec VPNs By Fortinet Technologies Inc
eBook (PDF): $0.00
This document explains the concepts and configuration of virtual private networks (VPNs), including gateway-to gateway and hub-and-spoke configurations, dynamic DNS, dial-up and IKE-mode clients,... More > Internet browsing configuration, redundant VPN, transparent mode VPN, manual key, IPv6 IPsec, L2TP IPsec, protecting OSFP with IPsec, and phase 1 and phase 2 parameters.< Less