With this video, you’re going to learn how to secure your FortiGate unit’s wifi networks, allowing only authorized users to access the network and the web. Securing your network will prevent unwanted traffic, and allow you to monitor and track usage from client devices, by using DHCP to assign each one a unique IP address.
Wired/Wireless Connections with NAT Mode & PPPoE
With this video, you’re going to learn how to connect your FortiGate unit’s internal (wired) and wireless networks to the internet, with NAT Mode using PPPoE. PPPoE is an alternative to DHCP that some ISPs use, that uses a single IP, username and password received from the ISP to allow access to the internet. Your ISP will inform you if PPPoE is required.
Dual Internet connections to your network
With this video, you’re going to learn how to set up your FortiGate unit to receive two simultaneous redundant connections from two Internet Service Providers. Having redundant connections can protect you from outages or traffic overloads, and the FortiGate unit will automatically switch to the second connection if the first fails, and when the first connection is restored it will automatically take over again. If both connections are working properly, they will share the load.
Non-intrusive & Real-time Monitoring of Corporate Users Internet Activity – Part III
In continuation to our earlier post Non-intrusive & Real-time Monitoring of Corporate Users’ Internet Activity Part – I and Part – II , we will now show you how to monitor corporate users’ Internet activity with Firewall Analyzer – Advanced Search .
How-to Deploy Log & Event Manager to Hyper-V™ R2 Server 2008 R2
Download a full-featured, free 30-day trial now: www.solarwinds.com Learn how to deploy SolarWinds LEM virtual appliance software to Hyper-V™. LEM identifies and responds to network threats immediately — before they become a problem. With LEM, you can spot events and take action with true, obtain real-time event correlation, utilize USB defender and active response technology and immediately troubleshoot with visual IT search tools
Monitoring Corporate Users Internet Activity – Part II
In continuation to our earlier post Monitoring Corporate Users’ Internet Activity , we will now show you how to monitor corporate users’ Internet activity with Firewall Analyzer Quick Reports . Use Case 1: Quick Reports from Dashboard Get a quick view of top Internet users in your network with a few clicks from the Dashboard Step 1: Click the Quick Reports link of the Firewall device in the Traffic Statistics tab Step 2: Click the Top Conversation link in the left side. You will see a list of corporate users along with details on total bytes consumed, host/source, destination, protocol groups, hits, bytes sent, and bytes received
Understanding IP Precedence, TOS & DSCP
People using NetFlow Analyzer wonder, what these reports DSCP, TOS actually means ? Here is the blog which explain more detail about these fields.
Jabil at RSA 2012
Hear Jabil present on their SonicWALL Aventail experience at RSA 2012
Cookbook – Installing Dual Internet
How to install a redundant internet connection on the FortiGate.
April 2012 Patch Tuesday Bulletins are now Supported by Desktop Central
Microsoft April 2012 Patch Tuesday bulletins are now supported by Desktop Central. The patch assessment team at Desktop Central has tested the patches and have updated their online patch database on April 10 , 2012 at 23:00 EST