With this video, you’re going to learn how to set up an OSPF VPN connection, creating a redundant secure connection between two FortiGate units. By using OSPF on the IPsec interface, you can better control VPN traffic and have secure redundancies easily built into the network structure. This example shows a simple 2-site redundant IPsec setup
FortiOS 5.0 In 5 Minutes
FortiOS 5.0 is now available! In this video, we’re going to look at some of the benefits and features of 5.0, and what they can do for your network.
ManageEngine Thoughts: Software Defined Networking #2
Over the last couple of weeks, I spent a lot of time reading and thinking about SDN.
Basic Antivirus with FortiGate™
UTM: Unified Threat Management With your FortiGate unit, protecting your network from viruses is simple and straightforward, and the web-based interface gives you a variety of methods to track and monitor traffic for viruses.
Monitoring Application Usage on your Network
UTM: Unified Threat Management The FortiGate unit can log and track the traffic used by individual processes and applications, allowing you to better monitor internet usage and determine the source of unwanted traffic.
Secure Wifi Access with FortiGate
With this video, you’re going to learn how to secure your FortiGate unit’s wifi networks, allowing only authorized users to access the network and the web. Securing your network will prevent unwanted traffic, and allow you to monitor and track usage from client devices, by using DHCP to assign each one a unique IP address.
Would you pay twice for the same thing?
Traffic consists of various forms. Voice, video, data etc.
Virtually yours, NetFlow on VMWare vSphere 5 !
NetFlow is turning out to be the primary IP Accounting technology in the world of networking.
What Is a Sidejacking Attack?
Corey Nachreiner, CISSP, demonstrates how someone sitting near you at a wireless hotspot can steal your credentials for any Web account you log into…