
Introduction It is common to use the FortiGate as a web proxy for enterprise environments. The default behavior of the web-filter is to match traffic …
Guides and Designs for the Network Security Generalist
Introduction It is common to use the FortiGate as a web proxy for enterprise environments. The default behavior of the web-filter is to match traffic …
In a previous blog post, the ability to leverage CLI scripts with variables was explained. This served as an introduction to the feature but did …
The ability to use CLI scripts from the FortiManager provides a massive benefit when dealing with the configuration and deployment of firewalls on a large …
As with the other related Zero Touch Provisioning blogs, the baseline article around configuring the FortiManager should be reviewed in order to fully understand the …
No, this is not an April Fools Day joke. This particular post will deviate from the typical content I try to publish. Instead of publishing …
To continue to build upon the theme around Zero(ish) touch provisioning with the FortiManager, I want to provide an explanation on the deployment method that …
In a previous article I covered configuring the FortiManager to create a model device that can be used to automatically assign a configuration to a …
In a previous article I covered configuring the FortiManager to create a model device that can be used to automatically assign a configuration to a …
In a previous blog article, I provided a high level overview of the “Zero Touch Provisioning” process for configuring the FortiGate from the FortiManager. In …