WAN optimization profiles

WAN optimization profiles Use WAN optimization profiles to apply WAN optimization techniques to traffic to be optimized. In a WAN optimization profile you can select the protocols to be optimized and for each protocol you can enable SSL offloading (if supported), secure tunneling, byte caching and set the port or port range the protocol uses. […]

WAN Optimization Configuration

WAN Optimization Configuration This chapter describes FortiGate WAN optimization client server architecture and other concepts you need to understand to be able to configure FortiGate WAN optimization. Manual (peer-to-peer) and active-passive WAN optimization You can create manual (peer-to-peer) and active-passive WAN optimization configurations. In reality, because WAN optimization traffic can only be processed by one […]

WAN Optimization Concepts

WAN Optimization Concepts Client/server architecture Traffic across a WAN typically consists of clients on a client network communicating across a WAN with a remote server network. The clients do this by starting communication sessions from the client network to the server network. These communication sessions can be open text over the WAN or they can […]

Inside FortiOS: WAN Optimization

Inside FortiOS: WAN Optimization Enterprises deploying FortiOS can leverage WAN optimization to provide fast and secure application responses between locations on a Wide Area Network (WAN). The web caching component of FortiOS WAN optimization extends this protection and performance boost to cloud services. Centralize without compromising your WAN performance Many multi-location enterprise environments reduce costs […]

Example topologies relevant to WAN Optimization

Example topologies relevant to WAN Optimization FortiGate WAN optimization consists of a number of techniques that you can apply to improve the efficiency of communication across your WAN. These techniques include protocol optimization, byte caching, web caching, SSL offloading, and secure tunneling. Protocol optimization can improve the efficiency of traffic that uses the CIFS, FTP, […]

Schedule Groups

Schedule Groups You can organize multiple firewall schedules into a schedule group to simplify your security policy list. The schedule parameter in the policy configuration does not allow for the entering of multiple schedules into a single policy so if you have a combination of time frames that you want to schedule the policy for […]