FortiOS 6 – SSL/SSH inspection

SSL/SSH inspection Individual deep inspection security profiles can be created depending on the requirements of the policy. Depending on the inspection profile selected, you can: Configure which Certificate Authority (CA) certificate will be used to decrypt the Secure Sockets Layer (SSL) encrypted traffic. Configure whether a specific SSL protocol will be inspected, blocked or bypassed. […]

FortiOS 6 – FortiClient Compliance Profiles

FortiClient Compliance Profiles This section describes the FortiClient Compliance Profiles endpoint protection features and configuration. FortiClient Compliance Profiles are used primarily to make sure connected devices are compliant with Endpoint Control and to protect against vulnerabilities. Both Endpoint Vulnerability Scan on Client and System compliance are enabled by default, while other settings are disabled by […]

FortiOS 6 – Intrusion prevention

Intrusion prevention The FortiOS Intrusion Prevention System (IPS) combines signature detection and prevention with low latency and excellent reliability. With intrusion protection, you can create multiple IPS sensors, each containing a complete configuration based on signatures. Then, you can apply any IPS sensor to any security policy. This section describes how to configure the FortiOS […]

FortiOS 6 – Application Control

Application control Using the Application Control Security Profiles feature, your FortiGate unit can detect and take action against network traffic depending on the application generating the traffic. Based on FortiGate Intrusion Protection protocol decoders, application control is a user-friendly and powerful way to use Intrusion Protection features to log and manage the behavior of application […]