Fortinet GURU
  • Fortinet GURU
  • About Me
  • Office of The CISO YouTube
  • Consulting Services
  • FortinetGURU @ YouTube
  • OCISO KB
  • Fortinet GURU
  • About Me
  • Office of The CISO YouTube
  • Consulting Services
  • FortinetGURU @ YouTube
  • OCISO KB

Tag: fortinet user must have a profile

Networking – Best Practice – FortiOS 5.4.x

Networking When configuring your network, ensure that there is no ‘back door’ access to the protected network. For example, if there is a wireless access point, it must be appropriately protected with password and encryption. Be sure to also maintain an up-to-date network diagram which includes IP addressing, cabling, and […]

July 5, 2016 FortiOS 5.4 Handbook 2 Comments

Configuring FSSO Advanced Settings

Configuring FSSO Advanced Settings Depending on your network topologies and requirement, you may need to configure advanced settings in the FSSO Colloctor agent.To do so, from the Start menu, select Programs > Fortinet > Fortinet Single Sign-On Agent > Configure Fortinet Single Sign-On Agent, then from the Common Tasks section, […]

July 5, 2016 FortiOS 5.4 Handbook No Comments

Configuring FSSO with Novell networks

Configuring FSSO with Novell networks You need to configure the eDirectory agent for it to communicate with eDirectory servers. You may have provided some of this information during installation. This section includes: Configuring the eDirectory agent Adding an eDirectory server Configuring a group filter   Configuring the eDirectory agent You […]

July 5, 2016 FortiOS 5.4 Handbook No Comments

Configuring the FSSO TS agent for Citrix

Configuring the FSSO TS agent for Citrix   The FSSO TS agent works with the same FSSO Collector agent that is used for integration with Windows Active Directory. Install the Collector agent first. Follow the Collector agent installation procedure in Collector agent installation on page 562.   Configuration steps include: […]

July 5, 2016 FortiOS 5.4 Handbook 1 Comment

Security Profiles (AV, Web Filtering etc.)

Security Profiles (AV, Web Filtering etc.) Infection can come from many sources and have many different effects. Because of this, there is no single means to effectively protect your network. Instead, you can best protect your network with the various UTM tools your FortiGate unit offers.   Firewall Be careful […]

July 4, 2016 FortiOS 5.4 Handbook 2 Comments

Chapter 5 – Best Practices

Chapter 5 – Best Practices Overview This FortiGate Best Practices document is a collection of guidelines to ensure the most secure and reliable operation of FortiGate units in a customer environment. It is updated periodically as new issues are identified.   General Considerations 1. For security purposes, NAT mode is […]

July 4, 2016 FortiOS 5.4 Handbook No Comments

RADIUS SSO example

RADIUS SSO example A common RADIUS SSO topology involves a medium sized company network of users connecting to the Internet through the FortiGate unit, and authenticating with a RADIUS server. RADIUS SSO authentication was selected because it is fast and relatively easy to configure. This section includes: Assumptions Topology Configuring […]

July 4, 2016 FortiOS 5.4 Handbook No Comments

Examples and Troubleshooting Authentication

Examples and Troubleshooting This chapter provides an example of a FortiGate unit providing authenticated access to the Internet for both Windows network users and local users. The following topics are included in this section: Firewall authentication example LDAP Dial-in using member-attribute example RADIUS SSO example Troubleshooting Firewall authentication example Example configuration […]

July 4, 2016 FortiOS 5.4 Handbook No Comments

Posts navigation

1 2 … 7

Latest Videos


5 Tips To Get Into Cybersecurity



EP8 - Security Frameworks



How To Get Into Cybersecurity



FortiOS 7 Features I am Excited About



One Way VOIP Audio Quick Fix



SD-WAN and Use Cases



Importing Policy to FortiManager



Importing Policy to FortiManager


Straight From The GURU

  • Before and Afters
  • Businesss Suggestions
  • Buy Fortinet Hardware
  • Consulting Stories
  • Fortinet GURU
  • FortinetGURU Videos
  • How To
  • Network Photos
  • Personal Network
  • Questions
  • Tips and Tricks

Fortinet Documentation

  • Administration Guides
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiBalancer
  • FortiBridge
  • FortiCache
  • FortiCamera
  • FortiCarrier
  • FortiClient
  • FortiCloud
  • FortiConverter
  • FortiCore
  • FortiExplorer
  • FortiExtender
  • FortiGate
  • FortiGuard
  • FortiGuard News
  • FortiHypervisor
  • FortiMail
  • FortiManager
  • Fortinet
  • Fortinet Datasheets
  • Fortinet Videos
  • FortiOS
  • FortiOS 5.2 Best Practices
  • FortiOS 5.4 Best Practices
  • FortiOS 5.4 Handbook
  • FortiOS 5.6
  • FortiPlanner
  • FortiPresence
  • FortiRecorder
  • FortiSandbox
  • FortiSIEM
  • FortiSwitch
  • FortiToken
  • FortiView
  • Fortivoice
  • FortiWAN
  • FortiWeb
  • Product Info
  • Release Notes
  • Third Party Reports
  • Vulnerabilities

Important Links

  • FortinetGuru @ Youtube
  • Office of The CISO
  • Cybersecurity Podcast
Fortinet GURU is not owned by or affiliated with Fortinet. | Cybersecurity Definitions and Terms INFOSEC Dictionary | Subscribe To The YouTube Channel!.
If you are in Montgomery Alabama there is always someone to talk to in relation to Montgomery Psychiatry.