Strategies for blocking traffic by a service or protocol
At some point you will want to block traffic based on the type of service or protocol that is being used. This is a fairly straightforward exercise if you are blocking all traffic using that service...
View ArticleNavigating the FortiGate BIOS
This recipe has been moved. For the updated content, go here.
View ArticleUsing the USB MGMT Console port
This recipe has been moved. For the updated content, go here.
View ArticleWindows updates may cause denial of access to Internet
This recipe has been moved. For the updated content, go here.
View ArticleEncryption hash used by FortiOS for local pwd/psk
In these days of heightened security awareness, it makes sense to understand what is protecting your passwords from prying eyes. For anyone that has seen the configuration file of a FortiGate device,...
View ArticleViewing the FortiGate or FortiExtender Modem List
This article shows how to view the most recent version of the supported modem list for FortiGate or FortiExtender. These lists depend on the modem database version, not the version of FortiOS used. The...
View ArticleTraffic Shaping Priority Queueing (PRIQ)
This traffic shaping document describes Priority Queueing (PRIQ), Type of Service (ToS) priority, and Quality of Service (QoS). It also explains the following: Why traffic shaping only occurs when...
View ArticleResetting a lost Admin password
This recipe has been moved. For the updated content, go here.
View Article