Document
Library
Product Pillars
Network Security
Network Security
FortiGate / FortiOS
FortiGate-5000
/
6000
/
7000
FortiProxy
NOC & SOC Management
FortiManager
/
FortiManager Cloud
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiMonitor
FortiGate Cloud
Enterprise Networking
Secure SD-WAN
FortiLAN Cloud
FortiSwitch
FortiAP / FortiWiFi
FortiAP-U Series
FortiNAC-F
FortiExtender
/
FortiExtender Cloud
FortiAIOps
Business Communications
FortiFone
FortiVoice
/
FortiVoice Cloud
FortiRecorder
/
FortiCamera
Zero Trust Access
ZTNA
Zero Trust Network Access
FortiClient EMS
SASE
FortiSASE
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Cloud Security
Hybrid Cloud Security
FortiGate Public Cloud
FortiGate Private Cloud
Flex-VM
Cloud Native Protection
FortiCNP
FortiDevSec
Web Application / API Protection
FortiWeb
/
FortiWeb Cloud
FortiADC
/
FortiGSLB
FortiGuard ABP
SAAS Security
FortiMail
/
FortiMail Cloud
FortiCASB
Security Operations
SOC Platform
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
FortiPhish
Advanced Threat Protection
FortiSandbox
/
FortiSandbox Cloud
FortiNDR
FortiNDR Cloud
FortiDeceptor
FortiInsight
/
FortiInsight Cloud
FortiIsolator
Endpoint Security
FortiClient
/
FortiClient Cloud
FortiEDR
Best Practices
Solution Hubs
Curated links by solution
Cloud
FortiCloud
Public & Private Cloud
Popular Solutions
Secure SD-WAN
Zero Trust Network Access
Secure Access
Next Generation Firewall
Security Fabric
Tele-Working
Multi-Factor Authentication
FortiASIC
Operational Technology
MSSP
4-D Resources
Define, Design, Deploy, Demo
Secure SD-WAN
Zero Trust Network Access
Wireless
Switching
Secure Access Service Edge
Identity and Access Management
Next Generation Firewall
Hardware Guides
Filter Products
FortiAnalyzer
FortiAnalyzer Big-Data
FortiADC
FortiAP / FortiWiFi
FortiAP U-Series
FortiAuthenticator
FortiCache
FortiCarrier
FortiController
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiExtender
FortiGate
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiHypervisor
FortiIsolator
FortiMail
FortiManager
FortiNAC
FortiNDR
FortiProxy
FortiRecorder
FortiRPS
FortiSandbox
FortiSIEM
FortiSwitch
FortiTester
FortiToken
FortiVoice
FortiWAN
FortiWeb
FortiWLC
FortiWLM
Product A-Z
Filter Products
AscenLink
AV Engine
AWS Firewall Rules
FortiADC
FortiADC E Series
FortiADC Manager
FortiADC Private Cloud
FortiADC Public Cloud
FortiAIOps
FortiAnalyzer
FortiAnalyzer BigData
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Cloud
FortiAnalyzer Private Cloud
FortiAnalyzer Public Cloud
FortiAP / FortiWiFi
FortiAP-U Series
FortiAuthenticator
FortiAuthenticator Private Cloud
FortiAuthenticator Public Cloud
FortiAuthProxy
FortiBalancer
FortiBridge
FortiCache
FortiCamera
FortiCamera Cloud
FortiCare Elite
FortiCarrier
FortiCASB
FortiCentral
FortiClient
FortiClient Cloud
FortiCloud Services
FortiCNP
FortiConnect
FortiController
FortiConverter Service
FortiConverter Tool
FortiCore
FortiCSPM
FortiCWP
FortiDAST
FortiDB
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiDeceptor DaaS
FortiDeceptor Private Cloud
FortiDeceptor Public Cloud
FortiDevSec
FortiDNS
FortiEDR/XDR
FortiExplorer
FortiExplorer Go
FortiExtender
FortiExtender Cloud
FortiFlex
FortiFone
FortiGate / FortiOS
FortiGate Cloud
FortiGate CNF
FortiGate Private Cloud
FortiGate Public Cloud
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiGSLB
FortiGuard Advanced Bot Protection
FortiGuest
FortiHypervisor
FortiInsight
FortiInsight Cloud
FortiIPAM
FortiIsolator
FortiIsolator Public Cloud
FortiLAN Cloud
FortiMail
FortiMail Cloud
FortiManager
FortiManager Cloud
FortiManager Private Cloud
FortiManager Public Cloud
FortiMonitor
FortiNAC
FortiNAC-F
FortiNDR
FortiNDR (on-premise) Private Cloud
FortiNDR (on-premise) Public Cloud
FortiNDR Cloud
FortiNDR Cloud Sensors
FortiPAM
FortiPAM Private Cloud
FortiPAM Public Cloud
FortiPhish
FortiPlanner
FortiPolicy
FortiPortal
FortiPortal Public Cloud
FortiPresence
FortiPresence VM
FortiProxy
FortiProxy Private Cloud
FortiProxy Public Cloud
FortiRecon
FortiRecorder
FortiRPS
FortiSandbox
FortiSandbox Cloud
FortiSandbox Private Cloud
FortiSandbox Public Cloud
FortiSASE
FortiSIEM
FortiSIEM Cloud
FortiSOAR
FortiSOAR Cloud
FortiSwitch
FortiSwitch Manager
FortiTap
FortiTester
FortiTester Private Cloud
FortiTester Public Cloud
FortiToken
FortiToken Cloud
FortiTrust Identity
FortiVoice
FortiVoice Cloud
FortiVoice Private Cloud
FortiVoice Public Cloud
FortiWAN
FortiWAN Controller
FortiWeb
FortiWeb Cloud
FortiWeb Manager Private Cloud
FortiWeb Manager Public Cloud
FortiWeb Private Cloud
FortiWeb Public Cloud
FortiWLM
FortiZTP
IPS Engine
Managed FortiGate Service
Overlay-as-a-Service
Security Awareness and Training
SOCaaS
Wireless Controller
Ordering Guides
Search documents and hardware ...
Administration Guide
Getting started
Summary of steps
Setting up FortiGate for management access
Completing the FortiGate Setup wizard
Configuring basic settings
Registering FortiGate
Configuring a firewall policy
Backing up the configuration
Troubleshooting your installation
Using the GUI
Connecting using a web browser
Menus
Tables
Entering values
Text strings
Numbers
GUI-based global search
Loading artifacts from a CDN
Using the CLI
Connecting to the CLI
CLI basics
Command syntax
Subcommands
Permissions
Configuration and management
Using FortiExplorer Go and FortiExplorer
Getting started with FortiExplorer
Connecting FortiExplorer to a FortiGate with WiFi
Configure FortiGate with FortiExplorer using BLE
Running a security rating
Accessing Fortinet Developer Network
Terraform: FortiOS as a provider
Product registration with FortiCare
FortiCare and FortiGate Cloud login
FortiCare Register button
Transfer a device to another FortiCloud account
Deregistering a FortiGate
FortiGate models
Differences between models
Low encryption models
LEDs
Dashboards and Monitors
Using dashboards
Using widgets
Viewing device dashboards in the Security Fabric
Creating a fabric system and license dashboard
Dashboards
Status dashboard
Security dashboard
Viewing session information for a compromised host
Network dashboard
Static & Dynamic Routing monitor
DHCP monitor
IPsec monitor
SSL-VPN monitor
Users & Devices
Device inventory
Device inventory and filtering
Adding MAC-based addresses to devices
Firewall Users monitor
WiFi dashboard
FortiAP Status monitor
Clients by FortiAP monitor
Monitors
FortiView monitors and widgets
Adding FortiView monitors
Using the FortiView interface
Enabling FortiView from devices
FortiView sources
FortiView Sessions
FortiView Top Source and Top Destination Firewall Objects monitors
Viewing top websites and sources by category
Cloud application view
Top application: YouTube example
Network
Interfaces
Interface settings
Configure IPAM locally on the FortiGate
Interface MTU packet size
One-arm sniffer
Interface migration wizard
Captive portals
Configuring a FortiGate interface to act as an 802.1X supplicant
Physical interface
VLAN
Virtual VLAN switch
QinQ 802.1Q in 802.1ad
QinQ 802.1Q in 802.1Q
Aggregation and redundancy
Enhanced hashing for LAG member selection
Failure detection for aggregate and redundant interfaces
Loopback interface
Software switch
Hardware switch
Zone
Virtual wire pair
PRP handling in NAT mode with virtual wire pair
Using VLAN sub-interfaces in virtual wire pairs
Enhanced MAC VLAN
VXLAN
General VXLAN configuration and topologies
VLAN inside VXLAN
Virtual wire pair with VXLAN
VXLAN over IPsec tunnel with virtual wire pair
VXLAN over IPsec using a VXLAN tunnel endpoint
VXLAN troubleshooting
DNS
Important DNS CLI commands
DNS domain list
FortiGate DNS server
Basic DNS server configuration example
DDNS
DNS latency information
DNS over TLS and HTTPS
DNS session helpers
DNS troubleshooting
Explicit and transparent proxies
Explicit web proxy
FTP proxy
Transparent proxy
Proxy policy addresses
Proxy policy security profiles
Explicit proxy authentication
Transparent web proxy forwarding
Upstream proxy authentication in transparent proxy mode
Multiple dynamic header count
Restricted SaaS access
Explicit proxy and FortiGate Cloud Sandbox
Proxy chaining
WAN optimization SSL proxy chaining
Agentless NTLM authentication for web proxy
Multiple LDAP servers in Kerberos keytabs and agentless NTLM domain controllers
Learn client IP addresses
Explicit proxy authentication over HTTPS
mTLS client certificate authentication
CORS protocol in explicit web proxy when using session-based, cookie-enabled, and captive portal-enabled SAML authentication
HTTP connection coalescing and concurrent multiplexing for explicit proxy
DHCP servers and relays
Basic configuration
DHCP options
Common DHCP options
Additional DHCP options
IP address assignment with relay agent information option
DHCP addressing mode on an interface
VCI pattern matching for DHCP assignment
Multiple DHCP relay servers
FortiGate DHCP works with DDNS to allow FQDN connectivity to leased IP addresses
Static routing
Routing concepts
Policy routes
Equal cost multi-path
Dual internet connections
Dynamic routing
RIP
Basic RIP example
Basic RIPng example
OSPF
Basic OSPF example
OSPFv3 neighbor authentication
OSPF graceful restart upon a topology change
BGP
Basic BGP example
Route filtering with a distribution list
Next hop recursive resolution using other BGP routes
Next hop recursive resolution using ECMP routes
BGP conditional advertisement
BGP error handling per RFC 7606
BGP next hop tag-match mode
BGP neighbor password
BGP multi-exit discriminator
Troubleshooting BGP
BFD
BFD for multihop path for BGP
Routing objects
Route maps
Access lists
Prefix lists
AS path lists
Community lists
Multicast
Multicast routing and PIM support
Configuring multicast forwarding
FortiExtender
Adding a FortiExtender
Direct IP support for LTE/4G
LLDP reception
Virtual routing and forwarding
Implementing VRF
VRF routing support
Route leaking between VRFs with BGP
Route leaking between multiple VRFs
VRF with IPv6
IBGP and EBGP support in VRF
Support cross-VRF local-in and local-out traffic for local services
NetFlow
NetFlow templates
NetFlow on FortiExtender and tunnel interfaces
Allow multiple Netflow collectors
sFlow
Link monitor
Link monitor with route updates
Enable or disable updating policy routes when link health monitor fails
Add weight setting on each link health monitor server
SLA link monitoring for dynamic IPsec and SSL VPN tunnels
IPv6
IPv6 overview
IPv6 quick start
Neighbor discovery proxy
IPv6 address assignment
IPv6 stateless address auto-configuration (SLAAC)
DHCPv6 stateful server
SLAAC with DHCPv6 stateless server
IPv6 prefix delegation
NAT66, NAT46, NAT64, and DNS64
NAT66 policy
NAT46 policy
NAT64 policy and DNS64 (DNS proxy)
DHCPv6 relay
IPv6 tunneling
IPv6 IPsec VPN
IPv6 GRE tunnels
IPv6 tunnel inherits MTU based on physical interface
Configuring IPv4 over IPv6 DS-Lite service
IPv6 Simple Network Management Protocol
Dynamic routing in IPv6
OSPFv3 and IPv6
BGP and IPv6
IPv6 configuration examples
IPv6 quick start example
Site-to-site IPv6 over IPv6 VPN example
Site-to-site IPv4 over IPv6 VPN example
Site-to-site IPv6 over IPv4 VPN example
Basic OSPFv3 example
Basic IPv6 BGP example
FortiGate LAN extension
SCTP packets with zero checksum on the NP7 platform NEW
Diagnostics
Using the packet capture tool
Using the debug flow tool
SD-WAN
SD-WAN overview
SD-WAN components and design principles
SD-WAN designs and architectures
SD-WAN quick start
Configuring the SD-WAN interface
Adding a static route
Selecting the implicit SD-WAN algorithm
Configuring firewall policies for SD-WAN
Link monitoring and failover
Results
Configuring SD-WAN in the CLI
SD-WAN members and zones
Specify an SD-WAN zone in static routes and SD-WAN rules
Performance SLA
Performance SLA overview
Link health monitor
Monitoring performance SLA
Passive WAN health measurement
Passive health-check measurement by internet service and application
Mean opinion score calculation and logging in performance SLA health checks
Embedded SD-WAN SLA information in ICMP probes
SD-WAN application monitor using FortiMonitor
SD-WAN rules
SD-WAN rules overview
Fields for identifying traffic
Fields for configuring WAN intelligence
Additional fields for configuring WAN intelligence
Implicit rule
Automatic strategy
Manual strategy
Best quality strategy
Lowest cost (SLA) strategy
Maximize bandwidth (SLA) strategy
SD-WAN traffic shaping and QoS
SDN dynamic connector addresses in SD-WAN rules
Application steering using SD-WAN rules
Static application steering with a manual strategy
Dynamic application steering with lowest cost and best quality strategies
DSCP tag-based traffic steering in SD-WAN
Configuring SD-WAN rules
Results
ECMP support for the longest match in SD-WAN rule matching
Override quality comparisons in SD-WAN longest match rule matching
Use an application category as an SD-WAN rule destination
Use SD-WAN rules for WAN link selection with load balancing
Advanced routing
Local out traffic
Using BGP tags with SD-WAN rules
BGP multiple path support
Controlling traffic with BGP route mapping and service rules
Applying BGP route-map to multiple BGP neighbors
Using multiple members per SD-WAN neighbor configuration
VPN overlay
ADVPN and shortcut paths
SD-WAN monitor on ADVPN shortcuts
Hold down time to support SD-WAN service strategies
SD-WAN integration with OCVPN
Adaptive Forward Error Correction
Dual VPN tunnel wizard
Duplicate packets on other zone members
Duplicate packets based on SD-WAN rules
Interface based QoS on individual child tunnels based on speed test results
SD-WAN in large scale deployments
Advanced configuration
SD-WAN with FGCP HA
Configuring SD-WAN in an HA cluster using internal hardware switches
SD-WAN configuration portability
SD-WAN segmentation over a single overlay
Matching BGP extended community route targets in route maps
Copying the DSCP value from the session original direction to its reply direction
SD-WAN cloud on-ramp
Configuring the VPN overlay between the HQ FortiGate and cloud FortiGate-VM
Configuring the VPN overlay between the HQ FortiGate and AWS native VPN gateway
Configuring the VIP to access the remote servers
Configuring the SD-WAN to steer traffic between the overlays
Verifying the traffic
SD-WAN Network Monitor service
CLI speed test
GUI speed test
Scheduled interface speed test
Running speed tests from the hub to the spokes in dial-up IPsec tunnels
Speed test usage
Speed test examples
Troubleshooting SD-WAN
Tracking SD-WAN sessions
Understanding SD-WAN related logs
SD-WAN related diagnose commands
Using SNMP to monitor health check
Zero Trust Network Access
Zero Trust Network Access introduction
Basic ZTNA configuration
Establish device identity and trust context with FortiClient EMS
SSL certificate based authentication
Full versus simple ZTNA policies
ZTNA advanced configurations
Access control of unmanageable and unknown devices
HTTP2 connection coalescing and concurrent multiplexing for ZTNA
ZTNA configuration examples
ZTNA HTTPS access proxy example
ZTNA HTTPS access proxy with basic authentication example
ZTNA TCP forwarding access proxy example
ZTNA SSH access proxy example
ZTNA application gateway with SAML authentication example
ZTNA application gateway with SAML and MFA using FortiAuthenticator example
Secure LDAP connection from FortiAuthenticator with zero trust tunnel example
ZTNA IP MAC based access control example
ZTNA IPv6 examples
ZTNA Zero Trust application gateway example
ZTNA access proxy with KDC to access shared drives
Custom replacement message for ZTNA virtual hosts
ZTNA troubleshooting and debugging commands
ZTNA troubleshooting scenarios
Policy and Objects
Policies
Firewall policy
NGFW policy
Local-in policy
DoS policy
Access control lists
Interface policies
Source NAT
Static SNAT
Dynamic SNAT
Central SNAT
Configuring an IPv6 SNAT policy
SNAT policies with virtual wire pairs
Destination NAT
Static virtual IPs
Virtual IP with services
Virtual IPs with port forwarding
Virtual server load balance
Virtual server load balance multiplexing
Configure FQDN-based VIPs
Central DNAT
Remove overlap check for VIPs
VIP groups
Examples and policy actions
NAT46 and NAT64 policy and routing configurations
Mirroring SSL traffic in policies
Recognize anycast addresses in geo-IP blocking
Matching GeoIP by registered and physical location
HTTP to HTTPS redirect for load balancing
Use Active Directory objects directly in policies
No session timeout
MAP-E support
Seven-day rolling counter for policy hit counters
Cisco Security Group Tag as policy matching criteria
Virtual patching on the local-in management interface
Per-policy disclaimer messages
Address objects
Subnet
Dynamic policy — fabric devices
IP range
FQDN addresses
Using wildcard FQDN addresses in firewall policies
Geography based addresses
IPv6 geography-based addresses
Wildcard addressing
Interface subnet
Address group
Address folders
Allow empty address groups
Address group exclusions
FSSO dynamic address subtype
ClearPass integration for dynamic address objects
FortiNAC tag dynamic address
MAC addressed-based policies
ISDB well-known MAC address list
IPv6 MAC addresses and usage in firewall policies
Protocol options
Traffic shaping
Traffic shaping policies
Traffic shaping profiles
Traffic shaping with queuing using a traffic shaping profile
Traffic shapers
Shared traffic shaper
Per-IP traffic shaper
Changing traffic shaper bandwidth unit of measurement
Multi-stage DSCP marking and class ID in traffic shapers
Adding traffic shapers to multicast policies
Global traffic prioritization
DSCP matching and DSCP marking
Examples
Interface-based traffic shaping profile
Interface-based traffic shaping with NP acceleration
QoS assignment and rate limiting for FortiSwitch quarantined VLANs
Ingress traffic shaping profile
Internet Services
Using Internet Service in a policy
Using custom Internet Service in policy
Using extension Internet Service in policy
Global IP address information database
IP reputation filtering
Internet service groups in policies
Allow creation of ISDB objects with regional information
Internet service customization
Look up IP address information from the Internet Service Database page
Internet Service Database on-demand mode
Enabling the ISDB cache in the FortiOS kernel
Security Profiles
Inspection modes
Flow mode inspection (default mode)
Proxy mode inspection
Inspection mode feature comparison
Antivirus
Antivirus introduction
Antivirus techniques
Configuring an antivirus profile
Testing an antivirus profile
Proxy mode stream-based scanning
Databases
Advanced configurations
Using FortiSandbox post-transfer scanning with antivirus
Using FortiSandbox inline scanning with antivirus
Using FortiNDR inline scanning with antivirus
Malware threat feed from EMS
CIFS support
Configuration examples
Content disarm and reconstruction
FortiGuard outbreak prevention
External malware block list
Exempt list for files based on individual hash
Web filter
Web filter introduction
Web filter techniques
Configuring a web filter profile
FortiGuard filter
Category usage quota
Search engines
Static URL filter
Rating options
Proxy options