FT-EFW-ATC – Fortinet Enterprise Firewall

Links:

CheatSheets from Boll and Fortinet.

Hardware Acceleration Guide

Boll Tech Blog

Fortinet Firmware Newsletter

FortiOS 7.6 Downloads and Documents (Release Notes / CLI Reference)

FortiGate with FortiOS 7.6: First Configuration Steps

Welches FortiOS verwenden?

FortiOS aktualisieren

Lab Network:

Chapter 5: Dynamic Routing Protocols

AS Numbers:
0 Reserved.
1-64’495 Public AS numbers.
64’496 – 64’511 Reserved to use in documentation.
64’512 – 65’534 Private AS numbers.
65’535 Reserved.

Additional Information

Flow versus Proxy Based Inspection

  • Flow based (default)
    • It is recommended that flow inspection is applied to policies that prioritize traffic throughput, such as allowing connections to be made towards a streaming or file server.
  • Proxy based
    • Because proxy mode provides the most thorough inspection, it is recommended that you apply proxy inspection to policies where preventing a data leak or malicious content is critical.
  • Flow-based inspection takes a snapshot of content packets and uses pattern matching to identify security threats in the content.
  • Proxy-based inspection reconstructs content that passes through the FortiGate and inspects the content for security threats.

Each inspection mode plays a role in processing traffic on route to its destination. While both modes offer significant security, proxy-based provides more feature configuration options, while flow-based is designed to optimize performance. More information on this topic is available in our Blog Post.

Life of a Packet