Do you have a question about the Fortinet FortiGate 400 and is the answer not in the manual?
FortiGate Antivirus protection scans web, file transfer, and email content for viruses.
Procedure to connect to the web-based manager for initial configuration.
Connecting to the FortiGate CLI as an alternative to the web-based manager for configuration.
Gathering necessary information to customize NAT/Route mode settings before configuration.
Gathering information to customize Transparent mode settings before configuration.
Switching the FortiGate unit's operation mode from NAT/Route to Transparent.
Description of Active-Passive HA cluster, also known as hot standby HA.
Explanation of Active-Active HA, providing load balancing between FortiGate units.
Managing the FortiGate cluster as a single unit via web-based manager or CLI.
Procedures to install new firmware or revert to a previous version.
Web-based manager and CLI procedures to upgrade FortiOS firmware.
Reverting FortiGate to factory default config, deleting signatures, lists, and messages.
Manually updating antivirus definitions via the web-based manager.
Manually updating attack definitions via the web-based manager.
Downloading system settings to a text file on the management computer.
Restoring system settings to factory default values, resetting interface addresses.
Monitoring how close the FortiGate unit is to running at full capacity.
Configuring FortiGate routing, adding static routes, and policy routing.
Adding a default route for network traffic leaving the external interface.
Adding routes to control traffic destination, configuring addresses and gateways.
Arranging routes by specificity and managing gateway connection status.
Extending destination routing using policy routing based on source, protocol, or interface.
Creating and managing administrator accounts with permission levels and IP access controls.
Configuring the FortiGate SNMP agent to report system information and send traps.
Describes the default policy allowing port1 to port2 connections and blocking others.
Adding policies to control traffic between interfaces, zones, and VLAN subinterfaces.
Arranging policies in a list to ensure correct matching and execution order.
Mapping external IP addresses to destination networks using static NAT virtual IPs.
Translating source IP and port to a hidden destination address and port.
Adding policies that use virtual IPs to forward packets between networks.
Filtering packets allowed by policy using IP/MAC binding to prevent spoofing.
Filtering packets connecting to the firewall using IP/MAC binding for administrator management.
Creating new content profiles customized to specific requirements.
Adding content profiles to policies to apply antivirus, web filtering, and email filtering.
Adding user names to the internal database and configuring authentication methods.