Datasheet

5
High Availability
High Availability (HA) configurations enhance reliability and
increase performance by clustering multiple FortiGate appliances
into a single entity. FortiGate High Availability supports Active-
Active and Active-Passive options to provide maximum flexibility
for utilizing each member within the HA cluster. The HA feature is
included as part of the FortiOS operation system and is available
with most FortiGate appliances.
Features
• Active-Active and Active-Passive
• Stateful Failover (FW and VPN)
• Link State Monitor and Failover
• Device Failure Detection and Notification
• Server Load Balancing
Virtual Domains
Virtual Domains (VDOMs) enable a single FortiGate system to
function as multiple independent virtual FortiGate systems.
Each VDOM contains its own virtual interfaces, security
profiles, routing table, administration, and many other features.
FortiGate VDOMs reduce the complexity of securing disparate
networks by virtualizing security resources on the FortiGate
platform, greatly reducing the power and footprint required as
compared to multiple point products. Ideal for large enterprise
and managed service providers.
Features
• Separate Firewall/Routing Domains
• Separate Administrative Domains
• Separate VLAN Interfaces
Wireless Controller
All FortiGate and FortiWiFi™ consolidated security platforms
have an integrated wireless controller, enabling centralized
management of FortiAP™ secure access points and wireless
LANs. Unauthorized wireless traffic is blocked, while allowed
trafficissubjecttoidentity-awarefirewallpoliciesandmulti-
threat security inspection. From a single console you can control
network access, update security policies, and enable automatic
identification and suppression of rogue access points.
Features
• Unified WiFi and Access Point Management
• Automatic Provisioning of APs
• On-wire Detection and Blocking of Rogue APs
• Supports Virtual APs with Different SSIDs
• Supports Multiple Authentication Methods
Logging, Reporting and Monitoring
FortiGate consolidated security appliances provide extensive
logging capabilities for traffic, system, and network protection
functions. They also allow you to assemble drill-down and
graphical reports from detailed log information. Reports can
provide historical and current analysis of network activity to aid
with identification of security issues and to prevent network
misuse and abuse.
Features
• Internal Log storage and Report Generation
• Graphical Real-Time and Historical Monitoring
• Graphical Report Scheduling Support
• Graphical Drill-down Charts
• Optional FortiAnalyzer Logging (including per VDOM)
• Optional FortiGuard Analysis and Management Service
Application Control
Application control enables you to define and enforce policies
for thousands of applications running across networks
regardless of port or the protocol used for communication.
The explosion of new Internet-based and Web 2.0 applications
bombarding networks today make application control
essential, as most application traffic looks like normal Web
traffic to traditional firewalls. Fortinet application control
provides granular control of applications along with traffic
shaping capabilities and flow-based inspection options.
Features
• Identify and Control Over 1,800 Applications
• Traffic Shaping (Per Application)
• Control Popular Apps Regardless of Port or Protocol
• Popular Applications include:
AOL-IM Yahoo – MSN – KaZaa
– ICQ – Gnutella – BitTorrent – MySpace
WinNY – Skype – eDonkey – Facebook
and more...
Setup/Configuration Options
Fortinet provides administrators with a variety of methods
and wizards for configuring FortiGate appliances during
deployment. From the easy-to-use Web-based interface to the
advanced capabilities of the command-line interface, FortiGate
systems offer the flexibility and simplicity you need.
Features
• Web-based User Interface
• Command Line Interface (CLI) Over Serial Connection
• Pre-configured Settings from USB Drive