This is a link to the most recent draft of the Authentication module for
the 5.2 update of the FCNSA Prep course.
Any feedback would be appreciated. Thanks
I' m posting links to the current version of the 5.2 delta course
material. They are videos, but they are simply conversions of the PDF
presentations into video format without audio. This allows you to step
through the material and see what it contai...
Description All major credit card numbers have a defined set pattern,
for example: American Express First two digits will be 34 or 37.Total
length will be 15 digits. Visa First digit will be 4. Total length will
be either 13 or 16 digits (depends on ...
PurposeSometimes spammers will send an email with a source email address
of the domain being protected. Email From: firstname.lastname@example.orgEmail
To: email@example.com This is done in an attempt to bypass spam
filtering, as people will sometimes w...
Purpose This article describes a situation that can be encountered when
using a protection profile on encrypted email traffic.In 4.0, on devices
that support SSL Deep inspection, there are options for POP3S, IMAPS and
SMTPS protocols. These protocols...
The console port is a physical port on the device.Connecting VIA
FortiExplorer (or to the CLI with SSH/Telnet) is different and won't
work (if it truly is a Kernel panic). Assuming it is a Kernel panic then
the device will either reboot on it's own o...
As i mentioned 5.0 allowed this for software switches as well. That's a
bad idea since high CPU levels cause dropped packets. 5.2+ won't allow
the feature to be used on a device with a software switch, so if you
don't get the right device you might w...
That feature requires a Hardware switch and 5.2+ firmware. So any model
that has a hardware switch (not a software based switch) can do port
span.I think there was some 5.0.x experimentation with allowing the
feature on software switches. However, wh...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.