DescriptionThis article explains the concept of Distributed denial of
service (DDoS) attacks.It is assumed that FortiGate or FortiDDoS are
deployed at end user environments where bandwidth is limited.Solution1.
DDoS attacks are attacks on availabilit...
DescriptionBy default, the certificates used in HTTPS webgui management
and SSLVPN web portal are using SHA-1 as the hashing
algorithm.Vulnerability scanners reported this as a vulnerability
(CVE-2004-2761).The certificate signature hash algorithm in...
Description This article shows the cipher suites offered by the
FortiGate firewall when 'strong-crypto' is disabled and when it is
enabled.By default, the command 'strong-crypto' is in a disabled status.
However, it is recommended to enable 'strong-c...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.