Most Liked Posts Recent Solutions
No Content Available

User Activity

DescriptionThis article explains the concept of Distributed denial of service (DDoS) attacks.It is assumed that FortiGate or FortiDDoS are deployed at end user environments where bandwidth is limited.Solution1. DDoS attacks are attacks on availabilit...
DescriptionBy default, the certificates used in HTTPS webgui management and SSLVPN web portal are using SHA-1 as the hashing algorithm.Vulnerability scanners reported this as a vulnerability (CVE-2004-2761).The certificate signature hash algorithm in...
Description This article shows the cipher suites offered by the FortiGate firewall when 'strong-crypto' is disabled and when it is enabled.By default, the command 'strong-crypto' is in a disabled status. However, it is recommended to enable 'strong-c...