Anonymous IP

Block access from anonymous IP

Blocking access from/to anonymous IP using free resources >> read more



AV Offload

UTM AV Offload via ICAP

Offloading antivirus on UTM units using ICAP protocol. Sample config for ClamAV and C-ICAP server >> read more



AWS Security Groups strategy

How to use AWS Security Groups

How to use AWS Security Groups in large enviroment >> read more



Checkpoint high load

High load messages on Checkpoint Firewall platform

Analyzing Checkpoint firewall high load messages >> read more



Compliance Software Blade

Compliance Blade: be safe or be green

What do you need to know about Checkpoint Compliance Software Blade >> read more



Crypto Offload

Offloading cryptographic function from web servers

Offloading cryptographic function from web servers. >> read more



FortiGate optimization

How to avoid performance issues on FortiGate firewalls

How to avoid performance issues on FortiGate firewalls. Where to look for more power. How to limit Kernel Conserve Mode or fail session mode. Short guide. >> read more



FortiGate orchestration

How to manage multiple FortiGate instances without FortiManager

How to manage multiple FortiGate instances without FortiManager. Simple python scirpt. Ansible alternative. >> read more



Honeypot

Honeypot in large networks

Maintaining honeypot in large network. Protecting network with one honeypot instance. >> read more



IPS Signature

Custom IPS Signature

Custom signature for FortiGate IPS engine >> read more



MBM Log

Log Collector for FortiGate Units

MBM-Log allows to look deeply into collected logs from FG v4 MR3 unit >> read more



Security checks

Are your security mechanism works correctly?

Monitoring security mechanisms using scripts >> read more



Spamhaus DROP List

DROP List on OSPF capable routers

Distributing Spamhouse DROP list via OSPF using BIRD Routing Deamon to OSPF capable routers >> read more



SQLi DB Dump

SQLi Database Dump Prevention

Prevention against SQL injection database dump using IPS. Signatures of last resort. >> read more



WWW Content Integrity Check

How to detect unathorized changes on WWW webservers.

How to detect unathorized changes on WWW webservers. Detect and remove webshells, track changes. >> read more