How to Check Bandwidth Usage on Fortigate Firewal

1. FortiGate Traffic-Monitoring Concepts FortiGate inspects every packet and can keep counters on: Interfaces: total bytes in/out per physical or VLAN interface Policies: traffic matched per firewall rule Sources / Destinations: aggregated by IP address in FortiView Applications: using the Application Control engine’s counters You can view these counters in real time (for troubleshooting), or... » read more

How to Block Websites on Fortigate Firewall

FortiGate Web Filtering: Core Concepts FortiGate’s Web Filter engine inspects HTTP/HTTPS traffic and applies rules based on: Static URL Filter Matches explicit URL patterns or domains you specify (e.g., facebook.com, *.torrent*). Actions: Block, Allow, or Exempt (bypass further inspection). FortiGuard Category-Based Filter Uses Fortinet’s cloud-based categorization (Social Media, Gambling, Malware, etc.). Actions: Monitor, Block, or... » read more

How To Close Fortigate On Chrome​​​?

1. What “FortiGate on Chrome” Actually Means FortiGate’s browser-side integrations come in two main flavors: FortiClient Web Filter Chrome Extension (formerly “FortiProxy”) that enforces URL filtering in the browser via the FortiGuard subscription. FortiGate SSL-VPN ActiveX/NW.js plugin or “chrome_extension” that allows SSL-VPN users to connect directly from Chrome without a separate client. Both are delivered... » read more

How To Close FortiGate Application Control​

When network performance is your priority, or you’ve determined that FortiGate’s Application Control engine is no longer required for a particular policy or for your entire deployment, you’ll want a clear, repeatable process for turning it off. In this deep-dive, we’ll cover: What “closing” Application Control means GUI-driven steps to disable it globally or per-policy... » read more

How to Block Incoming IP Address on FortiGate Firewall​?

Unwanted or malicious traffic targeting your network perimeter can originate from a handful of hostile IPs. FortiGate’s rich feature set lets you block these IP addresses at the firewall itself, preventing them from ever reaching your internal resources. In this post, we’ll explore: FortiGate’s traffic-processing model and why address objects are key Two primary methods... » read more

Beginner Guide | Aruba Networks Access Points

What Are Aruba Networks Access Points? Access points (APs) are devices that create a wireless local area network (WLAN) by connecting to a wired network and broadcasting Wi-Fi signals to enable wireless devices to connect to the internet or network resources. Aruba Networks Access Points are renowned for their reliability and performance, catering to various... » read more

How to Reboot F5 BIG-IP from the GUI: Step-by-Step Guide

Rebooting an F5 BIG-IP device may seem like a simple task, but in a production environment, doing it without proper preparation can result in service disruption or failover issues. This guide will walk you through how to safely reboot F5 BIG-IP from the GUI, along with best practices, a pre-checklist, and what to expect before... » read more

How Does F5 BIG-IP Work? A Clear Guide to Its Architecture, Components, and Use Cases

What Is F5 BIG-IP? Overview of BIG-IP F5 BIG-IP is a sophisticated Application Delivery Controller (ADC) that provides a suite of services for traffic management, security, and performance optimization. Deployed at the edge of networks, BIG-IP ensures that applications are fast, secure, and available to users—whether on-premises, in the cloud, or in hybrid environments. At... » read more

What is an F5 SSL Certificate? Managing SSL on F5 BIG-IP

An F5 SSL certificate refers to an SSL/TLS digital certificate installed on an F5 BIG-IP device to enable secure (HTTPS) traffic management. In simple terms, it’s the same kind of certificate used on any secure web server – a file that verifies identity and enables encryption – but uploaded to the F5 BIG-IP (a popular... » read more