Network Access
Network access control ensures visibility, control, and automated responses for all devices and systems comprising your network. Visibility involves forming profiles of each device connected to your network. The versatility of the network is enhanced when access is granted to outside products like switches, routers, and access points—without compromising the security and integrity of your IT infrastructure. Network access also defends your systems through responsiveness. As soon as a threat appears, it can be automatically eliminated. A network access system accomplishes this by changing configurations to keep your critical components and data safe.

Network Access Issues
Firewall configuration
Proper firewall configuration ensures network access is blocked for unauthorized users. Take these steps to configure your firewall and protect your network.
Certificate Management
Certificate management is the process of overseeing digital certificates to prevent network disruption. See the steps needed to manage SSL/TLS certificates.
Authentication Token
An authentication token is a secure device that allows access to protected resources. Learn how token-based authentication verifies user identity.
Kerberos authentication
Kerberos has been around for decades and remains a credible security system. Learn about Kerberos authentication, how it works, and how the Fortinet FortiWeb can be configured for authentication deleg ...
Traceroute
Learn what traceroute is, what it is used for, and how to run a traceroute. Discover how FortiDDoS can protect your network from ICMP packet abuse.
SQL injection
In an SQL injection, attackers attempt to exploit vulnerabilities in an application's code by inserting an SQL query into regular input or form fields.
What is network access control
Network access control, also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate network. Learn how FortiNAC helps with ...
OIDC
OpenID Connect (OIDC) is an authentication protocol that allows applications to verify the identity of users. Learn how OIDC supports OAuth with the use of ID tokens.
LDAP Authentication
LDAP is a software protocol used for authentication and communication in directory services. Discover how LDAP authentication works and how Fortinet NGFWs provide deep content inspection with features ...
SSO
Single sign-on (SSO) enables users to log in to multiple applications and websites with one set of credentials. Learn how SSO works and how it can strengthen security.
What is Network Traffic
Network traffic is the data moving across a computer network at any given time. Learn how monitoring traffic can improve network performance and security.
OCSP
The Online Certificate Status Protocol (OCSP) is used to check the revocation status of digital certificates. Learn how OCSP is an improvement over CRL.
What is SAML vs. OATH
When considering an SSO protocol, SAML and OAuth both have advantages. Learn more about these open standards, including the security implications of each.
What is Privileged Access Management
Privileged access management (PAM) is a system that securely manages access to accounts with heightened permissions. Learn how IAM can strengthen PAM solutions.
PST file
A PST file is a file format that Microsoft software uses to store data and items like calendar events, email messages, and contacts. Discover the advantages and security issues with PST files and how ...
Cross site scripting
Cross-site scripting is a web security issue that enables cyber criminals to exploit a website or web application. Discover what an XSS attack is and how the Fortinet WAF can help organizations preven ...
File transfer protocol ftp meaning
Learn why you need FTP, how to use it, and the security challenges of FTP. Discover how the Fortinet NGFW can provide an enhanced layer of security for sensitive data sent using FTP that would otherwi ...
Oauth
OAuth allows unrelated websites and applications to share assets. Learn how OAuth enables users to grant access to their information without giving away their password.
Scada and scada systems
SCADA is a system used to monitor and analyze data, and control industrial processes. Securing SCADA systems is crucial and vital to the safe operations of industrial machines. Discover how SCADA work ...
OSI Model
The OSI model provides a framework to allow different computer systems to communicate with each other. Learn more about the seven layers of the OSI model and how FortiGate can protect your network.
What is ARP
Learn how ARP works, the types of ARP, and why it is necessary. Discover how the Fortinet NAC solution provides enhanced visibility across the network to keep up with the ever-evolving threat landscap ...
User-datagram-protocol-udp
Learn how UDP works and used in DDoS attacks. Discover how FortiDDoS's responsive and dynamic security solution can help guard your network with extremely low latency.
What is URL Filtering
URL filtering is the process that restricts the websites and content that employees can access. Learn how URL filtering works, the benefits of using it, and how the Fortinet SWG solution can help in e ...
Rootkit
Rootkit is a type of malware that enables attackers to take control of machines and steal data. Learn about the types of rootkits and how to detect them.
How does vpn work
A VPN is an encrypted network that enables users to browse the web securely. Learn about VPN encryption and protocols and how Fortinet can help protect your users, devices, and networks.
What is WAN Aggregation?
Looking to improve your SD-WAN throughput? Learn how WAN Aggregation can boost performance and streamline your networking.
Identity and Access Management
Identity and Access Management defines the digital identity of each user and device. Learn why IAM is a critical component of the Zero Trust model and your network security..
What is the Zero-trust Network Security Model
Zero-trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a zero-trust model for your network.
Wireless Network
A wireless network, whether PAN, LAN, MAN, or WAN, helps users connect wirelessly with your network, the internet, and each other. Learn how FortiGate Integrated Wireless Management solutions keep you ...
What is DNS
Learn what DNS is, including the different types of DNS servers and DNS caching. Find out how the Fortinet DNS solution creates a safer network experience.
What is DMZ
A DMZ enables organizations and home users to add extra security to their internal network. Discover how the Fortinet FortiGate next-generation firewall (NGFW) can restrict access to sensitive data, r ...
Network Automation
Learn what network automation is and how it works. What are the benefits of an automated network? See what is involved when it comes to Fortinet’s role as an authority on network device management.
Network Segmentation
Network segmentation splits up a network to achieve better traffic flow control. Learn how dividing your network can improve overall security and performance.
Zero Trust
Zero Trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a Zero Trust model for your network.
Authentication vs authorization
Authentication and authorization are two key components of access control. Learn about the differences between the two and how the Fortinet IAM tool can enable secure access.
What is UEBA
User and entity behavior analytics (UEBA) uses machine learning to detect anomalies in the behavior of users and devices connected to a corporate network. Learn how FortiInsight can detect and respond ...
WAN
Wide-area networks connect users in different locations to one another. From the internet to business networks, learn why WANs are crucial for communication.
DDoS Attack
Distributed denial-of-service attacks can flood your server and take down online services. Learn more about DDoS and find out how to protect your organization.
Ethernet Switching
Ethernet switches act like a hub for your LAN devices. Learn how switches can optimize your network and find out why integrated security features are essential.
BYOD
What benefits and risks are involved in adopting a BYOD policy? Learn how FortiNAC can support a successful BYOD policy for users.