Setting up RBL lists in Fortigate to avoid SPAM

If our intention is to block all spam that passes through our firewall, RBL lists are most commonly configured, and this document shows how to configure them on a Fortinet firewall, in a Fortigate. RBL is the acronym for “Realtime Blackhole list” or “Real-time blacklist”. These are systems that publish a database with a list of IP addresses that have been the source of unsolicited email sendings (SPAM). These databases are consulted online in real time by AntiSpam systems or mail servers before accepting a new email and said email will be marked as spam or we will reject it, according to interest.

Installation, Configuring and Using FortiReporter Using Fortigate

FortiReporer is a software to get statistics, Analyze your firewall. Analyze firewall logs and graph graphs. First you have to configure the firewall to send the LOG's to a LOG's server (A syslog) that comes with the FortiReporter by default, And then he pulls up statistics of what's going on in the firewall, and can be configured to be sent automatically by email, or keep them somewhere… The first thing is to download the file to be installed on a server with disk capacity. We can download it from its official website (It's a trial of 21 days) – HERE.

Setting up a Fortigate SSL VPN

This procedure explains how to set up a VPN using SSL to connect to any PC from the internet to your organization's LAN. All traffic would be encrypted using SSL. And you only need to have a compatible browser, without installing software. Two parts are explained:

Map, port forwarding or NAT in FortiGate

GOOD, This is very simple and straightforward, So it's a basic thing. What I want is for them to connect from the internet to my internal network, to my FTP server (21 TCP), that is, that whoever connects to my public IP address enters my FTP server only through the port 21.

LOG's management in a Fortigate

The fortigate firewall has the possibility to save your LOG's and thus be able to see what is happening in our network, We can see the attack attempts we have, What our users do… these LOG's can be stored in different ways, one through another Fortigate product called FortiAnalyzer; another to its own internal memory (when it restarts it is deleted, It's RAM); to a USB pendrive called FortiKey and the most interesting in my case and free to a LOG's server called Syslog.