Fortigate Firewalls
March 20, 2017

Fortigate Firewalls

Troy Smith | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Fortinet FortiGate

We use the Fortigates as our primary firewalls at our primary and DR locations. We also use them for creating VPN tunnels between outlying branches for secure communication over the internet. They are also used as another layer of anti-virus, DDOS, etc., for our organization.
  • Very easy to create VPN tunnels between Fortigate devices.
  • Easy set up and configuration.
  • Firewall rules are straight forward to setup.
  • The logs can be troublesome to work through to try and find why information is not being passed through.
  • Creating a VPN tunnel to a non-Fortigate can be difficult.
  • Reporting function and GUI interface takes up a very large amount of CPU. Many times I have seen the CPU usage hit 100% with very little traffic being processed.
  • Once set up, the day to day maintenance on the devices is very low. They are a solid device.
  • If you understand the basics of firewalls and firewall rules, you can program these fairly easily.
The Junipers that we had (SSG 5) were not capable of running VOIP traffic. While the Juniper worked great, we needed additional functionality like VOIP and HA.
As a primary firewall for internet access the devices work great. If you want to use them to include VOIP or time sensitive applications, be aware of the CPU usage.