What is our primary use case?
I have been using Fortinet FortiGate for the past six years.
I have been using Fortinet FortiGate to provide security for network and perimeter networks and gateways, and I rely on Fortinet FortiGate to protect my applications from various Layer 4 and Layer 7 attacks and traffic from malicious IPs while blocking traffic from unwanted IPs.
Fortinet FortiGate is also mainly used to establish IPsec tunnel connectivity with other networks, and users from outside the office network can connect to resources via IPsec VPN as well as site-to-site and client-to-site VPN, which leverages access and resource availability across various networks and simplifies resource accessibility worldwide.
One of the main features that I use in real time with Fortinet FortiGate is web filtering and App IDs based on application control. Previously, I allowed application access policies based on ports, but it could not prevent traffic based on the same application port with different use cases. For example, port 443 can be used for various purposes, but it could not restrict access for some specific applications. The App ID based control is useful for me to restrict traffic based on application usage and user access, which is the primary purpose of Fortinet FortiGate in real time.
What is most valuable?
Fortinet FortiGate offers next-generation firewall features and security features that restrict access for malicious traffic, URLs, and IPs, which is a major feature that Fortinet FortiGate offers.
The next-generation firewall capabilities including deep packet inspection and application controls via App IDs, Intrusion Prevention Systems, web filtering, URL filtering, and anti-malware protections are essential features that are present in Fortinet FortiGate to prevent various cyber attacks and threats in the network.
Fortinet FortiGate is also mainly used to establish IPsec tunnel connectivity with other networks, and users from outside the office network can connect to resources via IPsec VPN as well as site-to-site and client-to-site VPN, which leverages access and resource availability across various networks and simplifies resource accessibility worldwide.
What needs improvement?
The security features could have been more similar to those in the Palo Alto firewall with major data protections and WildFire, and deeper inspection capabilities, which Fortinet FortiGate lacks. Additionally, I notice that Fortinet FortiGate often experiences resource utilization problems where memory is heavily occupied regularly, necessitating cleanup tasks.
During firmware upgrades, the process is not smooth; one of the VMs often goes out of sync and exits the HA cluster. Therefore, I separate the HA between the firewalls and perform upgrade activities one by one manually. The graphical dashboard representation of the data is frequently inaccurate, leading me to rely on syslogs for more dependable information. The log retention period on the device seems too short despite having ample memory and disk capacity, which is a major issue.
For how long have I used the solution?
I have been working in my current field for the past seven years.
What do I think about the scalability of the solution?
The scalability experience indicates that if I need additional features or security capabilities, such as sandbox features, I can add them by opting for separate licenses, making it convenient for me.
How are customer service and support?
Fortinet FortiGate customer support appears somewhat good, but for complex cases or major incidents, I often do not receive prompt support from the OEM, resulting in multiple follow-ups to get the necessary assistance.
Which solution did I use previously and why did I switch?
Previously, I used to have a Cisco ASA firewall, which had fewer security features for protecting the network from day-to-day attacks and threats. Fortinet FortiGate firewall has next-generation capabilities with various security features including deep inspections, filters, URL filters, URL categories, and IPS protections while controlling application access based on application IDs, along with anti-malware protections to safeguard applications from malicious threats and attacks. By using Fortinet FortiGate, I significantly reduced major attacks that could exploit my network.
What other advice do I have?
I would advise others considering Fortinet FortiGate, particularly those concerned about budget and pricing with decent performance and support, to proceed with Fortinet FortiGate, as compared to other next-generation firewall products, Fortinet FortiGate has lower license support costs, which is a significant advantage. Moreover, from my experience, it performs its job effectively with no major issues related to performance or functionalities including policy control, VPN, and security features. I would rate this product a 7 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Agree Fortinet in general has a good product suite and configuration and ongoing support is generally not too complex. I agree it seems hit and miss with firmware updates, sometimes the HA pair upgrades and returns in a stable state with primary still as primary. Other firmware upgrades - same hardware similar config, require multiple reboots of each chassis to stabilize. While I find Fortigate firewalls fairly easy to work with, some of their management tools and configuration wizards are fine if you are starting from scratch, but I've had fortimanager, IPAM, ISL, overwrite customized configs causing serious outages. My only other problem with Fortinet in general is their chassis builds are either too heavy with one kind of interface while too light on one kind of interface ( SFP+ vrs 1000Base T for example. I think their product line could use some "field study".