This is an old revision of the document!
Table of Contents
The U.S. Academic Research Fleet (ARF) has funding to outfit all vessels in fleet with FortiGate NextGen Firewalls (NGFW).
Why do we need a NGFW?
How can Forti help?
more automated so less effort for techs on board
better user experience
traffic aggregation across multiple WAN connections (satellite, cell, etc)
more robust security and monitoring
get your vessel into compliance with upcoming regulations
benefits of having OmniSOC able to proactively monitor traffic for security incidents
Who is currently using
Vessels Currently Using Fortigate NGFW
- Atlantic Explorer
- Endeavor
- Kilo Moana
- Sikuliaq
- Thomas G Thompson
Vessels currently developing their Fortigate NGFW solution
- Revelle
- Sally Ride
How can i get started
Send an email and a team member will get back in touch with you to schedule a meeting to discuss your vessel's unique needs and next steps.
Don't you want to join us?!!
If you are interested in taking advantage of all these great benefits for your vessel we would love to hear from you. Email us at arf-firewall-team@unols.org
A FortiGate firewall stands out due to its powerful, multi-layered security features, excellent performance even under heavy traffic, user-friendly management interface, and integration with a comprehensive security fabric, making it a robust choice for businesses of all sizes looking for high-speed, reliable threat protection across their network.
Vessels in the ARF have been successfully using Fortgate firewalls for over 3 years. As of February 2025 Fortigate firewalls are in use on the following vessels:
Old Page Info
FortiGate firewalls can manage both north-south (traffic between the internal network and external sources like the internet) and east-west traffic (traffic between devices or systems within the internal network). These firewalls provide advanced threat protection, intrusion prevention, and content filtering, ensuring that data flows securely between the ship’s internal networks and external systems, including shore-based research facilities. Onboard, FortiGate firewalls can manage the internal traffic between critical systems such as scientific instruments, navigation systems, and crew communication networks, enforcing segmentation and security policies.
Useful Documentation
- Fortigate 7.4 Admin Guide: https://docs.fortinet.com/document/fortigate/7.4.3/administration-guide/954635/getting-started
- Fortigate 7.4 CLI Reference: https://docs.fortinet.com/document/fortigate/7.4.3/cli-reference/84566/fortios-cli-reference
- Fortigate 7.4 Log Message Reference: https://docs.fortinet.com/document/fortigate/7.4.3/fortios-log-message-reference/524940/introduction
Tech Notes
- Hub Configuration: https://satnag.unols.org/doku.php?id=public:hub_configuration
- IPSec Tunnel Drops on Nautilus: https://satnag.unols.org/doku.php?id=public:ipsec_tunnel_drop
- Captive Portal: https://satnag.unols.org/doku.php?id=public:captive_portal