Description This article describes how to attach logs to the active
ticket when working with TAC. Scope FortiCare. Solution Login to the
account at www.support.fortinet.com Go under Support and select 'Manage
Tickets'. 'Double-click' on the ticket to...
Description This article describes how to export Firewall logs in CSV
format. Scope FortiGate v6.4.X, v7.0.X,v7.2.X and v7.4.X. Solution There
is no option available to export logs in the CSV format. The 'log' is
the only format available. One workar...
Description This article describes how it is possible to configure VRF
route leak and have an internet connection. Scope FortiOS version 7.0 or
higher. Solution The Topology of the network is as follows:
PC1---VRF10----FGT-----wan1--VRF0 There are a ...
Description This article describes what are the requirements for deep
inspection and how to use a private CA for Deep inspection. Scope
FortiGate. Solution Oftentimes time, it is necessary to implement a deep
inspection of the Environment. In the dee...
Description This article describes how to troubleshoot the 'Invalid LDAP
server' Error. Scope FortiGate. Solution Sometimes, the LDAP server is
connected successfully and can authenticate the username as well against
the LDAP server. When the group i...
Hi Everyone, For anyone who wants to use the Forticlient on an ARM-based
Windows device, there is a workaround for that. You can install the
Forticlient from the Microsoft store and use it. For more detailed
explanation please use this kb
https://com...
@Mirza_Asad2723 This depends upon what specific perimeter you have
defined to restrict the access. The fact that you are saying that it's
connected on-prem seems like you have restricted access while they are
in the domain and then they are able to l...
Hi FortDoog, -->I can see the routes from BOTH, Brazil and Virginia
being propagated, but they are NOT on the TGW. if the routes are being
advertised and not received, the following are the commands that you can
start to dig more into what's going on...
from what I can understand this would be an application layer protocol
so an application control is required in order to catch this policy by
the UTMs. There is a signature for that application under application
control. I hope this helps.