Description This article describes techniques on how to identify, debug, and troubleshoot issues...
FortiADC
Umesh
Contributor
Created on
Hello community. Can anybody make me understand two things as I mentioned in subject, how packet flow happens If first time remote users (SSL VPN user using forticlient) connect to organization networks. I have search a...
Created on
Good day everyone, I've been trying to use the official Chrome Extension for searching from here https://chromewebstore.google.com/detail/fortinet-google-search/nhemkpkfgilmlepjncbgojlojaekhibm?pli=1 and no matter wh...
tunderwood
New Contributor
Created on
This is the situation: We have a rule that allows a Dynamics 365 Business Central IP to access an on-premises SQL Server via an API. The rule functions properly and returns the expected output. However, the issue we are ...
Poseidonn
New Contributor
Created on
Hello, In a situation with sd-wan with a static route for a zone and via iBGP I receive the same prefix for another zone, even changing the administrative distance of the static route to the same as iBGP, the static prev...
Willem_K_63
New Contributor
Created on
LS,I have 2 questions with regards to Fortimanager and normalized interfaces.1. Is it possible, or will it be possible, to map 2 (or more) interfaces in the device mapping to 1 normalized interface. Example, VOICE (SSID)...
mass1q
New Contributor
Created on
Edited on
Hello, I have 2 sites with 2 Fortigates that have both their WANs behind a NAT device. So basically at both sides I have a NAT router attached to the WAN that has a private ip. Both connections have a public static ip. I...
Fortiben1
New Contributor III
Created on
Good day! I hope you are all doing well, I just want to ask what are the possible solutions when we input 2 FQDN (one is malicious and 1 is legitimate) it resolved same IP addresses. the FQDN that tagged as malicious are...
albaker1
Contributor
Created on
We have some Ubuntu hosts that need access to a site for updates, and on a "Permit Outbound Web Traffic" rules that includes both 443/tcp and 80/tcp, and there are blocks because of UTM. Specifically, the "Threat Type" i...
Can't find what you are looking for?
Suggest New Article