Solved! Go to Solution.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
ORIGINAL: TopJimmy I don' t see it as a bug …LOL So what?? You don' t see it as a bug doesn' t mean you are correct. It only means your logic has flaw. It' s written " The IP address and netmask of trusted hosts from which the administrator can log in" for Trusted Hosts field. Ping is not associated with log in. So either the sentence or the implementation is incorrect. QED! Mind you that I have found the " workaround" to make it work before I made the post, but that doesn' t mean I agree with it.
ORIGINAL: TopJimmy … and documentation exits on it. Just search the KB..I did. http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=10876&sliceId=1&docTypeID=DT_KCARTICLE_1_1&dialogID=43714791&stateId=0%200%2043716303That, you called it " documentation" ? Come on! I would call it " disordered, odds and ends, slacky patchworks to remedy the shortcoming in the official documentation" . What I mean by " documentation" are those published as PDF. Moreover, the very existence of this article proves further that the corresponding part in the official documentation is not clear. The other day when I came across this " problem" , I had called a Fortinet-agreed company for technical assistance and they were unable to figure this out! LMAO
ORIGINAL: ede_pfau (snipped) ... That' s the way it' s meant. If you feel this is documented in a misleading way then please report to techdoc@fortinet.com and ask for a clarified description to be included in future doc versions. To make things easier, suggest a paragraph of your wording instead of the current one. (snipped)...OK, thank you. I will do.
PCNSE
NSE
StrongSwan
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.