Hi
Short question about the behavior from FortiClients and there profiles.
What profile does FortiClient use if there ist no connection to the EMS Server? Does he use de last assigned profile or does it use the Default Profile?
Thanks.
Solved! Go to Solution.
Created on 01-24-2023 02:48 PM Edited on 01-24-2023 02:49 PM
Ok, now I understand what you want to know. If I'm not mistaken, if it loses connection to the server, Forticlient keeps its last configuration, but everything can be changed if one wants. This part of the guide might help you: https://docs.fortinet.com/document/forticlient/7.0.7/ems-administration-guide/924998/zero-trust-tags and this one
https://docs.fortinet.com/document/forticlient/7.0.7/ems-administration-guide/701440/configuring-a-profile-to-allow-or-block-endpoint-from-vpn-tunnel-connection-based-on-the- applied-zero-trust-tag
Hi, I believe that the configuration part that interests you is this (On-/off-fabric): https://docs.fortinet.com/document/forticlient/7.0.7/ems-administration-guide/303940/on-fabric-detec...
Hello
I think on/off fabric is related to the current network location of your client, means inside the Corp or outside (e.g.: connecting to Corp network from home)
Created on 01-24-2023 02:48 PM Edited on 01-24-2023 02:49 PM
Ok, now I understand what you want to know. If I'm not mistaken, if it loses connection to the server, Forticlient keeps its last configuration, but everything can be changed if one wants. This part of the guide might help you: https://docs.fortinet.com/document/forticlient/7.0.7/ems-administration-guide/924998/zero-trust-tags and this one
https://docs.fortinet.com/document/forticlient/7.0.7/ems-administration-guide/701440/configuring-a-profile-to-allow-or-block-endpoint-from-vpn-tunnel-connection-based-on-the- applied-zero-trust-tag
hi
I thought and hoped it would be like this otherwise it would be really unsable..
Thanks.
User | Count |
---|---|
2140 | |
1187 | |
770 | |
451 | |
347 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.