.
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
and still packet capture is hidden from the gui on the small boxes.
Not a big deal as it's still available by typing the url manually, but it's irritating.
techevo wrote:
Also on my 100D, Fortiview does not show anything in 5 min, 1 hours and 24 hours, only in now ( and yes I have log to disk enable ). It was working just fine in 5.2.1 - Any body else in the same boat or it's just me?
We had a similar issue in that FortiView did not show returns for 5 min, 1 Hour & 24 Hours. A Fortinet engineer recommended that we 'Enable Local reports' on Log Settings. We are now getting returns on all time frames.
Hope this helps.
ISOffice wrote:No worries, glad to hear it helped.
To be honest, I cannot see why this made the difference. Credit should really go to AJ in FortiNet Support.
JP
My guess is that FortiView uses the SQLlite database which is activated by "Local Report" feature.
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
networkingkool wrote:Hi,Hi community,
I tried the image 5.2.2 for 80C unit few days ago. But something went wrong. The whole LANs behind the fortigate cannot go to Internet. Only fortigate unit itself can go to Internet.
I recheck my configuration many times but cannot find any error with the configuration. I have to revert back to the image 5.2.1 then LANs can go Internet without any changes in configuration.
I think the fortigate get problem with NAT function.
Does anyone have the same problem with me?
Please advice.
Goto: Policy & Objects -> Objects -> Services -> Open ALL and change Protocol number from 6 to 0
Fortigate <3
Ok, I found the reason no ping source option is available:
I'm in the backup unit
Hi community,
I tried the image 5.2.2 for 80C unit few days ago. But something went wrong. The whole LANs behind the fortigate cannot go to Internet. Only fortigate unit itself can go to Internet.
I recheck my configuration many times but cannot find any error with the configuration. I have to revert back to the image 5.2.1 then LANs can go Internet without any changes in configuration.
I think the fortigate get problem with NAT function.
Does anyone have the same problem with me?
Please advice.
networkingkool wrote:Hi,Hi community,
I tried the image 5.2.2 for 80C unit few days ago. But something went wrong. The whole LANs behind the fortigate cannot go to Internet. Only fortigate unit itself can go to Internet.
I recheck my configuration many times but cannot find any error with the configuration. I have to revert back to the image 5.2.1 then LANs can go Internet without any changes in configuration.
I think the fortigate get problem with NAT function.
Does anyone have the same problem with me?
Please advice.
Goto: Policy & Objects -> Objects -> Services -> Open ALL and change Protocol number from 6 to 0
Fortigate <3
Yeah, we've seen this several times now with 5.2.2, but it doesn't always occur
simonorch wrote:Yeah, we've seen this several times now with 5.2.2, but it doesn't always occur
Should only apply if you upgrade from v5.0 build0300 to v5.2 build0642.
#0262415 - "After upgraded to v5.2 build0642 from v5.0 build0300, service custom ALL protocol number changed to 6 from 0"
Robin Svanberg Network Consultant @ Ethersec AB in Östersund, Sweden
robin.svanberg@ethersec.se
Nope, experienced this the other week on new FGT30D POE with 5.2.2, icmp and udp didn't work with all, accept. Our impression is it's model specific.
poor QA?
simonorch wrote:Nope, experienced this the other week on new FGT30D POE with 5.2.2, icmp and udp didn't work with all, accept. Our impression is it's model specific.
poor QA?
Hmm, maybe.. Haven´t really checked, except from always verifying that the protocol hasn´t changed :)
We have had the issue with 30D, 40C, 60D and 310B. Never with any of our customers 100D or 620B. Don´t remember the exact upgrade paths done, but everytime according to Fortinet.
Should be fixed in 5.2.3.. :)
BR Robin
Robin Svanberg Network Consultant @ Ethersec AB in Östersund, Sweden
robin.svanberg@ethersec.se
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1641 | |
1069 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.