Just an FYI, I have a FWF60E and I purchased a FAPC24JE AP but that AP
is NOT listed as a model that I can build a profile for. I made sure it
had 5.4.2 firmware in order to support 6.4.1, but I can't get it to be
recognized. TAC just said I need to ...
This issue has been discussed in may ways and referred to in post such
as this: https://forum.fortinet.com/tm.aspx?m=119883#183227 But I wanted
to see if anyone has any remaining ideas. To set the stage, in a proper
Windows AD environment, DNS integr...
Hello- Yesterday we updated our HA 501E pair from 6.0.5 to 6.0.7. All
seemed to be fine, but today, users connected to our SSL VPN tunnel are
having Outlook 2016 Connectivity issues. We have Outlook on-prem and
only clients coming in over the SSL VPN...
We have a FAZ VM with the 2G/Day/1TB Storage license. We noted that our
daily log flows were very flat and topping out at 130Logs/Sec. Rarely if
ever exceeding that amount. The current FAZ we have had been upgraded
several times and we export all dat...
I have a FAZVM hosted on Dell Compellent (mostly flash) and Dell R630
servers, vSphere 6.5U3. The VM has 16G RAM and 8vCPUs. We have a 2GB/Day
license and currently consume ~1.5G/day. As far as I can tell storage
capacity and IOPs are not rate limiti...
Long shot, but you might check to see if your DCs were updated last
night. This week's updates caused some DC auth issues.
If you have FSS...
We had to be very specific about how we configured NICs (including the
pseudo ones created by Forticlient) on our laptops. I think we use a
script to ensure that is consistent. It is unfortunate that Fortinet
hasn't developed some sort of proxy/updat...
I would not be running 5.6. That is VERY old code and vulnerable to
exploits. Since I wrote my response 2 years ago, we migrated from 6.0.10
to 6.4.4 (skipped 6.2.X running in production because it was too buggy
at that time). There are some big chan...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.