Coming from many different platforms, I thought this is straight
forward. We have the need to steer some traffic that the Fortigate
creates (logs, flows, god knows what) over different links. As in our
latest designs, we send logs to forticloud and F...
Forticlient, great product. Webfiltering, great product. To show a link
to an end user to ask for a re-categorization, good. The
re-categorization process tells you in minutes for it to be
re-categorized. Fantastic!!! Now we have the user using 5.6.2...
Hi, We are rolling out some SSL-VPN (tunnel mode) for remote admin
purposes and are using 5.6.2. The goal of our VPN Setups has always
been: no split-tunnel all traffic after tunnel is established must go
through VPN Now with 5.6.2 this has been an u...
Hi, I‘m looking for some real world best practice information on the
subect above. We have been running QRadar for the last 7 years and
started adding Fortigates about a year ago, but I‘m not happy about the
results of the DSMs, especially the vdom‘s...
Hi, We deploy some Fortigates in some remote (to us) continents and
since we have those appliances soon on site, we were looking into making
use of SLB on them, but what I discovered is that Fortigates are missing
some crucial basic load balancing it...
hi Dirk, Thanks for the explanation, I hope not that the crypto is
broken ;)) Actually, when I do diag debug application sslvpn -1, I do
not see the SSL messages related to the backend connection, only the
connection from the client to the fortigate,...
I run into this issue with 61E and 5.4.7 any internal https page with
SSL-VPN Web mode fails. Capture shows TLS alert bad record MAC. All http
pages work, ping works etc. from Quick Connect. But no https.
Hi, After a few months have passed on this topic I thought I try again
to get more details about the option? Maybe there is an now a document
explaining in details what it does and what the impact will be?
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.