Heyoo, We have a stock "full-access" portal we use that enables split
tunneling. We have a single user that has an application on her laptop
that much appear to come from within our network in order to work. All I
am trying to do is create another po...
We have a site-site IPSEC tunnel setup reciprocating traffic between
SiteA 192.168.1.0 and SiteB 192.168.3.0.SSL VPN user gets an ip
192.168.1.240 at SiteA but no traffic is allowed to Site B. IPSEC VPN
works fine. I tried making a policy from ssl.ro...
Hello all...I have what must be a very simple problem for most that I
can' t seem to figure out. http://puu.sh/afnui/df6c65200f.jpg ..thats
all it is. The 4.x subnet can talk to and see the 3.x subnet just fine,
but the 1.x subnet across the WAN via ...
Hi we' re getting a lot of " deny" traffic to our broadcast address
after implementing a 100D and we aren' t sure if this is normal or not.
example attached The lan > lan policy is set to accept any and all so
not sure why UDP and other DHCP/relay tr...
Hello I hope someone can help here - seems an easy answer but I can' t
seem to figure it out. Scenario: Site to Site VPN across the country =
110C Site1(192.168.1.x) <-> 110C Site2 (192.168.3.x). No problems - been
working great for years. home VPN C...
Doh! That was it...what a bonehead I am sometimes. I had the incoming
interface as ssl.root and local interface as Wan1 (gee..that makes
perfect sense...NOT) but it should have been Wan1 for incoming and LAN
as local. Works now - thanks Toshi!
Just so it's documented, I opened a ticket on this one and it was
configured correctly. The issue was something that had to be enabled in
the CLI - though Fortinet support agreed it should have been working as
I had it set. Here is what they had to d...
I agree with you, but I can't even do that. lolI'm just going to create
a ticket over this one - thanks for your help! I was hoping it was
something glaringly easy, but sounds like it's not. Oh well thanks
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.