Description This article describes how to reset the local certificate if
it has expired and preventing playbooks from running e.g. Alerts ->
Execute -> [PLAYBOOK]. Scope FortiSOAR 6.2 Playbooks. Solution In the
FortiSOAR command line, run the followi...
DescriptionUpon upgrading to FortiOS 6.4.3, configurations with a
FortiAP managed through a VLAN interface may have issues with passing
CAPWAP traffic from the FortiGate to the FortiAP. CAPWAP traffic that is
offloaded to the NP6 and NP6XLite ASICs w...
Description This article has been raised due to the highlighted problem
and complexity of managing SSL certificates referenced in these
articles:Fortinet VPN with Default Settings Leave 200,000 Businesses
DescriptionIf error occurs when connection progress is at 98%, a popup
window will show the status code of the tunnel thread (T), monitor
thread (M) and RAS thread (R). The status code could either indicate the
stage the thread is currently at, or an...
DescriptionThis document describes how to upgrade FortiSwitch firmware.
ScopeFortiSwitch SolutionUpdating standalone FortiSwitch firmware from
GUI.Upgrade the firmware from the dashboard or from the system
configuration page.To upgrade the firmware f...
The answer lies in the first part of the authentication process. The
Fortigate is not providing authentication, rather it is simply using the
Database provided by your domain controller. That means in order to
access your internal network a client mu...
The 4.0 release notes state its supported: "FortiAuthenticatorTM 4.0
extends the local user self-service password reset capability to support
Active Directory user password management." Maybe they can use the FSSO
self service portal
FortiCloud reports should resolve IPs to host names for websites
(external) by default. But local IPs will not be resolved to computer
names though. There is no option on FortiCloud to view the
PC/Server/Device name.This is by design. In the default ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.