I just patch a 111C from MR3 Patch 6 to Patch 11. Someting broke with
the web filtering and rating overides. This all worked in Patch6 I have
a policy to block Search Engines. I have a rating override for
google.com as allowed_search. In my policy I ...
I have a IPSEC vpn between offices. I can' t find an reference to how
WAN OPT can be used inside that tunnel. All the documentation say is
that the WAN OPT rule is processed after the Policy. It excludes some
Policies but never says if IPSEC will be ...
I am planning on adding 2 x 221B fortiAP' s to a 80CM v4.0 MR3 Patch 10.
I have some basic FortiAP questions. 1. Can can plug the AP' s into the
LAN or should I have a VLAN for them? 2. Should I use DHCP or static for
the FortAP? DHCP seams easy but ...
I am getting slower then 50Mbit throughput on my new 221B N ap.
Everything is pointing to the Fortigate or FortiAP. Any ideas where to
check. The protection profiles are off. I have 111C with 4.0 MR3 Patch 6
221B with 4.0 MR3 Patch 8 build 228 The AP...
Phill, Thanks. I was able to get it working with my IPSEC policys using
the internal IP' s as the peers. I only enabled CIFS hoping to reduce
the chattyness but it seems only bytecaching works. Open a 10meg DOC
file once it takes the normal time. Ope...
Bob, Ok WAN1 and VLAN700 are to be treated as different interfaces. And
this is what I am seeing. But I am still trying to wrap my head around
it so thank you for your understanding. I do have a policy Internal
-nat-> VLAN700 and that works to get my...
I actually don' t want to load balance traffic across two connections as
we have external services which are mapped to external IP addresses, ie,
SIP and E-mail. You may want the advantages of failover for all the
services that are not IP specific. S...
For below: Put a row TR and cell TD after the %%SSL_LOGIN%% token. It
should look like this. %%SSL_LOGIN%%Your message here!
For top: Put a row TR and cell TD before the %%SSL_LOGIN%% token. It
should look like this. Your message here!%%SSL_LOGIN%%
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.