The following snippet summarizes the steps necessary to configure
FortiSIEM to provide the FortiGate with IP addresses that have been
associated with suspicious or malicious activity. The deployment expects
that the customer has deployed FortiSIEM (e...
The following snippet summarizes the migration scenario to help you
migrate from SSL VPN to ZTNA application gateway for remote users
accessing hosted web applications. The goal is to reduce the reliance on
dial-up and SSL VPN by adding device authen...
The following snippet summarizes the Basic ZTNA deployment for
protecting web application access using HTTPS access proxy for remote
access, and IP/MAC based access control for local access. To view the
complete guide, go to ZTNA Deployment Guide. De...
Description The following 4D documents introduce the concept of ZTNA and
outline the best practices for designing, deploying and demoing various
ZTNA architectures and implementations. The latest version of the
documents and links can be found below....
The following snippet summarizes the general SD-WAN architecture and
deployment method for MSSPs. To view the complete guide, go to SD-WAN
Deployments for MSSPs. Executive Summary This document will guide you
through a deployment of the Fortinet Secu...
I realize this is an old thread, but in regards to the last post by
Andrea:- Officially out of a ticket following was comunicated from
Fortinet: "The support for the central-nat table was fully dropped" and
will not be supported in the future! I don'...
Thanks guys for providing details about this behaviour. I am a support
engineer working at Fortinet. Just got word from QA that this has been
reported as a bug and will be fixed for the next MR. So you can expect
this to be fixed in MR6. Regards, Kei...
Ok Keith, there are 2 things you can try. I' m assuming you' re having
trouble with the Content Summary on the status page, so try this out.
The content summary will only log traffic that pass through a firewall
policy which uses a protection profile...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.