Hello, We have a FG100D as our main router and got a FG60D from a closed
remote office.I would like to use the FG60D as a backup router. Is it
possible to do so as a cluster between the FG100D and FG60D ? Or is it
possible to backup the configuration...
Hello, I have a Fortigate FG100D (5.2.8) configured with two WAN
interface (with 2 different ISP and a public IP for each). This
Fortigate is configured to route all LAN to WAN traffic through WAN1,
with a route-based fail-over (with administrative d...
Hi, I have a VPN between 2 Fortigate and I notice a strange behaviour :
Some machines on one network can ping machines on the other side of the
VPN while others can't.Checking in Fortiview / sessions, I discovered
that some of them correctly execute ...
Hi,We are using theXS Mapping Sheets Google Apps plugin which used to
work fine until tuesday 16th of august.Since then, wen we try to
connect, we get an SSL error. Using openssl: here is what we get :
openssl s_client -connect
Hi,We plan to replace an old Netgear router by a new UTM and our
provider made a proposal for a FG-100D. Will this hardware be sufficient
regarding the following facts : - We are about 90 users - We use 25 Mbps
download (peak at 40Mpbs) and 3 Mbps (u...
Hi, THank you everyone for your answers. I almost managed to convert my
FG100D config file to FG60D with the following changes :[ul]First line :
replace FG100D by FGT60DRemove mgmt interfaceRemove ha1 + ha2 interfaces
Remove port8 to port16replace po...
Same problem here with a 60D with ipsengine crashing many times a day :
type=event subtype=system level=warning vd="root" logdesc="Application
crashed" action=crash msg="Pid: 02321, application: ipsengine 03.170,
Firmware: FortiGate-60D v5.2.9,build0...
Hi, Regarding WAN LLB, we have 2 lines and we wanted to split traffic in
two parts : mainly web surfing though WAN1 and VOIP through WAN2. I
didn't manage to configure this scenario correctly because, for example,
VOIP must go trough WAN2 for public ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.