We are reviewing the compromission hosts in fortianalyzer with the IOC
licenses and have found the information in fortianalyzer to be lacking.
When you click on an IP external associated with the compromised based
on the IOC no context or data is sho...
Has anyone compared and worked with both fortiextender and cradlepoints
for cellular internet connectivity ? I am having to deploy cellular
extenders to remote branch offices to provide internet service due to
not having an ISP or due to the existing...
I am trying to run a search under the monitor tab in forticloud for the
clients and the only value working for the AP search is the SN of the
AP. We setup all our APs with a unique name for the site they are at so
want to be able to search off the AP...
I am planning on switching from static routes for site to site VPNs to
dynamic routing to make network more optimized with growing company. Was
wondering if any other else has used dynamic routing for VPN tunnels and
what they used. We are looking to...
I am trying to show the lte modem information on fwf60D 3g4g devices
that have a built in modem on the units. The specific information I am
looking for is the MEID and ICCID. There are a couple commands to show
info "show system lte-modem" is basic s...
We use static IPs/unrestricted on all our network cellular equipment so
we can built a site to site vpn tunnels for hub and spoke VPNs. With the
cradlepoints we configure them in bridge mode so all traffic is passed
to the fortigate and we can connec...
I have checked the service change for all. I ran into the all service
protocol change a while ago when upgrading to 5.0.11 but have that
fixed. When I upgrade to 5.2.3 I can no longer ping/connect to the LAN
interface on the Fortigate. I have also tr...
I have been testing the new 5.2.3 firmware and upgrading a fwf60D from
5.0.10 to 5.2.3. After upgrading I can no longer ping the lan interface
and I don't show the interface in the arp table on a computer directly
connected to the interface. Has anyo...
I compared the settings on the two devices and one side had replay
protection enabled and the other did not. Once I enabled replay
protection the device that did not have it the tunnel came back online.
The fortinet is running 5.0.11 and the Palo is 6.0.6. All the VPNs are
route based VPNs. I am using address objects for the phase2 networks
since I have 3 different destination networks behind the palo. I have
auto keep alive setup on phase2 also.