Description This document explains how to mitigate the improper check of
the certificate revocation vulnerability in FortiOS. FortiGate
configuration steps outlined in this article can also be completed using
FortiManager, if the FortiGates are manag...
PurposeThis article explains how to add X-fowarded-for and
X-forwarded-proto headers to HTTP(S) traffic towards a webserver
protected by the FortiGate unit (Virtual IP). Normal 0 false false false
EN-US X-NONE X-NONE /* Style Definitions */ table.Mso...
DescriptionThis article explains how to configure URL based address
objects to work with HTTPS requests when using with
webproxy.SolutionFrom FortiOS v5.2.x, URL based address objects can be
configured on the FortiGate unit to allow specific URL usin...
DescriptionThis article provides some design considerations for HA
Active-Active cluster load-balancing UTM sessions when using Redundant
interfaces.SolutionIn Active-Active HA, the Master unit can load balance
Proxy based UTM sessions to the slave u...
Hi,Can you give more details of your setup ?FGT Model, number
connections/sessions per sec etc.. ?If you can just copy/paste firewall
policy cli config here, that would be helpful to understand as
Hi, User authentication timeout is idle timeout by default which means
the user/host should not generate any traffic for xxx number of minutes
minutes configured under user authentication timeout. In case if any
application is generating traffic from...
Hi Yassine, This will be the perfect solution for you without using the
in your setup, create firewall policy from your WIFI network >
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.