I pulled down my FML appliance a few months ago, anybody have a use for
one? I want to sell or possible donate for a good cause. It could still
be used as mail-server or mail-gateway. PM me and let me know of any
interest Ken Felix
Does anybody have a quick to just temporary disable a FGT from FMG.? I'm
not looking at unregistering. When we set the type to "none" we get the
following message " Please unregister-device from FortiManager first"
Any ideals or is this only controll...
Anybody seen any strange counters on the admin connected sessions and
the exact time? What I've notice is the fact that the counter is in a
"-" count and after approx 2-3 mins it actually starts counting upwards
from 0. look at these screen shots;
Anybody seen this behavior that if you execute time from the cli that
the unit will drop your admin-session? Also any ideals on how we can set
the timezone? FAZVM64 Platform Full Name : FortiAnalyzer-VM64 Version :
v5.4.0-build1019 160217 (GA)
You do not need documentation to trouble that and idle means exactly
that1: is the interface up2: if you or the peer telnet to port 179 do
you get a connect 3: we are assuming this a fortigate "diag sniffer
packet any 'host x.x.x.x and port 179' do y...
Time will tell, but I highly doubt they are going to implement a rather
new protocol into their new features list & anytime soon nor
immediately. Especially since nobody in the industry has not caught up
or on wireguard. Then you have software licens...
You need to do some diagnostics but I would read the following post sinc
99% of what your doing is covered in this previous post
https://forum.fortinet.com/tm.aspx?m=179755 Also, i would get ipsec log
and diag debug application ike -1 from the linux ...
Not quite understanding the solution that you have but you have the
following that is going to use dns. The firewall ipv4 and ipv6 objects
that can be enable as type FQDN and DNS filtering With the former the
fortigate looks up any object , caches th...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.