Dear all,Since 18 months i use Fortiauthenticator 6.01 without trouble
but since few days Fortiauthenticator can't send email with Office365.I
open a ticket but at this time no solution to fix it.The error message
is :"smtp starttls: verify peer cert...
Hi, I use FG600D (Fortios V5.4.5) with 30 VPN (IKE) but since few weeks
i have trouble with some public ip like 188.8.131.52. Each night i
have a lot of attempts to establish VPN IKE. This public ip is not
public ip of my company.For example :Mess...
Hi, I use fortigate FG300C and ssl portal for my users.I use forticlient
for Windows computer but i don't find client for Windows phone. In my
portal i show all forticlient available but i found only client for
Windows (computer), IOS ans Android. I ...
Hi, I try to create IPSEC between FG300C (5.2) and Netasq U70.In fact i
have a lot of IPSEC between Fortigate, but with another router never. If
you know where can i find information or process to do this ? Best
Dear Tomas, Thank you for all informations you gave me.With this
information i found the trouble and fix it. When i setup the
Fortiauthenticator in june 2019 i imported certifcate.At the begin of
the certificate i added root certificate and just afte...
Hi guys, Thank you for all to your answers. @Toshi: I don't create
interface-mode IPSec vpn, i just only want to reject public ip which
want to use IKe.@Bruno: Yes i know shadowserver but it's not really good
to receive 50 or 60 emails by night. I pr...
Hi Toshi, I added a screenshot to show you. In fact i apply to wan
interface and not to IPSEC interface. I don't understand why i must
apply to IPSEC interface ? if i want to block some bad public ip to
mount IPSEC i don't create an interface IPSEC f...
To complete i use a shared shappers and Per-IP Shaper at the same
time.For me i define shared shappers for internet, shared shappers for
email and shared shappers for VPN. Afer i define Per-IP shared for each
type of the access. All days people obtai...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.