Hi guys, I have two ADOMs on the FortiManager (v5.4): - root ADOM
running v5.4 - SDC ADOM running v5.2 On SDC ADOM I have two clusters
running v5.2. What option should I choose the moment FWs will be
upgraded on 5.4? 1. Upgrade FWs, go to System Sett...
Hi guys, I have configured a hardware switch made up of 4 physical
interfaces. Then I noticed I can configure a VLAN interface and use the
switch as support/base interface (for the VLAN interface).What's the
logic behind it and what is the use case? ...
Hi guys, I have configured a virtual-switch aka hardware-switch and
binded 4 interfaces that belong to a VDOM. config system interface edit
"SW_Firewall" set vdom "Firewall" set ip 8x.4y.8z.254 255.255.255.0 set
allowaccess ping https ssh set type ha...
Hi guys,I have a FGM running 5.4.2 and just turned ON FortiAnalyzer
features .Now can someone please share from its XP the difference
between this and a dedicate FortiAnaliyzer unit (actually VM).All our
FGTs are used for: Firewall and VPN only - no ...
Hi guys,I've defined a health check using TCP/53. All is happening on
Fortigate 100D, running 5.2.2 and Load Balance module.I defined a
virtual server and then two real servers; trouble is that one real
server is behind FGT while the 2nd is reachable...
lhsit wrote:Hi Ken,thanks for the response. Unfortunately the errors are
random and they come and go. I will try the incognito window idea to see
if that reduces the incidence of errors.Cheers,Chris. Did you find
anything in the meantime?
Can anyone detail of how this wildcard is actually working?Does the
Fortigate needs to receive the DNS query from the client, meaning
Fortigate needs to act as DNS server for the clients using Firewall
WILDCARD entry or is the Fortigate "downloading"...
jansaca87 wrote:Hello community, A few days ago, I had the need to
segment internet traffic for AWS S3 service. I have made a script that
includes all public network segments used by the service in AWS. I hope
it will be you useful. Thanks for sharin...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.