Description This article describes how many FortiGates can be connected
to one FSSO Collector agent application for login information. Scope
FortiGate, FSSO. Solution The FSSO Collector agent is installed on the
Windows Server. It is possible to have...
Description Technical Tip-Duplicate session logs are seen in the forward
traffic logs for long live session packets. Scope Solution When a large
file from the Internet is uploaded, it is possible to notice multiple
forward logs with the same session ...
Description This article describes how to configure the LDAP users as
the Guest account provisioning sponsors. Scope FortiGate 6.4, 7.0, 7.2.
Solution 1) Creating an LDAP Server. 2) Creating a user group using the
configured LDAP server. 3) Configure...
Description This article describes how to clear the unit inventory in
particular frequent interval via the automated script. Scope Solution
Units that were automatically discovered by FortiGate will expire in 28
days by default if FortiGate does not ...
Description This article describes how the DNS latency showing in the
GUI dashboard is calculated internally. Scope Solution The DNS server
status for FortiGuard or internal DNS server IP address shows
Unreachable or high latency, even though FortiGa...
Hi, As updated, you do not required break the HA for Enable private data
encryption. If you need access the SSH for slave device, 'execute ha
manage' command can connect to the CLI of other cluster units .
Hi, concurrent user authentication setting on Fortigate
(policy-auth-concurrent) controls only for active authentication ( local
and Firewall user), it will not control on passive authentication like
FSSO/RSSO. Regards Jamal
Hi, The LDAP user being greyed out in ldap configuration could be due to
a number of reasons such as incorrect configuration or authentication
issues. Kindly try with configuring "sAMAccountName" in ldap server
config if it is configure as cn in the ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.