I’m relatively new to Hyper-V Server and to managing FortiSwitches via a
FortiGateFortiGate 60F on firmware 7.0.9Pair of S224E switches on
firmware 7.2.2 connected via fortilinkDell PowerEdge T740 server running
Windows Server 2022 with Hyper-V Serve...
New to FortiExtender. Trying to determine if using FortiExtenders might
be a good choice for a WAN2 connection in the event that the existing
WAN1 connection goes off-line for a time. I'm curious what options exist
to subscribe to the SIM cards. I kn...
If someone is managing multiple FortiGates via the free version of
FortiCloud, is it possible to verify that the IP signatures are up to
date, to ensure that the log4j signature can be detected and blocked?
I'm setting up a FortiGate 40F on a network that has not had a UTM
firewall before now. The firewall is running FortiOS is version 6.4.7.
On some other FortiOS versions, i.e. 5.4, there is a Learn configuration
options in the policies. I don't see th...
I understand that there is a new vulnerability titled: Windows Print
Spooler Remote Code Execution Vulnerability, code: CVE-2021-34527. Here
is a link to a Microsoft
article:https://msrc.microsoft.co...ability/CVE-2021-34527 Does anyone
know if there...
Thanks Graham for these suggestions and the reference documentation. I
may well be incorrect, but I think when the switches were installed a
few years ago that due to an older FortiOS, the prior FortiGate model,
or another factor, that it did not all...
Any other ideas or suggestions concerning avoiding the virtual switch to
an LBFO team is deprecated error message? If possible, I would like to
use a trunk group/team between the FortiSwitch and the Host Windows 2022
I changed the Trunk Group to use 2 ports on only 1 of the switches,
MC-LAG, click EnabledMode, click Active LACP. I set the Microsoft Server
NIC Team to team the two NIC's set aside in the FortiSwitch as a trunk
group, selected Teaming mode: Switch I...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.