Hi hwle,I am bit surprised servers hang already on netsh commands. Isn't
the real problem somewhere else? Maybe the dynamic pool is too small, or
maybe the rest for the system is too small. It would be good to
investigate. Have a look at number of op...
Hi mdraevich, this is quite old post, but anyway. It's difficult to
guess what you want to achieve without any config snippet at all, but
let me give it a try. First I noticed in your post is "priority" in
auth-rules. There are no priorities. Either ...
Hi RDM,it doesn't work for you, because it can't work. Explicit proxy
handles authentication *before* ie. `CONNECT www.google.com:443.`
command from the browser. This is easy, we will just ask to provide
credentials and successful authentication is t...
Hi Vladimir, you did not explain how users are logged in, but you can
use some sort of RADIUS accounting and RSSO on other Fortigates.This is
generic and quite flexible and generic solution. You can do something
very similar using FSSO on FortiAuthen...
Hi John, you have two options: 1 - simpler - install on b.com another
FSSO CA - if you can. This is much easier to operate and will work well.
2 - complex - you can, as you suggested, to point DCAgent from b.com ->
ca.a.com, but in that case you need...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.