We have the following: we created a IPSec L2TP VPN and on de client
computers we created a scheduled task so when the work from home they
automatic get this VPN Connection.But when they work in the office this
VPN is not nessesary but in some cases i...
I have a PPPOE connection with routed subnet but only get the gateway
adres subnet is 255.255.255.248 but the IP adres from the ISP I see
255.255.255.255Is it possible to configure the ip-range manually in
PPPOE? Example of the ip-addresses I get fro...
Because of speed issue the ISP told us that Power Management Mode must
be G993.2, is there someone who knows how to change this?This for a
Fortigate 60E DSL-J and is for VDSL.
I want to setup the 2fa in the Fortigate to protect a RD Gateway and OWA
behind the Fortigate with Radius.The Radius is working, but when I add
the user to the RD Gateway policy the 2fa is not working and the gateway
is not reachable. What I did so f...
I want to setup a Fortigate 101E to create VDOMS with each Vdom its own
External IP-adressen.The ISP connection is a PPPOE connection on the
Fortigate with 16 ip-addresses from the ISP.Is this possible give every
Vdom 1 or 2 extermal external ip-addr...
Created de following:config firewall local-in-policy edit 1 set intf
"port1" set scraddr "DHCP-Range" set dstaddr "all" set service "IKE"
ËSP" "L2TP" set schedule "always" set action deny set status enable
nextendCreated address ip range DHCP-RangeNo...
Just saw that the solluction to block IKE within the local-in-policy
doesn't work. So I need a sollution for deny access to de fortigate from
the internal network.
I am not able to test the VIP because we do not want any downtime. With
the cisco between the ISP and FG it is working fine. If I am in the
oppertunity to test the VIP's I will, but can take a while.Thanks for
all the help so far.