FG 90D, v5.0,build3608 (GA Patch 7) Small branch office. Internal
interface subnet is 10.5.0.1/24. The FG internal interface address is
10.5.0.1. All users are on that subnet and I'm using the FG switch ports
and PoE for hubs, APs, etc. I noticed fro...
We moved to FC 5.2.1 for pre-logon SSL-VPN after the debacle of the
4.5.3 updater trying to automatically install an entire security suite
on top of our existing one. Someone eventually dug up a registry hack to
stop that. And now I find out that 5.2...
Is it possible to specify different DHCP settings depending on the MAC
of the device connecting? FWF-40C, 5.0.7 I have this unit at my home
with a site-to-site IPsec VPN connection to where I work. My goal is to
have only certain corporate devices ab...
FG110C, 5.0.7 Our LAN has 5 subnets, but all internet access is routed
to the 10.0.0.0/24 subnet that the FortiGate port1 interface is on. The
device detection is turned on, but only devices on the 10.0.0.0/24
subnet appear. How do I detect all the d...
In OS 5.0.7, User & Device -> Monitor -> Firewall, FSSO logons don' t
show up by default. There' s a check-box in the upper right to show
them, but it unchecks every time you move off the page. Is there a way
to set this as checked by default?
I contacted support because I was getting confused, and they confirmed
that ShrewLWD has the correct answer. For those with weak networking
skills like myself that are still confused, here's another way of
looking at it (NOTE - this probably isn't te...
Got it. In 5.0.7 you also have to go in to each policy (via the CLI):
config firewall policy edit # and then set the profile type: set
profile-type group end At that point the UI will then show a dropdown on
that policy for your configured profile gr...
Could you clarify that? (OS 5.0.7) I went in and set up two different
profile-groups with the CLI, but only for the features I have active
(AV, Web Filter, App. Control, IPS. I' ve deactivated the DLP, Email,
and Endpoint.) I still don' t see anythin...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.