HelloI have a FAZVM64 running v6.2.6 with a large number of customer
ADOMs defined. In order to make event handling consistent, I have a
script which generates a .json file containing the two event handlers
that each ADOM currently requires. These .j...
So in the course of walking all my edge firewalls across various
customers to update firmware, I've noticed that some of them have lapsed
support. Is there a way to query the firewall's support and fortiguard
entitlements from the command line? I am ...
Hello, If I have a building full of non-admin users to which I need to
distribute the Windows FortiClient (ideally, VPN-Only as they already
have a different AV and web security system) plus the connection
configuration, is there a way to get the .ms...
GreetingsI have the current iOS FortiClient installed. I have configured
two bookmarks, one for a standard HTTP site, and one for a sharepoint
site, both of which are internal to the private network I am
accessing.When I connect to the standard site,...
I have configured my FortiGate 60D wtih FortiOS 5.2.2 to use AD as a
LDAP server. When I click it claims the test is successful;
however any real lookup fails with the error: Invalid LDAP server:
Referral What is this error trying to tell me and how...
Hi there The user account is a Domain Admin and that didn't work. We are
starting to suspect a problem with the AD configuration, as this is a
somewhat migrated and distributed AD. Other AD issues have been
I ended up hacking the problem another way. I created a "common" network
that all VPN clients have access to, and placed a DNS server on that
network, setting all VPN clients to use that DNS server while connected.
The DNS server knows about the doma...
Update: my support contact has provided me with a different firmware,
build 0089 (the 5.0.9 firmware is 0086). We have also increased the
value of wireless-controller global/max-retransmit from 3 to 6. Things
appear marginally better -- i am not seei...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.