Hi Guys,can someone help me out on a Loadbalancer Topic? Following
Scenario, i have a working LB -> type Http, virtual Port 80, source
hash...everything work like it should. Yesterday we tried to change the
LB scenario to -> type ip, lease RTT...behi...
Hey Guys, I'm using FortiGate 100F with v6.2.2 build6083 (GA). I added a
new interface to a VDOM, put it in a VLAN, gave an IP and enabled it.
After that i tryed to ping the interface form the vlan. but it failed! I
checked the routing tables and saw...
Hi Guys, i configured LDAP on all our Firewall and it works prefect!
We're using 3040B Fortis with Firmware v5.2.13,build762.The Cluster is
Active-Passive. config system ha set group-name "fw-CUST" set mode a-p
set password ENC set hbdev "wan1" 50 "w...
hey guys, When i visit the main site --> www.deacademic.com everything
works but only this link --> http://universal_lexikon.deacademic.com
will blocked! --> url: invalid how can i bypass this invalid url? i
tried URL filter but still blocked? any ti...
Hi Guys, we have some old Cisco Nexus 5K and it would be funny to
replace them with the FortiCluster But is out there any kind of
documentation for the VRF use? My aim would be to have the Firewall as a
CustomerEdge device! Cherrio Raffa
Hi emnoc, i downloaded the debug log and saw this; ### diagnose ip
router command show show int Interface lo Hardware is Loopback index 1
link 0 metric 1 mtu 16436 <3> VRF Binding: Not bound input
packets 0, bytes 0, dropped 0, multicast packets 0 i...
thanks tomas, as i wrote, the LDAP authentification works! the problem
is that when i try to login to the firewall through the global cluster
address it doesn't work! when i connect direkt to the fwA it works! when
i connect to FwB it works...when i ...
try this... The setting "set auth-timeout" controls authentication
timeout for Firewall authentication users. By default this value is set
to 5 minutes. # config user setting # set auth-timeout
The auth-timeout range is 1 to 1440 minutes(24 hours). ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.