Description This article describes how to avoid issues with an IBGP
route being preferred over an EBGP route. Scope FortiGate. Solution If
the same route is learned through EBGP and IBGP, the EBGP route is
generally activated due to its lower adminis...
Description This article describes how to check the routes configured
using the HA reserved management interface on the FortiGate HA setup.
Scope FortiGate HA. Solution The HA direct management interface and the
route can be configured from the GUI a...
Description This article discusses the possible scenarios where the user
is able to see specific packets under the 'diagnose sniffer' output, but
it is not possible to see the packet leaving the firewall and no outputs
in the 'debug flow trace'. Scop...
Description This article describes the case where it is required to
block ICMP requests originating from Firewall to specific
destinations/geolocations, FortiGate administrator can use
interface-policy along with custom-IPS signature. This article de...
Happy Learning :) First thing , what is the destination IP?lets assume
the destination is 188.8.131.52. Not just fortigate, pretty much all
firewalls follow the below as basic.Firewall will check if it has an
existing session for the packet received using...
Was this working fine earlier? Did you make any recent changes?
Forticlient upgrade/ FortiGate upgrade/ Laptop updates?Can you compare
the latency for below tests.1. ping the Fortigate IP without the VPN
connected2. ping the Fortigate Tunnel interfac...
I think it can take upto 5 days, also there is an update to
training/certifications and the delay could be due to that
(https://www.fortinet.com/nse-training/training-program-update.). Do you
see your mark list in pearsonvue portal? If so, there is n...
Upgrading to 7.2.5 will help only if it is a bug in 7.0.12 and the fix
is available in 7.2.5. I did a quick search , but couldn't find any
matching bugs. Instead of an upgrade/downgrade during problem state, can
we manually enable the policies? How m...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.