In FortiClient 5.4.2 for Android, I can go to Settings, Import
Configuration and I can successfully import a .conn file but .sconn
(encrypted) files will not import for me. It does prompt for a password
when I choose the .sconn file, but it gives no ...
I have a new 300E running 5.6.3 out of the box. No interfaces are
configured yet. When I go to create a new interface, I have the option
for Software Switch, but not Hardware Switch. Is there no longer a
differentiation or is it simply not available ...
Hi,I have a new FAP320C just out of the box and it shows the firmware
version as FortiAP-320C v5.2,build638,140916 (GA).I cannot find any
matching build number on the firmware images download page (5.2.1 is
shown as build 216 and 5.2.0 is build 212)....
I have a FWF 40C on 5.0.7. I' ve connected some FAP221Bs and FAP320Bs
for testing. I want to modify the AP Profiles from the defaults, but the
section usually called " Custom AP Profile" is completely missing from
the GUI. I can use CLI to create/edi...
I have a FortiGate 300A running 4.0 MR3 Patch 15. I see entries in the
Event Log, but nothing in Traffic Log. I have firewall policies set to
Log Allowed Traffic. This is memory only - no disk in 300A. Here is "
config log memory settings" : diskfull...
Gik wrote:Hello srappaport,Old topic, but I'm interested if it was
"mystery solved" with operating system 5.6 or only after an upgrading to
version 6.x Thanks in advance and best regard "Mystery solved" was in
response to kurtli_FTNT who said that ha...
Unfortunately, "config system physical-switch" and "config system
virtual-switch" are not valid commands on the 300E using 5.6.3. I only
have "config system switch-interface" and when I create a new entry, it
appears as a software switch.
Thanks for looking into that, Ede.Out of the box, all ports are
individual interfaces - no "internal" or "lan" interface, just
port1-port28, ha, etc.When I go to click Create New, Interface, I get
only the following options: VLAN, 802.3ad Aggregate, ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.