hi,We have a fortigate 60F with wan1 and wan2 with different ISP's
combined in an SDWAN.For remote workers we would like their forticlient
to connect to wan1 or wan2 and switch if one goes down. We could use
forticlient and add multiple remote hosts ...
Hi All,I have a fortigate 60E running v6.0.2 build0163. (And willing to
upgrade if necessary)I have and SD-Wan configured on it with wan1 and
wan2 on different isp's. On wan1 I created a dial-up vpn.This all works
good. Now would it be possible to cr...
Hi.I have a FG 100D. It was on fortios 5.4.1 but fortinet support
advised me to upgrade to the latest build 5.6.1So 5.6.1 we are now. I
created a new forticlient ipsec test tunnel with the wizard. No UTM are
aplied on the policies used.This tunnel wo...
Hi,I have a fortigate 60E with fortios 5.4.1I need to create two
policies for two groups of users.One group can always access the
internet. The other group has scheduled times.So I made two lan to wan
policies and users have to authenticate on the fo...
Hi,I have a 3cx pbx behind a fortigate 60c (FGT60C-5.02-FW-build742)I
disabled the sip helper
(http://www.3cx.com/blog/docs/disable-sip-alg-on-fortigate/)I made vip
with static nat for port 5060(tcp/udp), 5090(tcp/udp) an 9000-9500(udp)I
created a po...
Hi,Would you get the same result by making a SDWan rule with the
Exchange server as source, destination all, but as outgoing interface
member only the WIMAX interface?And if yes..whats the difference?Thanks!
So the isp technician did some minor adjustments and it 's a bit better
but far away from good.I concentrated on DUPLEX mismatch.So I got the
Client, the FG wan1 port, a vlan interface (created on the internal) and
the server.Everything but the inter...
small update:I checked the wan port and it's on auto negotiate with the
current being 1000mbps full duplex.ISP confirmed this is correct. When I
had them on the phone I told them about my problem.They noticed that I
had some upstream loss and said th...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.