Hi guys. I' m a little new to writing the custom sigs on the Fortigates.
Does anyone have an ssh brute force signature that is a little more
aggressive then the standard signature already on board? Thanks.
Hi guys, I' m trying to setup two software switches ona 60d. Ports 1-4
and Ports 5-7 When I try to do this the only ports available are wan1
wan2 and dmz. I can' t select 1-7. I suspect it is because these ports
are assigned to the " internal" port. ...
I have a two vdom configuration. One vdom called Inet is the border vdom
with our ISP. On it I have a default static route configured pointing to
the ISP router. Our root vdom is used internally only and is connected
to the Inet vdom with a vlink. Bo...
Has anyone tried or have a good way to enable web caching for updates
like MS or AV only? I' d like to let the majority of things through
uncached but enable caching for high bandwidth repeated downloads like
MS updates and AV Updates. The problem is...
Hi all, Not sure if anyone else has experienced this. When doing an
upgrade in an active/passive cluster of more then 1 fortigate both nodes
upgrade. First the non active node, then it takes over, then the
original active node. This kind of presents ...
To answer your questions.. We have the Inet vdom to make things a little
clearer. Our Internet DMZ' s and connections to ISP go through this vdom
only. All filtering and UTM related to Internet traffic is here and so
makes things a lot easier to find...
I have had numerous problems.. ranging from all VPN' s not functioning,
to key policies in the configuration being disabled (resulting in total
loss of connectivity). Basically there needs to be a way to leave one of
the cluster members in the non-up...
I had opened a ticket regarding this. What you said previously was
correct. It hadn' t occured to me that instead of having 30-40
individual policies with the destination network in them, I should have
one with individual id-policies within the firew...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.