Description This article describes memory-related debugs. Depending on
which process is consuming the highest memory we might need to collect
more debugs for that particular process (IPS, WAD). This data should be
collected from the time unit that is...
Description This article describes commands to gather the system debugs
for the CPU and memory assessment. Some fundamental CLI commands which
can use to obtain normal operating data for the system: Scope 6. x,7.x
Solution # get system status: Displa...
DescriptionThe 3DES and SHA1 ciphers have been removed from the strong
cipher list in FortiOS v7.0.0. This is preventing some FortiAP and older
FortiAP images using weaker ciphers from connecting to the
FortiGate.This article describes how to fix thi...
DescriptionWhen the user is connected to LAN and is successfully
authenticated by Active Directory, DC’s security event log can be polled
for logon events and this information is sent to FortiGate to record the
IP address, Username and Group informat...