Good morning,Yesterday I've updated Fortimail, to v5.3,build634,170228
(5.3.9 GA ).Since then there seems to be some extra spam, which could be
a coincidence or it could be related to the update.The thing that
worries me is the anti-spam status. the ...
Goodmorning,I'v got a issue regarding my fortimail.I wish to exclude a
email@example.com address from my fortimail. block / safe list
doesn't do the trick as far as I know.what I wish to accomplisch :sender
: any domainreceiver : support@mydomain....
Goodmorning,I deployed a CTAP at the customers location. it's the second
time it's there. The first time botnets came forward, but when I finally
got time to investigate the logs were already rotated.So, I explained
the customer my fu, and placed the...
Hello,I'v got a fortigate 100D which is unable to assign a IP for
management in the same vlan as the LAN.its a single 100D ( no HA ) which
I want to manage from vlan 10, the same subnet as the current management
IP on LAN side.the gui is slow, probab...
I found the solution.
tweaked some ACL's rendering the fortimail AS useless. Weird that the AV
had no issues but the AS needed 53 UDP to be able to operate / go green.
Hi Kinmun,I'm not sure about the threat part, it could be IPS / IDS or
AV that's screwing your connection.about the IP connection error;This is
probably due to the destination not reacting in time, hence the error.
the server does not respond or isn'...
there are two ways I use to verify the ACL has been hit. you can: enable
"bytes" for throughput and "hitcount" for well, the hitcount. this is
GUI stuff. if you want to get more into detail, the packet sniffer on
the CLI is the way to go ; diag sniff...
The solution has been given, please read the other comments.The last one
from Mr. Sinners is important but sometimes forgotten, make sure you
apply the application control to the right policy in order to work :)
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.