Hi all, We have the following configuration for an existing network:
Client | SWITCH +--Switch-port1---FW---Rp---Company
+--Switch-port2--------Rs---network Where Rp is the principal router and
Rs the secundary or backup router. The routers have a ph...
Hi all, As I am relatively new to the subject, please ignore the
simplicity of the question: We have a fortigate 110C with 4.0 MR1
Patch7. Recently we installed the FSAE package on our MS-domain
controllers to be able to alllow/block access based on ...
There are 2 rules: internal --> external any host on both sides can
access to any service external --> internal any host on both sides can
access to any service No more than that. There is a document in the
Fortigate knowledge base ' Configuration be...
That is what I did without having separated VLANs: disconnecting the
secondary router made the traffic passing through fluently and happely.
Once the secondary router was connected things went slow till loosing
connectivity intermittently. In the swi...
Both firewalls are supposedly configured correctly, although I cannot
see any configuration of them. They have the fysical addresses x.x.x.2
and x.x.x.3. The virtual IP is x.x.x.1 which is the default gateway for
the network connected. It is confirme...
As a basic rule learned as a best practice I work down the policies as
follows: 1. - policies based on IP-addresses/IP-networks, from specific
to less specific. 2. - policies based on FSAE with various sub rules for
the different groups. I place thes...