Hi all, (An interesting?) Question here. We have Fortigates deployed in
Two locations. Both Locations have one Metronet for mutual Point 2 Point
routing. As the client requested, The P2P should be working as a second
wan at the same time to protect b...
Hi all, I just upgrade my 92D to the latest Firmware - v6.2.14 build1364
(GA) And Seems there is an option to change the local SSD to WANO. I
have tried, and it warns us to reboot and format the SSD, I said "OK"
for this. = However, the Fortigate is ...
Hi all, I m trying to achieve one thing: We find many SSH access to our
Fortigate.But for some reason, we can not use manual local policy or
Trust hosts to prevent those attacks. We have a FAZ and it seems the
Playbook might work for this case. We wo...
Hi all, I am trying to create a Lab for the Fortigate VM trial.I will
use that Fortigate as Explicit Proxy with SSL inspection However, we
find that the Man-in-middle is not performed by that VM even after the
policy setup is done. Every Website is s...
Hi all, We just found some fake Emails sent from "@Microsoft.com"
recently. We also try to send an Email from Emkei's Fake Mailer and
simulate "BillGate@Microsoft.com" as the sender.to our Exchange server.
- And just received it. We are now looking f...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.