Hello everyone, I hope someone can help with this. I am trying to route
traffic across our VPN to a VLAN and back again. My setup is as follows:
SiteA -> Fortigate 100D --Port13 connected to VLAN10 on Cisco core
switch with switchport mode access.-Po...
We have an Ipsec tunnel between site A (100D) and site B (60C). We allow
all services through both sites. Whomever initiates the call can hear
the user at the other end, but is unable to be heard. I have already
disabled and deleted the SIP helper at...
We have two 100d in HA mode. When I shutdown the master using the CLI is
there a way to bring it up from the command line again without
physically turning it off and back on again? If not, is there a better
way to bring down the master and let the sl...
I'm having an issue where our firewall is routing some internal ip
addresses out the external public interface instead of across the VPN
connection as setup on static routes. Its really weird because its not
doing it to all the internal ip connection...
We are getting a syn flood attack on POP3 port. I have turned on DOS and
limited the Threshold to 500 on this port otherwise it will block. Also,
i have limited the connection ip_src_session and ip_dst_session to 500.
However, I am still seeing a lot...
I did set a policy to allow traffic from the IPsec tunnel to Port13.
That is why I can ping to the IP Address on Vlan at SiteA on the port13
interface. I did not set anything in the quickmode selector, but have
static routes set on SiteA to point to ...
I actually set it to 10 and it seems to be working as our e-mail server
is not having problems anymore. However, I am still seeing the
connections. Is there anyway to limit the connections on on the POP3
port?