Most Liked Posts Recent Solutions
No Content Available

User Activity

AFAIK, P2P flows cannot be matched by a service port per sé. The lack of a specific host and the incremental port allocation for the TCP port that ultimately gets chopped is a moving target. One cannot block on anything on or around the well known p...
Fortigate-100A 2.80,build357,050127 I had a UDP session running that I couldn' t fathom the source of. Worst still, I couldn' t quosh it using the policy statements - which I am guessing is a result of this type of communication not being catered for...
When allowing the tunnels to be initiated either way I normally select both direction for allowance in the VPN tunnel section of the policy pointing towards the end-point (internal->Internet[WAN1]). However when using a device that can keep the tunne...
When a policy selects NAT, the source or the destination, perhaps both, are modified. The session table shows the original source and final destination address. However it is difficult to determine which address will be used without hopping around th...
When a tunnel is up and running - the job done by the FortiGate is a good one. However from a service providers point of view, assuring a customer that service remains available is aided by VPNs remaining up and being spotted by monitoring equipment ...