Hi, We have a problema with a Fortigate 61E with 110~120 users. FortiOS:
5.4.5With:WebfilterAplication ControlIPSSSL Inspection The customer have
Three links, one of 20mbps full, and two others of 10mbps each, for
failover only. But, the Fortigate 61...
Hi All, I have a HA and when I create a new administrator, the checksum
is not matching, If I delete this user's, checksum is matching. I
verified, and, I see the problem is with password hash between slave and
master. Any other setting are applied w...
I need to customize an internet access report, organized by day,
containing the websites that users have accessed. I created one that
already does this, however I need to generate a report for each user, as
image1.jpg: Has anyone ever created one tha...
Hi, We have a Fortigate HA with load balance all enabled, and we are
monitoring the behavior, and I can see many retransmissions between
slave and master, just when the slave unit process the packet, see this
picture: Anyone known if this is normal? ...
I totally agree with dbert84, we need a solution provided by Fortinet,
simply saying to access an HTTP site first is not solution. I have a
case exactly like this and the engineer's recommendation was this.
hzhao_FTNT wrote:Hi there, we do not support user customized drill-down
chart since 5.0. Please clone your report and set report filter to
different users. regards,hz Hi hzhao_FTNT, Yes, I do this, but, We have
200 users. :( Any other option? Regards...
Hi, I have the same problem with FA VM 5.2.5, but, I´ve tried upper and
lower case. :) We are testing FG + FA VM, but the FG is configured as
One-Arm Sniffer on three interfaces, and I can see the users on
Webfilter, App Ctrl, AV, and others.In FA VM...
But without the load balance, I do not have any advantage using
active-active, right? I do not have this UTM HA. vjoshi wrote:Hello
Lucas, Weird, I expect it to happen, but without any traffic doesn't
seem to be correct. I would recommend not to use ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.