DescriptionThis article describes the steps to view the Default Trusted
CA certificates.Solution1) To view on GUI :-Go to Security Profiles ->
SSL/SSH inspection Select 'Deep inspection' from the right hand side
corner drop downClick on 'View Trusted...
DescriptionSD-WAN now supports IPv6. It supports all load balance modes,
health checking (ping6), service rules for source address, source user /
group and destination address.FortiOS 6.0 also increases the
configuration limit for health checks and p...
DescriptionOptimizing FortiGate-VM performance by configuring
interrupt-affinity attributes to improve efficiency and resource
utilization. ScopeFortiOS v5.6, v6.0SolutionInterrupt affinity (also
called CPU affinity) maps FortiGate-VM interrupts to t...
DescriptionThis article explains how to store emails on a remote NAS
server in Fortimail.SolutionTo configure mail data storage, follow the
steps below.1. Navigate to Mail Settings > Settings > Storage.2. Select
the NAS server radio button.3. Select ...
DescriptionThis article explains how to import a third-party certificate
on a FortiAnalyzer.Solution1) Split the private key, and certificate in
two separate files.2) Import the certificate via the CLI with the
following commands.config system certif...
HI, If you have not allocated the disk space properly or if the disk
usage is full, you will get the alert message.If disk quota is not
configured properly, then configure the same . (System >> config >>
Advanced >> On disk management, allocate the q...
Hi dear,If you created vdom on the FGT, then some storage space will be
allocated for each vdom. This could possibly the reason, you noticed
full disk utilization.You can verify using the below commands.diag sys
Hello, For the following FortiGate and FortiWiFi models, disk logging is
disabled by default on v5.0 and Fortinet recommends logging to
FortiCloud instead of logging to disk: FortiGate---- FG-20C,
FG-20C-ADSL-A, FG-40C, FG-60C, FG-60C-POE, FG-60D, FG...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.