Description This article describes how to use the HAR log to further
check which destination address to focus on when encountering a website
access issue. Scope FortiGate. Solution Diagram: Sample Scenario: This
capture was taken in a lab environment...
Description This article explains via session list and debug output why
Implicit Deny in Forward Traffic Logs shows bytes Despite the Block in
an explicit proxy setup. Scope FortiGate. Solution Diagram: Traffic
Implicit Deny with bytes: date=2024-0...
Description This article describes that for a deeper analysis, use the
ping command with timestamps. This technique provides precise timing
information for each packet sent and received, allowing to identify of
patterns and potential issues in the ne...
Description This article describes the behavior of FSSO polling
agentless to get the IP address of the machine where the user
authenticates. Scope FortiGate. Solution To show the behavior, a wrong
IP address has been set for the hostname machine1.for...
Description This article describes how to allow traffic when only using
the same logical interface for ingress and egress with source and
destination IPs from different networks. Scope FortiGate 7.0.14 and
later, 7.2.6 and later, 7.4.0 and later. Sol...