Hello TogetherI would like to access my NAS via ZTNA.Now I have the
problem that I get the message Invaild ZTNA CertificateError
code:002Certificate info: No-end-point info found, Client certificate is
no provided.I have done this as described by For...
Hello TogetherFor the documantion for the Fortiswitch, Doucusnap is used
by the customer.The Fortiswitches are only connected to the Fortigate
via Fortilink.I can make the Fortiswitch accessible via SNMP and ping?
Hello togetherI would like to set up FortiZTNA. Only I stand what on the
hose.I want to be able to access my NAS externally (I don't want to use
VIP).When I set this up on the NAS and Fortigate I always get an Access
Denied or API message.I still do ...
The issue you've described is a common one when dealing with VLANs,
DHCP, and networking in general. Here are some troubleshooting steps and
considerations you can take to help diagnose and possibly resolve the
problem:1. **DHCP Service**:- Verify th...
It seems like you are encountering a permissions issue while trying to
install FortiClient 7.2.1 on a specific Windows 10 PC. The error message
suggests that the installer is unable to access a specific registry key
due to insufficient permissions. H...
Hello Patrickwilson82 The option to clone an SSID in the FortiGate
interface for a FortiAP could be greyed out for several reasons. Here
are a few things you might want to check or consider:1. **User
Permissions:**Ensure that the logged-in user has t...
Hello Dtype### 1. **Check Firewall Rules:**Ensure that the firewall
rules on the FortiGate are correctly configured to allow traffic on port
443 from all IPs. There might be a rule that is blocking traffic from
certain IP ranges or ISPs.### 2. **Insp...
It sounds like your plan to move "unimportant traffic" away from the DMZ
and create new interfaces for specific services like the VIP and cameras
is a reasonable approach, especially if the existing configuration is
outdated and doesn't align with yo...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.