Description This article describes Persistence rule influence
Load-Balance Weight decision. Scope FortiADC v6.0 and later. Solution
Assigns relative preference among members—higher values are more
preferred and are assigned connections more frequentl...
Description This article describes the WAF URL protection rule in
FortiADC to perform allow and deny action based upon a specific pattern.
Scope v6.2 and later Solution Example scenario: 1. www.abc.com/about.hml
< --- action Deny 2.www.xyz.com/about....
DescriptionThis article explains and provides configuration example
pertaining on HA management interface setup.Typical example of HA
Active-Passive setup with HA reserved management interface setup. For
more information about how to configure HA res...
DescriptionThis article describes how to add WL-Proxy-SSL HTTP header to
meet case requirement below.Based on Oracle WebLogic documentation
indicates, with proxy-ssl deployment setup in-front of WebLogic server,
it requires to have WLProxySSL paramet...
DescriptionThis article highlights known issue pertaining to alert email
'From' field.ScopeFor version 6.1.1.SolutionEmail header field 'From' is
missing. From version 6.1.3, email header field 'From' has been
Hi May be below KB is what you need How internal users can access
internal resources via an external VIP (public IP
How to access natted server inter...
Hi, - You need to configure web server infoconfig system server-probe
edit 1 set server "X.X.X.X" set srcintf "port1" set protocol http-get
set url www.mywebserver.com next end - You can verify with below diag
command# diag sys server-probe status al...
Hi, Alert message itself "Permission Denied" is telling you it [FGT]
can't locate any "matching" authentication info you have provided.I
assume this is sslvpn web mode accessdid you check the vpn log entries
in regards to these "Permission Denied" ac...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.