Description This article describes how to view the actual client IP
details in the FortiGate logs when the FortiGate is receiving the
traffic from a proxy device connected to its LAN segment. Scope
FortiGate v.6.0.0 or higher FortiGate is handling pa...
Description This article explains the format to properly add the SAN
(Subject Alternative Name) while generating CSR (Certificate Signing
Request). Scope FortiGate, FortiProxy. Solution The CSR can be generated
from System -> Certificates -> Generate...
Description This article explains how to overcome vulnerabilities
related to SSH Weak Message Authentication Code Algorithms. Scope When
doing vulnerability assessments against the FortiGate. For FortiOS
version 7.0 and upper. Solution The vulnerabil...
Description This article explains about the feasibility of managing
multiple fortilinks from GUI. Scope FortiOS 6.4.2 and later. Solution
This article describes that before version 6.4.2, it is not possible
manage/create multiple FortiLink from GUI. ...
Description This article describes how to define a policy route based on
MAC address. Scope The FortiGate should be able to see the source MAC
address as such if an L3 unit is connected downstream to FortiGate, this
will not be applicable as the sour...
Hi Jerry, If you are using SNMP to monitor it should be sending you a
trap for temperature alert. But bear in mind this is a Trap event, not
something which you can poll from the SNMP monitoring tool. The oid for
temperature is: fnTrapTempHigh 1.3.6....
Hi, How are you validating that the FortiGate is blocking the
connection? An easy way to check would be to set up a clean policy
without any inspection or security profiles. Another option would be to
check for the Logs under Log&Reports section. If ...
Hi, The mgmt interface seems to be used for dedicated management access.
You might have this configured under 'config system ha'. When you add
mgmt interface for ha dedicated management, this interface is not part
of any vdom and bound to vsys_hamgmt...
Hi, If the IP list can be maintained on a server, FG can be configured
to pull the IP list from the server by adding an external thread feed.
If this option interests you, you can have a look at the below link:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.