hi, today I set up email alerts for various events (so, event based and
not severity level based), and I am missing a setting for hardware
failure events, you know, fans, PSU, temperature. A look into the CLI
didn't help.Am I thinking too hard, and t...
Hello fellows, for simplicity, I often use my private SSH key to log in
into my local admin account on various FGTs (I mean, CLI access via
SSH). Now, if instead of a local admin account I use a wildcard admin
account against LDAP/MS AD in the backgr...
hello all, I've got a pair of FG-200B running v4.3.18 in A-P HA mode.
Each cluster member is at a different location, HA links are across a
dedicated line. On each site, there is one Cisco access router (19xx) in
front of the FGT providing WAN access...
hello all, I'm planning to place the slave unit of a Fortigate HA
cluster into a remote location. There is a leased line (layer 2) for the
HA connect. Can anybody confirm that I can run the HA traffic across a
VLAN between the access switches on each...
Regarding mapping a range of IP addresses:You can indeed use ONE VIP for
a range of addresses, like so:You notice that there needs to be an equal
number of mappings, that is, you can map 10 external addresses to 10
internal ones. But you cannot map o...
Yes, that's possible. This contract type is called "co-term", short for
"co-terminus".You can have contract duration specified in days, for
instance, to terminate a number of contracts on the exact same date for
ease of administration. Hence the name...
I see you specified the DNS root servers as DNS1, DNS2. I would change
that to your ISP's DNS, and a reliable public DNS as secondary DNS (like
220.127.116.11 or 18.104.22.168). Chances are high that the nearest DNS is at your
ISP and will respond quickest.
and the other 2 references would likely be- a static (default) route
(Network - Static route)- a DHCP server (Network - interface - DHCP
server) The numbers in the "Ref." column are links, i.e. clickable.
Follow the links to see which objects they ar...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.