Hi there, we want to establish Microsoft approach of a "mikro vm" with
"application guard" and edge (+chrome+firefox). So in best case we can
use one proxy for all use cases, free internet through application guard
and restricted internet through def...
Hi there, after we resolved our problem with the general functionality
with Kerberos Auth and explicit Proxy (Solved: Re: FortiOS 6.0 Explicit
Proxy Kerberos problem - Fortinet Community), we thought about how to
get an failover/ha setup while our do...
Hi there, we run through the handbook for FortiOS 6.0 to enable explicit
proxy with kerberos authenticationHandbook | FortiGate / FortiOS 6.0.0 |
Fortinet Documentation LibraryWe have done anything correctly, we think.
Proxy address matches the addre...
Hi there,i was able to create, connect, sync Remote LDAP, we have a
realm on our FortiAuthenticator. We successfull authenticated users
through debug/test page (https://fortiauthenticator/debug/radius/ )We
let the users sync as remote users.FortiAuth...
Hi there,we recently upgraded our Fortigate from FortiOS 5.6.7 to 6.0.3
but have now problems with several "chat" applications, such as facebook
web messenger, whatsapp web and so on. What we have in place- Explicit
proxy- Proxy is authentication ena...
tried it this way, seems to work for http and https I have no idea if
outer or inner (microsoft doesnt say something about this)...still
unable to see the header with wireshark and https connections, anyway
works with and without dpi so it must be ou...
1. only see in http connections the header in the get
command:X-MS-ApplicationGuard-Initiated: 1 \r\nOn https connection, i
assume i need to inspect the traffic to see the header so i dont see
it...so for testing i change the header value to 1
1. From my understanding the header has no value but fortios expects or
forces one 2. we used here the source addresses, we try to use the host
header identification on source, not destination! Still put in the
destination adress(es)? Which is basica...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.