Maybe I'm missing something, but with the conversion from the old
Fortinet forums to this new community software, is there no longer any
categorization so you can simply read through threads on a topic of
interest to see if any apply to you? I used t...
When adding a Virtual IP mapping, i.e. 1:1 NAT, the Fortigate has an
Interface box, which you'd think would actually perform some role, such
as isolating the NAT to the interface in question. In reality, adding a
Virtual IP seems to affect traffic to...
Anyone know if there's a version of FortiClient, licensed or not, where
an IPSec VPN local user can update their password, or be forced to
update it if it expires? I have situations where remote auth is
undesirable, such as for sysadmins who may need...
Curious if anyone else has run into issues with FortiClient on Mac
hanging all network connectivity if you interact with websites that
utilize certain anti-fraud and/or location identification services? It
seems to be triggered by aggressive javascri...
I'm trying to import an openssh keypair into a 6.4.x FortiAnalyzer for
use in backup via SCP. I did the typical ssh-keygen on the remote side.
On the FortiAnalyzer side, I: config system certificate ssh edit
"backup" and I was able to successfully im...
I can see how labels function, but it doesn't seem to create effective
improvement. If I click FortiGate, instead of 14,000 pages I only have a
few hundred pages, categorized in no more specific way (i.e. vpn or
other sub-cats that had been present),...
toshiesumi wrote:I still don't understand what you're trying to do. You
were saying that you set a VIP from the public-facing IP (say x.x.x.x)
to a private IP, which inside of your network. But, isn't that x.x.x.x
the IP those dial-up VPNs are connec...
Nope; I have a feeling that only works if using the Fortigate itself as
the DNS server or proxy... ugh. I've done rules-based 1:1 NAT on a
pfsense before, super easy, but apparently this isn't an easy problem to
solve with Fortigate. It's pretty weir...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.