Description This article describes custom signature fields and syntax
and also how to use them to generate a custom signature with a simpler
signature. Scope FortiGate Solution Signature to block access to
example.com. This example shows how to creat...
Description This article describes how to identify Hash included in
AV/IPS using the online scanner via FortiGuard web portal and learn more
about the signatures details or the database version. Scope Solution See
the link below for the File Hash Sea...
Description This article describes how to apply and validate an
application custom signature in FortiGate. Scope Granular control can be
achieved by blocking, monitoring, accepting, or quarantining packets
that match the signature. Solution Custom ap...
Description This article describes the configuration and verification
status of a link monitor for a specific route. Scope FortiOS v7.0.1 and
above Solution A link monitor could be used to selectively update a
particular Interested route. Link health...
Description This article describes how to configure 'join-group' on the
specific interface to create a static IGMP group entry. Scope FortiGate
Solution Overview. - When an IGMP-enabled networking unit (FortiGate)
gets a join request for a specific g...
Good Day, lpacukovski You can use DHCP to bind an IP address to a
specified MAC address to prevent users in the from changing their IP
addresses and generating IP address conflicts or unauthorized usage of
IP addresses. For further details, please se...
Good Day, Umesh 1. Does set override enable command work if priority is
configured on both HA device.Yes, it works if the priority is set on
both HA nodes.2. In which case should we enable set override enable.Set
its device priority higher than other...
Good Day, Varda You can configure route-maps and apply them in the
desired direction to block specified subnets from being advertised to
your BGP neighbors (neighbor specific). Refer to the following link for
an example of applying a BGP route-map to...
Good day, Ahmed. When you set an SDWAN rule with Maximize Bandwidth mode
(load balancing algorithm) and the default hash technique
roundrobin(Which can be changed from CLI if required), the following
action is taken for the traffic. 1. SD-WAN will ch...
Hello Ricard, This particular error would be observed when the SD_WAN
member/interface has consumed all its allocated volumes (based on the
measured-volume load balance algorithm) and to find other members to
accept the new sessions(So, the system ca...