Description This article explains the default behaviour of the FG-VMxxV
and FG-VMxxS series of FortiGates, specifically with regards to
multi-VDOM functionality. Scope FortiOs all Solution The FG-VMxxV and
FG-VMxxS series do not come with a multi-VDO...
Description This article describes the workspace mode which can be used
to manually save the changes instead of the default automatic behavior.
Scope FortiGate. Solution Starting from version 7.0.2, this option is
also available in GUI. In previous v...
Description This article explains how to configure a static route and a
black hole route to different VRFs. Scope All versions of FortiOS.
Solution To configure a static route to a different VRF, first configure
the VRF ID on the relevant interface: ...
Description This article describes the behavior of the SD-WANrules
configured in manual mode when the performance sla for the interface is
failing. Scope FortiOs . Solution If all health-check are indicating
that an interface is dead, even if it is u...
Description This article explains how to resolve connectivity issues of
the Fabric connector to Forticlient EMS Cloud when SDWAN is used.This
solution applies in FortiOs v6.4.4-v6.4.8 Scope FortiOs v6.4.4-6.4.8
Solution The Self-originating traffic t...
Hello, You can try the below: config system settings set
allow-subnet-overlap enable end This should allow you configure
overlapping subnets For more details you may refer to the below kb:
Hello, You can try to change the action to exempt in the urlfilter. For
more details please refer to the below link:
Hello, The way to disable a session helper is to actually delete it.
Please refer to the below kb:
Deleting it will not have any side ef...
Hello, You should also check if you lt2p subnet is allowed on the phase2
selectors of the site to site tunnel.It also might be a policy or
routing issue.You can collect a debug flow and see why the traffic is
not processed.You can collect the output ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.