Description This article explains why FortiGate may be missing logs or
events after every reboot and offers potential fixes. Scope Any
supported version of FortiGate. Solution Logs and events can be stored
directly on FortiGate in one of two places: ...
Description This article explains why the routing table shows 0.0.0.0 as
the next hop when FortiGate is managed by FortiManager 7.0.5. Scope
FortiOS, FortiGate, Routing, BGP Solution When routes to the FortiGate
are received from the BGP neighbor, th...
Description This article describes the reason behind RPF checks not
working for packets that are received on FortiGate in the reply
direction. Scope FortiGate, FortiOS, Routing. Solution Details about RPF
can be found here:
Description This article describes how to clear hit counters for SD-WAN
rules via CLI. Scope FortiGate, SD-WAN. Solution 1) Run the command '#
diag firewall proute list'. 2) Look for the relevant SD-WAN rule:
Description This article describes the issue where if an interface is
getting IP address via DHCP having same subnet as another interface, one
of it will not show up in routing table. Scope FortiGate, FortiOS.
Solution Consider having two interfaces ...
Hi Balazs, The selection of FOS is usually based on the requirements or
features you are going to use. The latest version is 7.2 I would suggest
going through the release notes that highlight any known issues. If
there are known issues that are point...
Hi CustomX, For this, you will have to check how the traffic is getting
routed and might need Firewall policies with NAT between two interfaces.
This way you can perform source NAT and change the source as you like by
either using the IP address of t...
Hi mhanna, A static route is necessary to ensure that traffic is going
via the correct interface. In the VPN setting, for phase2 when you add a
local subnet and a remote subnet, this ensures that traffic between
these two subnets can flow over the VP...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.