Description This article describes a scenario under which the command
'set source ip' is not visible within the configuration settings for
FortiAnalyzer logging (config log FortiAnalyzer setting). Scope
FortiGate. Solution When the 'set ha-direct' fe...
Description This article describes how the forward traffic logs page can
be used to identify how sessions are distributed in SD-WAN, as well as
the reasons why. Scope FortiGate 7.0 and above. Solution While the
Forward Traffic Logs page is not specif...
Description This article describes the criteria used to select the
primary unit in a FortiGate High Availability (HA) configuration,
depending on whether the override feature is enabled or disabled. The
criteria include the number of operationally UP...
Description This article describes how to fix an issue faced where the
IPsec VPN configuration is lost after a device reboot or while restoring
the old configuration file. Scope FortiGate. Solution This can occur
when the IPsec VPN tunnels are alread...
Description This article provides the solution for the issue faced while
creating a VIP Object entry. It is possible to see an error message
'duplicate entry already exists', even if there are no other VIP objects
created. Scope FortiGate. Solution W...
Hello slouw, Yes, you typically need a policy entry to permit IPSec
underlay traffic to connect, specifically allowing the traffic necessary
for the establishment and maintenance of the VPN tunnel. Hope the below
document guide helps:
Hello Troy2023, NetFlow is like a tool that helps you watch and
understand the traffic on your network. It can tell you things like
where data is coming from, where it's going, and how much there is.
However, it can't tell you if your firewall allowe...
Hello Vishal1, Please be advised, when upgrading FortiGate devices to a
firmware version that is not part of the upgrade path, the warning 'The
firmware version is not on firmware upgrade path of selected devices.
Upgrading the image may cause the cu...
Hello Fern-X, Could you please refer to the document link below and let
us know if it is helpful?
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.