DescriptionThis article describes how to configure IPsec with
mode-config and DHCP using the gateway IP.For an IPsec tunnel, the
gateway IP address (giaddr) can be defined on a DHCP relay agent. Both
IPv4 and IPv6 addresses are supported. An IPsec tu...
DescriptionThis article describes how to adjust Hard FortiTokens for
clock drift when used as Two Factor Authentication for VPN connections
(SSL VPN and/or IPsec VPN).If a user experiences clock drift, it may be
the result of incorrect time settings ...
DescriptionThis article describes how to trace the inspection mode based
on session flags.SolutionSession flags indicate the traffic is inspected
in flow based mode or proxy based mode.# Flag ndr means the traffic is
inspected in flow based mode. Add...
DescriptionThis article describes how to allow one dialup IPsec VPN
client to communicate with another dialup IPsec VPN
client.SolutionRequirement to allow communication between two dialup
IPsec clients is rare. In that scenario, achieve it by follow...
Description This article explains how to apply traffic-shaping in a
firewall policy. Scope Any supported version of FortiGate. In FortiOS
version 5.2, traffic shaping was configured over the firewall policy. By
default, if the intention was to apply ...
Dear @zoah666 , Please find the article below for more information:
Best Regards, Vasil
Dear @VinceMoon , You can create Custom Reports from FortiAnalyzer,
FortiGate is limited on this one. Please check below the article:
Dear @warbkhelo , Please find below the datasheet for FGT 60D you can
check there the values Please find below details with regards to the end
of support for the FGT-60D device and you can find the same details on
support.fortinet.com under Product L...
Dear @urushi , Configuring SSLVPN with FortiGate and FortiClient is
pretty straightforward. Nevertheless, problems may occur while
establishing or using the SSLVPN connection. If the negotiation of
SSLVPN stops at a specific percentage: 10% – there i...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.