Description This article explains the limitations of UTM inspection for
data exchanged inside an encrypted RDP session. Scope FortiGate.
Solution MS-RDP protocol uses a proprietary form of encryption and
therefore the UTM inspection of the data excha...
Description This article provides more detailed information about the
log message 'Administrator admin login failed from SSH because of
invalid SSH key' Scope FortiGate Solution The following log message will
be displayed under the system events logs...
Description This article demonstrates the use of regular expression on
FortiGate to block an email sourced from a specific domain like .co
while allowing emails from .com domain. Scope FortiGate. Solution
Configure a regular expression pattern '.*(co...
Description This article provides information about how to display the
sequence number of firewall policies in the order that they are arranged
on GUI. The sequence number is different from the numeric ID given to
the firewall policy. When policies a...
Description This article demonstrates how VIP's external IP address can
be used to perform Source NAT (SNAT) when Central-NAT is enabled. The
use of Virtual IP addresses is usually done to map external (public) to
internal (private) IP addresses for ...
Please check if the logs are displayed from
you can generate test logs using the command #diagnose log test to
verify if the logs are really generated and saved into Disk/Memory.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.