Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article explains the limitations of UTM inspection for data exchanged inside an encrypted RDP session. Scope FortiGate. Solution MS-RDP protocol uses a proprietary form of encryption and therefore the UTM inspection of the data excha...
Description This article provides more detailed information about the log message 'Administrator admin login failed from SSH because of invalid SSH key' Scope FortiGate Solution The following log message will be displayed under the system events logs...
Description This article demonstrates the use of regular expression on FortiGate to block an email sourced from a specific domain like .co while allowing emails from .com domain. Scope FortiGate. Solution Configure a regular expression pattern '.*(co...
Description This article provides information about how to display the sequence number of firewall policies in the order that they are arranged on GUI. The sequence number is different from the numeric ID given to the firewall policy. When policies a...
Description This article demonstrates how VIP's external IP address can be used to perform Source NAT (SNAT) when Central-NAT is enabled. The use of Virtual IP addresses is usually done to map external (public) to internal (private) IP addresses for ...
Kudos from
Kudos given to