Description This article describes how at least the 2 sides of an IPsec
tunnel are needed to be configured, for the tunnel to come up. Scope
Basic configuration of an IPsec tunnel between 2 FortiGate with PPK
enabled. Solution One side of the tunnel ...
Description This article describes how to address Fortiguard when
Anycast default method does not work. Scope For version 6.4.3 and above.
Solution Per default FortiOS, 6.4.3 and above is using the Anycast
method to address the Fortiguard servers. Re...
DescriptionThis article describes how to adjust sessions TTL values in
case port ranges and custom services are configured
concurrently.Solution1) Session TTL can be set globally using the
‘default’ variable of the ‘config system session-ttl’ command...
Hello Wentao, The message for "awsd failed to get instance id/awsd
failed to get metadata"is usually appearing if there is an issue with
the management port and/or the elastic IP on that management port. Also,
having the latest firmware, usually, hel...
Hello Nemat,To answer your questions:1- The traffic needs to reach the
Fortigate, so either with the GWLB as per documentation on page 192-193
or depending on your deployments perhaps another Fortigate/firewall.
Although the former solution with the ...
Hello,The Fortigate is the guest operating system, it does not dictate
the order of the interfaces. If there are some specific requirements,
those can be addressed within the guest OS and with the hypervisor
provider.Since Nutanix is assigning the po...
Hi manelis,Since 7.2.0 there is the new option to select for the FMG HA
for VRRP failover.Since this is a cloud platform, if the option is
available, the routing is properly done, the only other factor that can
affect will be if the FMG are in differ...
Hello Umesh,What sw2090 wrote is correct. On the top row in your policy
list in the GUI, you right-click it and you when you scroll down you
will see the option for IDs, you enable that and on the far left
(usually) they appear. You can reorganize th...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.