Description This article provides troubleshooting steps to identify High
Availability transition problems. Scope FortiGate on High Availability
clusters. Solution Keeping in mind how the FGCP election process works
and is described here, there may be...
Description This article describes a few steps and information on how to
collect information to match the virtual mac address in use between
virtual cluster units vs vdoms and virtual interfaces. FGCP (FortiGate
Clustering Protocol) is designed to pr...
Description This article describes how to verify the 'private data
encryption' option also known as 'Secure password storage'. Scope The
passwords, and private keys used in certificates, that are stored on the
FortiGate are encrypted using a predefin...
Description This article demonstrates how to send 'diagnose sniffer
packet' output directly to Wireshark for real-time capture and
troubleshooting purposes on Windows 10.The commands below use SSH to
connect to the FortiGate back-end and send the sni...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.