Description This article describes how to block uploads on Google drive
by using an application profile. Scope FortiGatev 6.4.x and above.
Solution Configuration : Step 1: Create an Application Profile. Navigate
to Security Profile, then select Appli...
Description This article describes how to route IPv6 traffic over an
IPv4 IPsec tunnel. Scope FortiGate, any supported version of FortiOS.
Solution In the following scenario, site to site IPsec tunnel is
configured over IPv4 address schema and will b...
Description This article discusses about basic configuration of captive
portal authentication on network interface based. Scope FortiOS v6.0 and
above. Solution Configuration of captive portal authentication on
network interface based. 1) Configure u...
Description This article describes how to install and configure the free
version of Forticlient in Ubuntu/Debian OS using CLI with multiple
remote gateway profiles/connections. Scope FortiClient Solution Follow
the below process to download, install ...
Description This article describes how to skip the best AS-PATH criteria
while selecting the best route in the BGP routing protocol. Scope To
ignore/skip shortest AS_PATH selection process from BGP best path
selection algorithm. Solution In the BGP r...
Hi @Nuur , If you are sure about incoming interface port1 and outgoing
interface port2 , then configuration look fine.You might have to check
debug logs to understand the exact issue. get router info routing detail
192.168.1.253 get router info routi...
Hi @OCI-Security , As per the VPN event logs says, negotiate issue in
phase2. To understand more on this you can collect debug logs. Refer
Hi @Abdal_opr , You can try with DPD settings , see If it is helps.The
FortiGate unit provides a mechanism called Dead Peer Detection (DPD),
sometimes referred to as gateway detection or ping server, to prevent
this situation and to re-establish IKE ...
Hi @Svenkund , Could you please check and verify configuration
accordingly below article.
Hi @HS08 , If you are not going with SDWAN setup. You may refer below
article which explain with example for ISP failover with use of
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.