Description ARP: The Address Resolution Protocol is a communication
protocol used for discovering the link layer address, such as a MAC
address, associated with a given internet layer address, typically an
IPv4 address. (Address Resolution Protocol -...
Description This article describes that documentation on this topic is
quite scarce and many times there is nothing to start with. Most
questions refer to: what type of switch to use in my topology? How to
allow more VLANs on a switch, does it need a...
Description This article describes some details that may be helpful for
getting started with setting up a switch on a FortiGate. Some
differences are presented in terms of functionality, and some general
setup guides to consider before chosing the ap...
Description This article focuses on the 'VLAN Switch' mode available on
selected units (300- Series and up, newer firmware versions only). Scope
Understanding how VLAN Switch operates and how to enable it. Solution
Enabling VLAN Switch can be done on...
Description This article is a warning related to disabling FortiLink
feature when established over LACP link. Scope A FortiLink can be
created over a configured and working LACP aggregate. Disablink the
FortiLink feature, will cause in FortiOS 6.2 th...
Not very certain of this since I don't work with FortiVoice, but config
download should be done through a DHCP option 66 on the DHCP
Regardless of services enabled or not on the wan interface (and you
refer here for public access to this IP), it still sees traffic. It
receives traffic from the WAN (at layer2), either wanted or unwanted. So
the FortiGate (or any other device) must ...
Your question widely translates into: "do I need the paid features for
home use?" (up to date AV signatures, IPS signatures, DNS, WebFilter,
support, etc).The answer widely depends on what you use the FortiGate
for: do you have a published server tha...
1. A DoS attack is the result of an attacker sending an abnormally large
amount of network traffic to a target system (your public IP).
Regardless of having services enabled or not. Any network traffic the
target system receives has to be examined, a...