Description This article describes the issue of full disk utilization.
Scope FortiDeceptor. Solution First, if the decoys are not configured
with a reset after the attacks, this might cause such an issue. Because
the attack might download or install ...
Description This article explains how to configure FortiVoice to show
the Callcenter Agent view in FortiFone Desktop so the agent and the
manager do not need to use the web console to log in, log out, pause,
and monitor the queue. Scope FortiFone. So...
Description This article explains how to work around an issue where,
after uploading a certificate to use for HTTPS and SSH, the certificate
does not display under the 'Service' section. Instead, only firmware
displays. Scope Any supported version of...
Description This article explains that with Fortivoice Enterprise 50E or
20E if trying to access the User Portal 'https://FVE-IP/voice' it is
showing the below message: Solution FortiVoice Enterprise FVE-20E,
FVE-50E, and FVE-VM-50 are not supporting...
Description This article explains an issue with FortiGate/FortiNDR
integration where the two cannot connect or authorize after a FortiGate
is deleted. In FortiGate, FortiNDR shows as 'unreachable'. In FortiNDR,
the FortiGate does not appear under the...
Hello @Andrew_ROW Thank you for reaching us here.Generally speaking the
LDAP connectors are sending a queries with attributes to LDAP server
"AD" and getting the response from them to proceed with the actions.
Regarding the LDAP authentication for ex...
Hello @nightfury1990 You can achieve this with two options: First
Option: ManualYou can use "Auto Attendant" and link it with Inbound
route. And manage the Auto Attendant manually when the outage is
happened.You can add action key, lets say "9" when ...
Hello @ingramatics , Thank you for reaching us. Fortivoice 40 is an old
device and it is out of order and it will be end of support on coming
August. The replacement device is 20E. Generally all Fortivoice devices
are supporting standard SIP. So it s...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.