Description This article describes how to react when unable to block IP
addresses accessing the firewall after creating the firewall policy.
Solution The policy created should be applied only to the pass-through
traffic. It will not be applied to the...
Description This article describes how to troubleshoot missing implicit
deny logs. Scope FortiGate. Solution If implicit deny logs are missing
in FortiGate and if it is necessary to view them, go under Log and
report section: 1) 'Right-click' on 'Imp...
Description This article shows how to add CPU to the VM FortiGate
firewall. Scope FortiGate VM. Solution Before adding CPU, first, it is
necessary to check how many cores your license has. For that, execute
this command in the firewall CLI: # diagnos...
Description This article describes how to troubleshoot DDNS issue when
private IP is confirued in FortiGate WAN interface. Scope FortiGate.
Solution Two issues: 1) The DDNS domain is updated to the private IP
instead of the public IP address. 2) It i...
Description This article describeshow policy routes work with FortiGate
Firewall with Scenario Scope All FortiOS. Solution The topology is as
follows: Two LAN networks and two ISP connections. The requirement is to
route LAN1 connections to the Inter...
Reverse path check means, firewall is expecting that source IP to come
from one interface but the packet is coming from different interface.
For example, execute this command: get router info routing-table details
You will get to know from which int...
Hi Team, Kindly explain the issue in detail as we could not able to
understand from the case description.i have found 2 files as above i
wondering what is that file, ---may i know where you found this file?
ideally even if ISP is down like if internet is not working, there is no
way firewall can detect that connectibity issue unless you configure
link monitor. So if you dont configure link monitor your configuration
and "enable update static route" opti...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.