Description This article explains the different sizes of Internet
Service Databases (ISDBs) available to use with FortiOS. Scope FortiOS.
Solution In the new FortiOS version, ISDBs are categorized in three
sizes based on hardware and data file size. ...
Description This article describes the behavior of traffic selection
when multiple zones and members are configured in the rules of an
SD-WAN. Scope FortiGate. Solution From FortiOS 7.0.1 onward, SD-WAN
functionality supports multiple SD-WAN zones. I...
Description This article describes when using SNAT IP pool in SSL VPN
policy then it has different behavior in some FortiGate versions. Scope
FortiGate. Solution Due to recent changes in some OS (6.4.9,7.0.1)
behavior because of NAT64/NAT46 if using ...
Description This article describes the basic difference between NPU vdom
link, NPU vdom link with VLAN ID and Vdom link. Scope FortiGate.
Solution - NPU Vdom Link. NPU vdom links are in build and the moment you
enable multi vdom mode the 'npu0_vlink'...
Description This article describes how to hide or not display the
FortiGate login page from an unknown internet host. Scope Fortigate
Solution If the trusted host on the admin or other system admin profile
is configured but still, any unknown interne...
Hi HiGio, You can restrict in policy also mean the side were printer and
server hosted you can configured only these two IP in destination of
firewall policy so when other side user access any other IP policy will
get dropped it.
Hi HiGoi, Not understand your query but if you want to create ipsec site
to site VPN and want to use only two LAN IP then you can mentioned them
in phase 2 with specific subnet.
Hi Michal, This behavior could be due to routing distance as your WAN2
is either DHCP/PPPOE link which has lower distance than default 10 and
when wan2 come up all traffic passing through it due to lower distance.
Hi yuwon44, FCT 6.0.x not compatible with FOS 7.0.x however FCT 6.0.x
compatible with FOS 6.2.x You can use below matrix to check
Hi Tutek, This is default behavior and these options are valid within
specific session. For example, if you connect to Fortigate via ssh and
configure these options, they will be valid for this ssh session. When
you disconnect, these options will be ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.