Description This article describes how to fix an issue where the DLP
fingerprint does not block sensitive files by correctly configuring
sensitivity in the DLP fingerprint database. Scope FortiGate. Solution
DLP fingerprinting can be configured to de...
Description This article describes how to configure and mark IPsec ESP
traffic Differentiated Services Code Point. Scope FortiGate. Solution
IPSec Encapsulating Security Payload(ESP) traffic can be prioritized
through the Differentiated Services Code...
Description This article describes if a downstream device in the
Security Fabric does not establish the connection due to a certificate
issue. Scope FortiGate. Solution Sometimes, especially in FortiGate-VM
environments including the public cloud aft...
Description This article describes how to view the usage of per-core
CPU. Scope FortiGate 7.0 and above. Solution If hardware has multiple
CPU cores then usage of each core can be viewed via GUI dashboard. On
the top left corner go to Dashboard -> St...
Description This article describes the implementation of QKD for
site-to-site IPSec VPN. Scope FortiOS 7.4.2. Solution Quantum Key
Distribution(QKD) can be used in FortiGate IPsec configuration to manage
the key between two endpoint tunnels via Key M...
please tried to disable Anti-replay of phase-2 and check the RDP server
setting too. KB in sslvpn case but check setting for RDP server
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Windows-RDP-connection-dropped/ta-p/197443?externalID=FD...
Hello, There is no specific MTU setting for Azure and if you are facing
performance issues the it could some other reason to including if any
DOS policy and performance issue But for MTU you can try to change the
MTU size in interface and test it and...
Hi Umesh, You can run the command mention and in about it generally
shows "allowed by and policy ID number which indicates the traffic
passing through which policy. regarding command diagnose debug console
timestamp enable -it enables the time stamp ...
Hi Mortin, ZTAN or full ZTNA you can use Access proxy or TCP forward
proxy which also use certificate-based Authentication were you might not
even required to connect via ipsec and enable the tagging.
https://docs.fortinet.com/document/fortigate/7.6....