Most Liked Posts Recent Solutions
No Content Available

User Activity

Dear Team, I have a scenario in which the customer has two PSTN lines and want a could based voice solution to be able to receive calls from PSTN and redirected to the internal extension and implement a call center. So how this could be implemented w...
Hello Team, Practically when configuring Fortigate as SSL vpn clients, users behind the client Fortigate can reach hosts behind the server Fortigate, but the other direction is not working. Moreover, the client to server direction does not work unles...
Hello Team,I have an FG on 7.0.7 and two swithces 108E-FPOE and 148E both on the compatible 6.4.4. In a specfici scanarion I needed to disable the automatic forming of Fortilink trunk between the switches especially that there are 3rd party network d...
Hello team, I have been studying Fortiweb and some questions arise to me when I came to the SSL point. Firstly, what is the key difference between the transparent mode and the True transparent mode?Secondly, I understood that in SSL inspection, Forti...
Dear team, Is true that regardless of policy type (flow / proxy), when enabling deep inspection, the traffic is handled in a proxy manner because two connections are open (one from client to Fortigate where Fortigate signs a certificate and present i...
Kudos from
Kudos given to