Description This article describes a dial-up IPsec tunnel configuration
in which the user authenticates using user credentials and 2FA using
FortiToken Mobile. Scope FortiToken Mobile. Solution Create a local user
on the FortiGate and assign an avail...
Description This article describes the 'Severity' field and possible
configuration options for the filter-mode set in the 'configure
alertemail setting'. Scope FortiOS. Solution To configure email alerts
on FortiGate, refer to Technical Tip: How to c...
Description This article describes a CLI method for viewing information
about Wi-Fi clients connected to an SSID hosted by FortiGate. Scope
FortiGate. Solution Use the following command to display the connected
Wi-Fi client information on the FortiGa...
Description This article describes the steps to configure IPsec tunnels
from Hub to Spokes where 2 or more spokes have overlapping subnets.
Scope FortiOS. Topology: In this topology, spoke1 and Spoke2 have
overlapping LAN subnets as 10.1.1.0/24. Wher...
Description This article describes how to block a certain application on
the same server behind the FortiGate from the internet while allowing
access to the others. Scope FortiGate. Topology: Three applications are
hosted on the same server behind th...