Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article describes the first steps to troubleshooting explicit proxy connections through FortiProxy. Scope FortiProxy. Solution Step 1 - Check the explicit proxy configuration. 1) Configuration on the FortiProxy. FortiProxy GUI: Navig...
Description This article describes the limitation and the way to use SYSTEM-owned processes in custom host checks for SSL VPN client. The SYSTEM account is used by the operating system and by services running under Windows. Some SYSTEM-owned processe...
Description This article describes how to decrypt the RADIUS and TACACS+ packets on Wireshark. In order to troubleshoot RADIUS and TACACS+ authentication, it may be required to decrypt the packet capture and check the attributes sent between the clie...
Description This article describes that Apple iCloud Private Relay is designed to protect the privacy of users by ensuring that when they browse the web in Safari, no single party—not even Apple—can see both the user and what sites they're visiting. ...
Description This article describes how to enable Security Event logging when Security Fabric is enabled. It applies to both Fabric root and subordinate FortiGates. When the FortiGates are a part of a security Fabric, then logging is by default set to...
Kudos given to