Description This article describes the first steps to troubleshooting
explicit proxy connections through FortiProxy. Scope FortiProxy.
Solution Step 1 - Check the explicit proxy configuration. 1)
Configuration on the FortiProxy. FortiProxy GUI: Navig...
Description This article describes the limitation and the way to use
SYSTEM-owned processes in custom host checks for SSL VPN client. The
SYSTEM account is used by the operating system and by services running
under Windows. Some SYSTEM-owned processe...
Description This article describes how to decrypt the RADIUS and TACACS+
packets on Wireshark. In order to troubleshoot RADIUS and TACACS+
authentication, it may be required to decrypt the packet capture and
check the attributes sent between the clie...
Description This article describes that Apple iCloud Private Relay is
designed to protect the privacy of users by ensuring that when they
browse the web in Safari, no single party—not even Apple—can see both
the user and what sites they're visiting. ...
Description This article describes how to enable Security Event logging
when Security Fabric is enabled. It applies to both Fabric root and
subordinate FortiGates. When the FortiGates are a part of a security
Fabric, then logging is by default set to...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.