Description The article describes how to configure schedule firewall
policy expiration. Scope FortiGate. Solution The feature will allow to
schedule a firewall policy to expire after a certain period of time for
special event on the network. To confi...
Description The article describes how to configure multiple DDNS
entries. Scope FortiGate. Solution The option to add multiple DDNS
entries are configurable only on the CLI of the firewall. For
configuring the Multiple DDNS entries, follow the below ...
Description This article provides an example of configuring SSL VPN user
to restrict either to tunnel mode or web-mode in SSL VPN using Radius
authentication. Scope FortiGate. Solution Let user consider User A
(Test-tunnel) to only access the tunnel ...
Description This article describes disabling logging on a particular
firewall policy. Scope FortiGate. Solution The option to disable the
logging for a particular firewall policy is only found in the CLI. Let's
consider that the policy ID to edit is ...
Description This article describes how to enable and disable
FortiAnalyzer logging in each VDOM. Scope FortiGate. Solution To enable
the FortiAnalyzer logging per VDOM. # config vdom edit #
config log setting set faz-override enable end After runnin...
Hi Nabs,Please try to configure a multicast policy on the firewall and
check if that helps to pass the traffic through the firewall for the
Hi Maerre,Could you please verify that if you have configured trusted
host list for the user credential which your trying to access the
firewall?There is a possibility that could also be the cause of the
Hi Mumbles202For traffic to traverse from one vdom to another, we would
need to configure a Vdom link between the vdom. Please follow the below
link to configure
Hi For Ipsec tunnel, you could configure inherit from policy on the
ipsec phase 1 of the firewall Then you could configure the required
firewall policy with groups for each policy. When users connect to the
VPN, the user would be able to access the r...
Hi You could configure a source ip address on the NTP server
configuration on the firewall and it will allow the firewall to send the
traffic using that source ip towards the internet. Since you have the
default configuration on the firewall config s...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.