Description This article will explain why IP address under IPS
quarantined list is still able to access SSL VPN interface. Scope
FortiGate. Solution Consider the scenario: diagnose user quarantine list
The user with IP address 192.168.1.3 still can a...
Description This article will show how to correctly design the LACP
bundling to FortiGate HA active-passive. Scope FortiGate HA. Solution In
order to bundle the LACP interface facing to FortiGate HA
active-passive, it is necessary to understand that ...
Description This article describes a successful use case for monitoring
an SSL VPN certificate expiry check using N-Central. Scope FortiOS.
Solution Scenario: 1) The user is deploying the SSL VPN certificate for
an SSL VPN connection in either web or...
Description This article describes how to resolve an intermediate
certificate issue that triggers a 'Fortinet Untrusted CA' error to occur
while browsing the web. Scope Any supported version of FortiOS. Solution
Consider the following scenario: 1) Th...
Description This article describes what the 'Unexpected setup rsp code
401' error means and how to resolve the issue. Scope FortiGate VM.
Solution get system statusVersion: FortiGate-VM64-KVM
Hi Franz:This is a common guideline you can follow before defining the
ideal threshold :1. Know your network internal behavior - local report
should help - if the fortigate has internal
Hi Michael, do you use split-tunnel? If yes. So whenever the you are
connected to vpn - you will get route injection for internal subnet -
that you wish to access from ssl-vpn. You can check if the route is
there on your client station whenever it di...
Hi,we may have different opinion and point-of-view how we see the thing
is done. But for me, just to make slave become primary in A-P
configuration - should not cause the failover as long as all parameter
is well maintained like monitoring port, upti...
Hi, Under the security profile, start from Antivirus, and so fort - they
are UTM. You can enable it by pressing the slide. this is to clarify you
question about UTM and Sec. events
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.