Hi All, one of my customers has two branches, each one with a Fortigate
40F. Both appliances use SDWAN to balance outgoing traffic between two
ISPs each has 2 ipsec tunnels pointing at the other branch and 4 ipsec
tunnels pointing at their AWS instan...
Hi All,I'm wondering if anybody ever used Fortigate's virtual servers
load balance feature to balance internal traffic.Fortinet's kb shows it
as something to be used to load balance external requests to internal
server, though what I'm trying to do i...
Hi, I'm trying to block specific websites using the Static URL Filter in
the WebFilter security profile.What happens though is that the website
is blocked only when typed into the address bar of the browser and not
when accessed through a search engi...
Hi, I'm testing this configuration before deploying it for a company
that needs his users to authenticate against Azure AD for accessing the
internet.https://docs.fortinet.com/document/fortigate/7.0.11/administration-guide/33053
However it doesn't se...
Hello, I need to achieve the following: we need to authenticate users to
the company wifi network by using their AzureAD username and password.
Since we don’t have a local Active Directory we need something that’s
able to directly read the AzureAD us...
Here's an update: I'm working on just one of the two firewalls. It's got
4 IPsec tunnels to AWS (all to reach the same destination
192.168.20.12), 2 tunnels from WAN1 and 2 from WAN2 (WAN's are in their
own sdwan zone and work properly).I've followed...
Thank you syordanov.I've reviewed the docs you posted, and it looks like
what I did with the configuration was right.I created a new zone into
which i inserted the tunnel interfaces as members.I created a
performance sla rule and selected the the pro...
Hi,I guess your post is missing the link to the kb. However, as _per my
first post, I followed this guide except for the fact that the tunnels
were created and established before the sdwan
zone:https://community.fortinet.com/t5/FortiGate/Technical-Ti...
thanks for your reply.Unfortunately I had to remove the vpns from sdwan
and configure it back to use static routing for each tunnel, because
despite pings from the fortigate to 192.168.20.12 were routed correctly
through the sdwan interface, all the ...
I did refer to the admin guide, though I don't understand why when all
clients and server on the plan send their ldap request directly to the
DCs there is no problem, then when I set up a virtual server that load
balance to the two DCs (even if no ho...