Description This article describes how to load balance the TCP sessions
between the real servers (a real server can be a web server, mail server
and etc), how to get details of the real servers and perform basic
troubleshooting using some debugging c...
Description This article describes that after the firmware upgrade (from
v6.4.x) the below warning message might be seen on firewall policies on
which the UTM profile has been enabled on. This policy has the following
issues:'The no-inspection profil...
Description This article describes how to make sure the FortiGate will
act as a responder in site-to-site IPsec VPN Generally, in Client to
site VPN IPsec, FortiGate always acts as an initiator and the hub acts
as a responder. But in site-to-site IPs...
Description In HA FGSP, the sessions are getting sync between HA peers,
this article explains how to encrypt the traffics between peers in HA
FGSP. Scope FortiGate Solution The 'encryption' feature in the HA
cluster setting is used to encrypt the ses...
Description This article describes that the IPsec VPN log provides
statistics of the received and transferred traffic over the tunnel and
also tunnel information regarding the local and remote gateway and etc.
This information is usually used to trac...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.