Hi all,Running 6.2.7, i'm trying to apply two different session profiles
in both IP policies, but with same source IPResult: always match the
first IP policy in order; it seems that the match is triggered just by
source IP and ignore everything else ...
Hello everybody A customer FAZ 1000D running 6.0.8 is showing a
permanent 100% disk I/O usage penalizing the whole operation since a
couple of days( widget screenshot attached) Could anyone please share
some strategies to attack the issue?Who would b...
Hello,Just asking for experiences and comments on the topic.Is anyone
importing Acunetix vulnerability scan results into Fortiweb? Could you
elaborate how do you integrate the xml file within the
configuration?Such integration, does depends on the Fo...
Hello everybody, There's available in-a-box the
'number-of-session-timeline" dataset querying Traffic log this way:
select $flex_timescale(timestamp) as hodex, sum(sessions) as sessions
from ###(select $flex_timestamp as timestamp, count(*) as sessio...
Hello all,in order to obtain a profile of bandwidth usage vs specific
FortiAPs, we found that all relevant an interesting values to build the
dataset are in Traffic Log.There's also a builtin report with
"Top-AP-By-Bandwidth".But, that report shows u...
@CSBrown wrote:Supposed to be brand new. Ok, so ask your reseller for a
FortiCare contract at least (if you bought it)Then, register your 60F
into http://support.fortinet.com , apply that forticare contract and
you'll have firmwares updates, TAC supp...
Hi,Nothing serious at first; 4xx error codes are temporaries, and could
indicate several causes, i.e. capacity problems, greylisting , etcKeep
on eye on it and mailqueue, specifically if mail keeps trying or change
to a permanent failure (error codes...
Hi, as with manageable FAPs, the answer is more related with FortiOS /
FortiSwitchOS versions than the model itself. Use
as guidelineto find a match for your deployment.hope...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.