We just deployed fortimail 200e in production about an hour ago and
inbound emails were started queued up in outbreak queue instantantly.
Why? We did the testing deployment last Tursday night and none of the
legit inbound emails got put into the outb...
Check the reply below for proper steps. First, I did not find any
section just for FSSO or Authentication, so I posted it here. Move it as
needed. I ran into some issue with Fortigate with FSSO Collector Agent.
The setup is: Two Windows 2012 AD serve...
Hi,Can FortiClient SSL VPN talk to each other? We have softphones
running on support staff laptop. When they connect from home via
FortiClient SSL VPN, they can not call each other via the SoftPhone. The
phone server is behind the Fortigate in Datace...
Update:Configured FSSO with polling mode and username (sAMAccountName)
is showing inside the Fortigate user authenticate monitor page, which
means Windows users are able to authenticate through the AD and be
recognized by Fortigate for internet acces...
Hi, After upgrading to the latest FortiClient v5.4 for Mac last week, I
found somehow it started to block the "Unrate" sites, such as internal
websites when laptop is "off-net". My FortiOS is v5.2.4,build688 (GA).
When the laptop is on-net, the web f...
brigadax wrote:Hello everybody, we updated CaTTools to Version 3.11 and
were able to succesfully backup the configurationfrom several Fortigate
60d with the firmware versions 5.2.5, 5.2.7 and 5.4.0! First, how did
you get version 3.11 of Cattools? Th...
Here are the proper steps: Create LDAP Connection to AD Create SSO Entry
via FSSO for the interesting AD groups (all the groups you would want)
Create User Group on Firewall to utilize the specific AD group via the
From what I tested so far, if the two group doesnot have shared users,
then the user logon info will be shown on firewall with individual
group; but if the user belongs to both user groups, then the firewall
only shows the user logon info for the gro...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.