Description This article describes how it is possible to configure VRF
route leak and have an internet connection. Scope FortiOS version 7.0 or
higher. Solution The Topology of the network is as follows:
PC1---VRF10----FGT-----wan1--VRF0 There are a ...
Description This article describes what are the requirements for deep
inspection and how to use a private CA for Deep inspection. Scope
FortiGate. Solution Oftentimes time, it is necessary to implement a deep
inspection of the Environment. In the dee...
Description This article describes how to troubleshoot the 'Invalid LDAP
server' Error. Scope FortiGate. Solution Sometimes, the LDAP server is
connected successfully and is able to authenticate the username as well
against the LDAP server. When the ...
Description This article describes how to set the ifDescr value for
interfaces in SNMP walk which is blank by default. Scope FortiGate.
Solution - The value of the IfDescr field is blank for the interface by
default. - The description value is the 'c...
Description This article describes how to solve some of the error
messages that can be encountered when using ikev2 and radius server: -
Ikev2 required an EAP framework for authenticities. - If the Ikev2 is
used on FortiGate and FortiClient, and the ...
Hi Everyone, For anyone who wants to use the Forticlient on an ARM-based
Windows device, there is a workaround for that. You can install the
Forticlient from the Microsoft store and use it. For more detailed
explanation please use this kb
https://com...
@Mirza_Asad2723 This depends upon what specific perimeter you have
defined to restrict the access. The fact that you are saying that it's
connected on-prem seems like you have restricted access while they are
in the domain and then they are able to l...
Hi FortDoog, -->I can see the routes from BOTH, Brazil and Virginia
being propagated, but they are NOT on the TGW. if the routes are being
advertised and not received, the following are the commands that you can
start to dig more into what's going on...
from what I can understand this would be an application layer protocol
so an application control is required in order to catch this policy by
the UTMs. There is a signature for that application under application
control. I hope this helps.