Description This article explains the scenario, in the FortiGate
firewall where the client is located in one VLAN and the phone server is
located in another VLAN. Scope FortiOS. Solution While making a call
from the client to the server, the user cou...
Description This article describes the logs necessary to collect when
troubleshooting an issue where the user is unable to connect to SSL VPN.
Scope FortiOS. Solution Execute the following commands in the FortiGate,
connect to SSL VPN and observe the...
Description This article describes how to enable the session to start
logging in to the FortiGate firewall. Scope FortiOS. Solution This can
be enabled on the specific firewall policy: # config firewall policy
edit set logtraffic-start enableend Thi...
Description This article describes how to create read only admin profile
in FortiGate. Scope All FortiGate models. Solution This is the packet
flow. On the user machine, the firewall is accessed with a DDNS domain
name. The domain refers to the IP of...
Description This article describes how to configure policy routes with
multiple ISP. Scope All FortiGate models. Solution Following is a set-up
where there are two LANs (LAN1 and LAN2) and two WAN (WAN1 and WAN2),
configuration shows how to route all...
Hi Team, This feature of device tab has been removed in latest versions,
You can block using the mac address option. could you please follow the
below article and let us know if this
Hi,All cluster units must be the same FortiGate model with the same
FortiOS firmware build installed. All cluster units must also have the
same hardware configuration (for example, the same number of hard disks
and so on) and be running in the same o...
Hi Team, If i have understood correctly,are you trying to access any
internal sever for a specif port configured via VIP ,if not please
explain the issue with a network diagram to assist you accordingly.
Hi Team, Could you confirm the CPU and memory utilization you are seeing
on gui. Could you please create a plain firewall policy for a single
machine, keep the policy above all the rules and test the speed. Also
please execute the below commands to c...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.