Description This article describes how to configure ZTNA rules after the
7.2.5 upgrade. Scope FortiOS 7.2.5. Solution In the previous versions,
the option to configure ZTNA rules was available under Policy & Objects
-> ZTNA -> ZTNA Rules.The ZTNA opt...
Description This article describes the changes in the location where
FortiCloud logging and Fortianalyzer logging can be configured. Scope
FortiGate v7.2.5. Solution In the previous versions, FortiCloud logging
and FortiAnalyzer logging shall be conf...
Description This article describes how to allow traffic from certain
clients in the blocked country list to access VIP servers. Scope
FortiGate. Solution In this scenario, a VIP configuration for internal
servers is used. A policy (test1) with source...
Description This article describes that is it not possible to generate
reports other than 360-degree activity reports on Forticloud. Scope
FortiGate. Solution FortiCloud summary report has been ceased for the
free version of FortiCloud starting 22.3....
Description This article explains the difference between Local-in-policy
and Trusted hosts. Scope Any supported version of FortiGate. Solution
Local-in-policy: Local-in-policies to restrict administrative
access(HTTPS, PING, SSH, and others) in the i...
Hi unknown1020, Unless you have a policy on top allowing all source to
all destination in the firewall policy, not all traffic will be allowed.
You can configure policies for required source, destination and services
while the other traffic will be d...
Hi create_share, Please make sure you have a proper route configured for
the remote subnets through the tunnel. If policies, routes and tunnel
config is good and still facing issues, we will need to check the flow
filter debug to check what is happen...
Hi, I understand that you would like to deny ping and allow the other
ports required for printer service to work. Please be informed that
different brands or make can use different ports for the services to
work. To allow the ports, kindly check with...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.