Description This article describes the case when it is impossible to log
into the FortiGate via SSH, or GUI with the Local firewall user. The
user belongs to a remote server (Radius, Tacacs) and can access it.
Scope FortiGate. Solution When it comes ...
Description This article describes that by default, FortiGate does not
log the SLA health check and how to configure the SLA logging. Scope
FortiGate. Solution Here is the config example: set sla-fail-log-period
set sla-pass-log-period Enter an in...
Description This article describes how to use source IP for the local
out traffic in a static route. Scope 7.4.0 and above. Solution This is a
new feature introduced in the FortiOS version of 7.4.0. It is possible
to add the preferred source IP in th...
Description This article describes what will happen if the ip pool and
DHCP IP ranges conflict. Scope FortiGate. Solution If an IP pool is
defined but not used, it can still cause issues with DHCP if the IP
pool's range overlaps with the DHCP range. ...
Description This article provides some useful filters that can used in
the sniffer packet. Scope FortiGate. Solution The following command is
used to trace the packet via CLI: dia sniffer packet 'host
x.x.x.x ' <----- This interface can be set to ...
Hi Abdal, You may use the option Keep Alive in the phase2 configuration.
The option is to keep the tunnel active when no data is being processed.
Please refer the below
Hi Chris, Yes, that's correct. If an IP pool is defined but not used, it
can still cause issues with DHCP if the IP pool's range overlaps with
the DHCP range. This situation can lead to conflicts and unpredictable
behavior in the network. When a DHCP...
Hi fabs, Only the user who created with Administrative profile as super
admin will be do changes on the configuration part.User with read only
access will not be able to change anything on the user profile. Also,
need a confirmation that you are look...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.