Description This article describes that FortiGate keeps showing the
message 'Requires FortiAnalyzer Cloud entitlement'. Scope FortiGate
v6.4.4 and higher. Solution Make sure to have FortiAnalyzer Cloud and
SOCaaS both licenses activated on the FortiC...
Description This article describes how to set the mgmt interface under
'config ha-mgmt-interface' in case the mgmt interface is not an option
available. Scope FortiGate v7.0.x and above. Solution to set up the mgmt
interface as a reserved management ...
Description This article describes that sometimes in Windows 11 updates
might break the FortiClient operation causing the error -5029. Scope All
FortiClient versions on Windows 11. Solution Before applying the
command, make sure to have checked the I...
Description This article describes how to upgrade a HA virtual cluster
mode with VDOM partitioning configured between three FortiGates where
each FortiGate is the active device for one of the VDOMs. Scope
FortiGate v7.2.x and above. Solution In this ...
Description This article describes how to quickly find out mac-addresses
of the devices that are using the same IP address. Scope FortiGate 6.2.x
and above. Solution Sometimes, a duplicate IP address can be caused by a
configuration error or human er...
Hey Helio, Mate, I got confused with this part : "But if needed specific
traffic does not have SIP ALG inspection active, It is not possible to
accomplish by adding a VoIP profile at a specific IPv4 policy." You
wrote is not possible to use a voip pr...
Definitely is not the link but the SDWAN configuration when you include
WAN2. Have a look on this link, it will help you to understand the SDWAN
Hi SonHuynh, SD-WAN settings and routing table look correct. Definitely
there is something wrong with WAN2 that we couldn't see with the tests
done and settings provided. I suggest you to raise a support ticket then
the TAC team will schedule a remot...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.