Description This article describes the challenges of Multicasting using
PIM in an ADVPN environment. In order to understand the behavior that is
going to be demonstrated, we first need to have knowledge of how
Protocol Independent Multicast works in ...
Description This article describes how to allow access to a website
through an IPSEC tunnel. Scope To explain this in more detail, imagine
that the Website 'example.pt' is only allowing requests from Portugal,
and it is necessary to access it from th...
Description This article shows the behavior of a VXLAN over an IPSEC
setup when the tunnel traverses VDOMs. Solution This is the topology: On
the first setup, a Software VDOM link on the second FortiGate is used at
the right to route traffic between ...
Description This article explains how to manually configure an IPv6
link-local address. Scope FortiGate and FortiOS. Solution By default,
FortiOS uses the EUI-64 method to assign link-local addresses to its
IPv6 enabled interfaces: This address is us...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.