Description This article describes how to fix an issue where FortiGate
fails to obtain capability information from an Azure-Hosted FortiClient
EMS. Scope FortiGate. Solution Problem: When trying to authorize
Azure-Hosted FortiClient EMS from FortiGat...
Description This article explains how to enable the DNS Filtering
service and how to confirm if the service is running using the CLI
command Scope FortiGate. Solution DNS Filter Profile inspects DNS
traffic passing through FortiGate and can be config...
Description This article identifies the problem of a vcluster with two
primary roles for the configured VDOMs on a master FortiGate under the
HA page in AP HA cluster configuration. Scope FortiGate FortiOS 7.2.11.
Solution FortiGate with FortiOS 7.2....
Description This article provides a possible root cause for Radius
authentication failure when FortiGate authenticates with the Radius
server on behalf of remote Radius users. Scope FortiGate Solution
Problem: When FortiGate is authenticates a Radius...
Description This article describes the effect of disabling the multiple
interfaces feature on already configured firewall policies with multiple
interfaces in FortiGate. In addition, it shows a CLI command for a quick
check for policies configured wi...
Would you please confirm if the following is what you've on configured
on fortigate: configure system central-management set type fortiguard
end In addition you can check this troubleshooting article:
https://community.fortinet.com/t5/FortiGate/Troub...
Try to use ZTNA rather than sslvpn as this is more secure as per:
https://docs.fortinet.com/document/fortigate/7.0.0/new-features/194961/basic-ztna-configuration
Hope this help
If the vlans are configured and attached to port2 you need to create
firewall policies from the VPN interface to each vlan to be able to
access resources on those vlans. Remember to add those vlans on
accessible networks under VPN phase-1. If those v...
You can disable any security software running on the client side and
check again. In addition you can run: diagnose sniffer packet any 'port
xxx' 4 <- xxx is the non working printers port number Also, diagnose
debug reset diagnose debug flow filter p...
You can configure the following: config firewall service customedit
"Port-1723"set tcp-portrange 1723set udp-portrange 1723nextend config
firewall local-in-policyedit 1set intf "port1" <- Your public interface
or anyset srcaddr "all"set dstaddr "all"...