Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article describes that when configuring VLAN interfaces on FortiGate, it is possible to encounter two common VLAN protocols: 802.1Q and 802.1AD, also known as QinQ (Double VLAN and clarifies the differences between these VLAN protoco...
Description This article describes how to confirm the gateway IP address for an interface on FortiGate to configure static routes. Scope FortiGate. Solution There might be scenarios where an incorrect default gateway for a static route causes the rou...
Description In modern networking and cybersecurity, the ability to control and manage access to specific IP addresses or IP address ranges is of paramount importance. This article describes how to disable individual IP addresses or IP ranges within I...
Description The Process Monitor page provides real-time insights into currently running processes, displaying their respective CPU and memory usage. This valuable feature equips administrators with the ability to not only observe but also manage syst...
Description This article describes how to prevent malicious actors from using brute-force attacks on the FortiGate to access SSL-VPN. Scope FortiGate. Solution The utilization of the TOR network by attackers offers an elevated level of anonymity, whi...
Kudos given to