Hi. I have a webserver behind a FortiGate 100F (v6.2.5). I want to
protect it with IPS-Sensor. But there are some question where I wasn't
able to find an answer. [ol]Why have some IPS signatures with action =
pass and also there are some signature wi...
Hi. I have a FortiGate 100F which I have configured for SSL-VPN in
"Tunnel-Mode" (also configured a policy) > which is working. Now I would
like to set up "Split Tunneling" > I have enabled it and set up the
routing addresses. Now the issue is, that ...
Hi. I'm sending my logs to a syslog server (Synology NAS). The log files
are hard to read, because the "message" column has dozens of values
which can't be filtered. I can download the log files from syslog
server, but as expected there is also the s...
Hi. It is the first time I have setup a FortiGate 100F Cluster (FortiOS
6.2.3). I followed the tutorials for "HA" and selected "active-passive"
for the FortiGate. I have setup the "ha1, ha2" interfaces an connected
them. Then I have selected the "wan...
Hi! I'm using the vpn ssl (with fortitoken 2FA) to connect to company
network. Basically this is working. On the Windows-DC there are few
firewall rules for the "domain profile". If I connect with forticlient
v6.0 throuh the vpn ssl to company, the n...
Now we found out (togehter with TAC Engineer) that this isn't an issue
of the FortiGate. The ISP is blocking the "gratuitous arp" for security
reasons (housing switch where multiple customers located, they block the
gratuitous arp so that a foreign d...
Thank you for your anwser. I had before only a FortiGate 60D without a
dedicated management port, and now i though this MGMT-Interface is fixed
and I can only manage the FortiGate with this port/ip-address. Because
you have written that you are using...
It looks like is not appearing because of the "dedicated-to management"
setting. It is described there:
https://kb.fortinet.com/kb/documentLink.do?externalID=FD37035 t prevents
to create Firewall policy using an interface configured with this
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.