It is possible to predict TCP/IP Initial Sequence Numbers for the remote
host.The remote host has predictable TCP sequence numbers.An attacker
may use this flaw to establish spoofed TCP connections to this host.How
does fortigate mitigate this? Forti...