Hi Friends,Can you please help me to understand how the custom URL works
in fortigate?I have a scenario like below , please help. 1.
https://prod.company.com/sitea --- Allow ( IP 18.104.22.168)2.
http://dev.company.com:9898/sitea -- Allow ( Only th...
Hi I have a internal network which I have NATED with ( using a different
firewall) a public IP and allowed the same in Fortigate. Network
--->Other Firewall NAT--> Forigate. Fortigate rule is like -Source --
NATED IPDestination - AnyService - http /h...
Hi Gurus,I have basic question to ask. I am trying to establish a Site
to Site VPN. It's Between an ASA which is connected behind Fortigate and
another remote ASA. I have given required policies in fortigate. But
Tunnel is not coming up.When I do a s...
Hi All,Wish you great year ahead. I believe FIDO ( Fast Identity Online)
gonna be the smartest thing in 2015 in network Security World...!I hope
Fortinet too is working to build a "FIDO Firewall"..If yes, All the best
wishes.Let's forget passwords an...
1. Does Fortigate send the request to Fortigurad service for each http &
https request?2. Which part of packet does it consider for the
inspection ? CN or http header or SNI or IP ?3. How does it take a
decision if both allow & deny URL's are configu...
If the fortigate has intergrated with any of the directory service
through FSSO , LDAP or RADIUS ,then you will get the username in reports
and fortiview.You can check the user status in User- Monitor module. If
you are using device discovery in inte...
Thanks Emnoc and Sorry for the late reply. Your flow captures looks like
a client is in AWS and this traffic is coming inbound. Is this not
correct? if so I would assume the web-server is hidden been the other
firewall (FORTIGATE ) and you would have...
Hi ,I want to have the firewall synced with the DNS server.How can i
forcefully try to get the IP's against DNS.I did a dia firewall fqdn
flush and now I cannot see any DNS entries on ' dia firewall fqdn list".
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.