Do I have to include the delimiters!? I.e. do I have to
write/fortinet/orfortinetWhat if I'm matching a path?Do I
write/fortinet\.com\/blub/or can I change the delimiter which makes it
more readable?|fortinet\.com/blub|or is it already escaping on it...
I am having a hard time figuring out how exactly a decision is taken
when multiple UTM profiles and multiple rules are in play. But let's
have a simple example: I have a HTTP request that goes into category
"Information Technology".However it is bein...
Hello. Two questions: 1) Does FortiProxy Eval (VM) allow to do SSL
interception? I tried (enabled deep inspection for a policy item) but
nothing happens: I just see the original certs being used when browsing
through the proxy. 2) I would like to kno...
They should get their terms right.* gmail.com is a domain*
gmail.com/something is NOT a subdomain. It is a URL. Using the term
I didn't even realize there was another DB besides Webfilter and
Appcontrol, namely "internet services".... :flushed_face:Thanks for all
the valuable information so far. UPDATE Oh that's because they are not
shown on the quick edit pane. You have to ...
Hello, So if I want to do the following, how do I do it without losing
overview of my rules? All users have access to everything, restricted by
webfilter and appcontrol:* Source: IP/Usergroup* Destination: all*
Service: HTTP/HTTPS* Security Profiles:...
Hmm, consider the following scenario:* All users are supposed to be
allowed to use Proxy.HTTP application* A certain group of users
*additionally* is allowed to do FTP Usually you'd configure* Group allow
FTP* Everyone allow HTTPSo, if Group doesn't ...
1) After generating a certificate myself, mgmt becomes available using
HTTPs. 2) So I also created a custom CA for SSL inspection. No luck. It
still gives either "exempt-unsupported" or "certificate-probe-failed".
3) HTTPs connection to proxy port 80...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.