Description This article describes how to divert selected URLs to an
upstream proxy (it can be any 3rd party Proxy) in Proxy chain setup.
Scope FortiProxy, Proxy chaining. Solution In an enterprise environment,
it is common to use proxy chaining to s...
Description This article describes possible causes and solutions for
legitimate traffic getting blocked due to 'port-violation' in
application control. Scope FortiGate, FortiProxy. Solution It has been a
practice for some time to use non-standard por...
Description This article describes the importance of using a metadata
file when configuring SAML on FortiAuthenticator. Scope
FortiAuthenticator SAML. Solution There are cases where
FortiAuthenticator acts as IDP ( Identity provider) or SP (Service
p...
Description This article describes the possibility of changing the
resolution of Web RDP sessions. Scope FortiSRA. Solution Based on
certain applications(graphically rich or heavy, like imaging software,
design tools, etc), there can be a requirement...
Description This article describes the items that must be verified when
a VDOM in FortiGate is converted from policy-based to profile-based.
Scope FortiGate, VDOM, Profile-based. Solution When a VDOM is changed
from policy-based to profile-based base...
Hi Team, Regarding the last paragraph of the article. Can I know how can
the FortiGate cache the DNS record if DNS DB and DNS server is not
configured. As per my understanding DNS requests should be directed to
the Configured DNS servers with out bei...