Description This article describes how to set up an Okta environment for
WiFi authentication. Scope Fortigate + FortiAP Solution The data flow
has the following steps: 1) A supplicant (mobile device/laptop/desktop)
tries to associate with the FortiAP...
Description This article describes how to check and manipulate the
priority of specific default routes for IPSec tunnels. Scope FortiGate.
Solution It is possible to configure specific default routes to
establish each IPSec Tunnel. For example: # con...
Description This article describes how to use and how the 'proxy-arp'
feature works. Scope FortiGate. Solution Traditional Setup: The customer
has an AS and a public IP 220.127.116.11/32 and delegates on the ISP the prefix
announcement. The ISP delivers the...
Description This article describes how to test connectivity to Microsoft
Collaborative Services, and how to identify the flows allowed on the
FortiGate. Scope FortiOS, MS Suite. Solution Scenario: This example is
given with Office365/MS Exchange emai...
Description This article describes how to deploy a FortiGate-VM, in
transparent mode without VDOM licensing in VMWare vSphere environment,
as an Internal Segmentation Firewall and explores some caveats. Scope
FortiGate VM 7.2.4 and VMWare vSphere 8. ...
@RolandBaumgaertner72, I will need your routing table (get router info
routing-table all), I will need to check your IPSec Phase 2 selectors,
and your IPSec interface config. You can send by PM if you do not want
to expose your config.
Hey, @RolandBaumgaertner72, can you please add "4 0 l" to the packet
capture commands, and provide the output? Can you please provide the
output of the relevant "diag flow" command
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.