Hi Community I have issues with member ports of an LACP on one of our
managed FortiSwitcheThe setup is:SW1 and SW2 are configured with
MCLAGThe LACP from SW1 and SW2 towards SW3 has MCLAG enabled set.I have
verifyed MCLAG consistensy on SW1 and SW2 w...
Hello Community Normally I'm using a prefix-list in combination with
route-map to filter prefix advertisements when configuring BGP.For fun
and to expand my knowledge, I was looking into the docs article about
'Route filtering with a distribution lis...
Hi community. I'm looking for a way, to build an Event handler in FAZ
with the following requirements.Tricker an alert in case of.Log received
from FortiAuthenticatorwith mulitple log descriptions: ' EAP_AUTH_START'
but with absence of any following ...
I have a site to site VPN between an on-prem FortiGate 500E and a
vFortiGate in Azure.Due to the distance between the FortiGates
geographically, I’m trying out Forward Error Correction (FEC) ingress
and egress on both FortiGates to see if it can impr...
Hello We are using FortiClient EMS to manged + 7.000 FortiClient, only
using the VPN function. The EMS server uses our Microsoft Active
Directory to pull in devices and their location in the AD. Currently we
are assigning policies to devices based on...
The PDF study guide is not available for me, as my account is of type
“customer”.Back when I was partner, the study guide was available under
eatch training. As a customer, I’ll have to purchase the PDFs today
Reboot of the MCLAG switch didn’t resolve the issue. My team and I spend
some time again testing.A combination of shutdown, module status
(transceiver info) and LLDP neighbor-summery on our SW1, SW3 and SW4
indicated that the Tx fiber wire somewhere ...
Hi @dbu.Indeed I have though of it also.But STP shouldn't be running on
the indivual ports, but on the LACP link, yes?I don't see STP blocking
my ports.However I came across a different discovery.Additional
information is needed here.We have + 10 For...
Agree with @AEK Disable any allowaccess on the WAN facing interfaces,
I.E WAN1 & WAN2.If you do need remote management access, you could lock
it down to trusted networks with local in policies.