Hi All, I'm trying to answer the following questions for a design and
can't locate an answer in the docs: - Does a Virtual Wire Pair forward
Spanning tree BPDUs by default. - If running an Active/Passive HA
cluster, how does the passive node deal wit...
Hi experts, Can someone please tell me what the standard port setup for
an access port on a managed fortiswitch should be? Via the GUI ypu have
the option of setting a native VLAN and an allowed VLAN list. This would
indicate to me that the default p...
Hi Experts, We have a Fortigate 300D running 6.0.4 and we are using it
to proxy requests from our own network to a 3rd party. We are currently
migrating configuration from a Bluecoat ProxySG appliance and have hit a
snag. The Bluecoat has a number of...
Hi Experts, I've been tasked with putting together some schematics for
an upcoming Fortiauthenticator install. I'm interested to know if these
appliances can support LACP or some kind of link aggregation to allow
the device to connect into a resilien...
Hi All, Fortigate 60D v5.2.4(Build688) I've had a bit of a google and it
appears it should be possible to setup my VDOMs to log to multiple
Syslog servers, but I am struggling to find out how to get this working.
I have overridden the global syslog s...
Hi all, I've had confirmation from Fortinet that the DNS filter is an
'all or nothing' setting, its not possible to remove the youtube
restrictions and keep the google restrictions on. The only way to cover
this is to use SSL inspection and apply the...
Hi all, Resurrecting this thread in the vain hope that a solution was
found... We are relying on the DNS Filter to force google safesearch but
the youtube restrictions are killing us. We currently have no option of
implementing SSL Inspection so woul...
Hi - I don;t suppose you found a resolution for this did you? I have the
same issue - 6.0.5> Two Forticlients connect and register with the FW,
the monitor shows the same MACs and IPs from both.... CLI seems to be ok
so assuming its a bug.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.