I understand that when you dedicate a CPU core to management it allows
https or ssh access during a time when the CPU would be too busy to
respond but I'd like to take that a step further? Will that CPU be
leveraged for all or at least most other con...
I am trying to figure out how exactly the throughput numbers are
calculated. I've come across vendors doing it a couple of different
ways. Is it (in + out) + .... for all interfaces on the box? Does it
only count input our output?
This is a question for any Authenticator product people. I believe Dr.
Carl Windsor drives the Authenticator product. I am curious to know if
we could expect TACACS+ or any other additional protocol support in
FortiAuthenticator. It is rather appeali...
Stripping the tcp timestamp from traffic that passes through the
firewall is becoming a more frequent request as it is showing up on
various vulnerability scans. I see that some security appliances have a
command that specifically strips the timestam...
I resized my vmdk file after the initial startup with the default 30GB
log drive. I shut it down and changed it to 300GB just like I would with
any other vm. The problem is that the analyzer app does not recognize
the increase. Is there a cli command...
Yes, I was looking at the data sheets. I understand they are under ideal
conditions but I'm trying to wrap my head around some architecural
aspects of a few different devices. So if you have 200 Mbps of inbound
traffic across 3 interfaces and 200 Mbp...
I thought about IDS/IPS too but that won't fix the issue on the
Fortigate itself. It is offering secure web services using DH key
exchange, which is ok, but it uses 1024 bit (Group 2) in the
implementation and so far I have not found anyway to config...
I absolutely agree that this should be easily configured on the web
server. The problem that is outlined in this forum post is that the
Fortigate is the web server for this application and we are not given
the same controls that we have on apache or ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.