We have a FortiEMS 7.4 and we want to expose RPC ports through the
ZTNA.For what I have read so far there is only possibility to define
single port per ZTNA destination rule.The problem is that by
specification RPC uses:- TCP 135- Dynamic TCP range 4...
Hi all, I am trying to establish a ZTNA replacement of our VPN for all
AD-joined devices.The first problem I have encountered is that
workstations cannot resolve the domain controllers - our internal DNS
server is accessible on TCP 53, but it tries U...
We have an IPSec tunnel between two FortiGate devices - FG500E and
FG40F, both running version 7.0.14.The IPSec is established without any
problems, but the traffic inside the tunnel has some very strange issue.
The tunnel IP addresses are 10.0.66.16...
Today we updated all our FortiGate devices to 7.0.14 due to the security
concerns with the ongoing attacks worldwide. Unfortunately after the
upgrade we are facing a lot of blocked connection to applications which
were working without problems before...
We have upgraded our EMS server to 7.2.2 build 0879.After that we
upgraded few of our FortiClient to 7.2.2.0864. The result:- all our
FortiClient endpoints with 7.0.9 receive the ZTNA destinations and
create successfully the virtual hosts in the Wind...
I am doing TCP forwarding.But for use of dynamic ports I need to define
14K rules, which is 11MB policy and is not working.It is easy to forward
one port, I need a huge range of ports.
You are not correct - you may fallback and use tcp 53, the problem is
that windows uses udp by default.Still I can't believe no one uses ZTNA
for AD access...
The problem and the solution was that the Tunnel was created initially
as an dial-up one.After changing it to standard IPSec - something has
broken up inside it.Recreating tunnel from scrap fixed the issue.
I do not understand - what kind of static routes do you mean and why?We
have proper routing on both sides:- on external interfaces we are able
to establish the VPN;- on tunnel - there is a routing for the tunnel
interfaces on both sides!