Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article explains the process of identifying application signatures that require deep inspection. Scope FortiGate, UTM. Solution Option 1: Application control relies on a deep inspection profile for optimal functionality. However, it ...
Description This article explains the ikev2 debug output in FortiGate. Scope FortiGate, IPsec. Solution While troubleshooting the tunnel down issue, apply the below commands to take the debugs on both FortiGate: di vpn ike log-filter clear di vpn ike...
Description This article describes that before upgrading the device to any version, the recommended upgrade path should be followed and this document provides details on how to check the upgrade path for FortiManager, FortiAnalyzer. Also give prefere...
Description This article describes how to set up a hairpin NAT through the GUI to access a resource behind the firewall from a machine in the same network as the target destination.In this example, the machine sends an access request to the public IP...
My Accepted Solutions