I am about to get a dedicated link into AWS HK, its an AWS Direct
Connect, over which I need to route all traffic for an Autodesk Product.
This is then to a Squid Proxy inside AWS HK then back out to the
internet. This is to improve stability to the ...
I am about to get a dedicated link into AWS HK, its an AWS Direct
Connect, over which I need to route all traffic for an Autodesk Product.
This is then to a Squid Proxy inside AWS HK then back out to the
internet. This is to improve stability to the ...
Running 5.6.12 I have successfully been running a "Forticlient" IPSec
VPN on my public facing interface, it's for staff remote access. I need
to have a 2nd "Forticlient" IPSec VPN on the same public interface so I
can isolate traffic for different st...
Hey everyone, I normally use IPsec tunnels for site to site, also for
remote access, VPNs. It's just always been my preference for some
reason. I have setup an SSL VPN Portal now, but have only enabled tunnel
mode. Under SSL-VPN Settings I only have ...
We will soon have a 2nd line out of the Office. We are in a country with
internet restrictions, so for these restricted sites like google,
youtube, amazon etc. I want to route them over the 2nd line out which
will connect to a sister office - in a co...
I was wondering about the 'ticks' also. But once you hit 'Apply' they go
away, so I am not sure they actually do anything. Maybe just a way to
multi-select?
Thanks very much James, I just wonder if I have absolutely no DoS policy
defined (at either end) if this could really be having an impact on UDP
traffic? Can anyone way in on that fact? Is there a default value
setting if NO DoS policy exists?
Darwin, - thanks for that solid bit of info. Really helpful. I looked
and as I suspected I have no IPv4 DoS Policy. (Something to add to-do
list).I also do not have Anomaly under "Log&Report". I assume that is
because I have no DoS Policy? I am runni...
Thanks I will look at the one-arm sniffer. Is that effectively an
additional interface on the FGT trunked with all necessary vlans + an IP
in each? Scrapes all the vlans at a L2 level? But this is not used for
firewall bound traffic, just for 'sniffi...