Description This articles describes how to assign user's remote access
to the FortiGate through FortiGate Cloud. Scope FortiGate, FortiGate
Cloud Solution Prerequisites: FortiCloud account. FortiGate connected
and registered to FortiGate Cloud. Log i...
Description This article describes how to enable or disable UTM's such
as Intrusion Prevention, Antivirus, and Application control on the
FortiGate. Scope FortiGate Solution Navigate to System -> Feature
Visibility. Enable the UTM features: It will n...
Description This article describes the method used to understand the
incoming and outgoing proposals through the IKE debugs and discover
where the mismatch is occurring. Scope FortiGate. Solution When
establishing an IPsec tunnel between two sites, p...
Description This article describes the way to observe if the FortiGate
is the initiator or the responder through the CLI. Scope FortiGate
Solution To determine which device is acting as the responder or
initiator, use the following command: diagnose ...
Description This article describes how to configure Inter-VLAN routing
that will allow different VLANs to communicate with each other while
maintaining network segmentation. Scope FortiGate. Solution In this
example, the necessary VLANs and firewall ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.