Hello, I would like to provide for my colleagues some restricted access
on the fortigate for management. I know that I can provide read only
access, but is it possible to somehow permit to just several rules in
firewall policy(I mean for example add ...
Hello, We have fortigate In azure, we would like to Prevent Port
Scanning. Is it possible and how I can do it?I tried create IPS policy
and select Port.scanning, but it didn't work Is it possible prevent port
scanning with IPS Profile?
Hello, We have virtual Fortigates (Active-Standby HA) installed in ESXi
environment. We would like to deploy Virtual Server for Load balancing
our DNS. IP address of DNS-1 - 10.0.0.1IP address of DNS-2 -
10.0.1.1Virtual IP will be IP of loopback - 10...
Hello, we have fortigate, deployed in Azure. We have configured SAML for
authentication/authorizations for FortiVPN. Now we are also planning
delpoy another fortigates on ESXi infrastructure, where we also need to
configure FortiVPN with SAML. Qsuest...
Hello,We have virtual FortiGate, deployed in Azure. We activated Remote
Access VPN (FortiVPN) and integrated it with SAML Azure. Authentication
don based Group. And I have question regarding these groups. For
example:If i Have group_1 which have acce...
Just Assuming.If DNS-1 is placed after IPsec interface and DNS-2 is
after LAN Interface-1 policy will bi like:source all needed Interfaces
and Source IP addresses and in destination should be Load Balancer
Object, and IPsec and Lan Interface-1 as des...
Thanks @MethodNet Understood that every needed interfaces I need to
select as source interface and in destination I need to use Object, but
which should be destination interface? I created loopback-1 and assigned
IP 10.0.2.1 (Which is Load Balancer I...
I would like to do something like:Configure Virtual Server on fortigate
which will do Balancing and HA (for DNS) On client PC I will enter IP
address of Virtual Server (10.0.2.1). And when fortigate receive dns
request from this pc it redirect this r...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.