Hi, I am using user groups in firewall policies.I am wondering whether
it is possible to require group membership in more than one group for a
policy to be accepted. Example: User Z has to be member in group A AND
group B for policy X to allow traffi...
Hi, I am looking for a way to disable the ads/dashboard banner that get
displayed in FortiClient 5.2.With the XML configuration file for
FortiClientConfigurator one can specify 0 What is the
corresponding registry key and/or MSI property for said set...
Hello, I currently have a few fortigates running 5.0.5, which are
vulnerable to CVE-2014-0160. I guess that 5.0.6 is vulnerable as well,
can anybody confirm? Any indication when new firmwares are going to be
paulinster wrote:last comments/update I got from TAC look like they
finally acknowledge the issue, however I haven't been able to get
further details/informations :( TAC told me that there is going to be an
updated MIB with the release of FortiOS 7, ...
paulinster wrote:It does also snmpwalk through the whole ipsec tun table
fgVpnTunEntry(.184.108.40.206.4.1.123220.127.116.11.2.1), but the problem is that
prometheus's snmp_exporter look at the fortigate MIB file and do rely on
the index in order to push data ...
sw2090 wrote:I did just that long time ago and TAC then told me that's a
known bug... Apparently, now it is "by design". They should update the
documentation to reflect the actual functionality or fix the filter.I am
afraid that if we, the customers,...
sw2090 wrote:the last time i used it it did not really work :( I set:
diag vpn ike log filter name "name-of-phase1"and then started diag debug
app ike -1 And in the output I still see a lot of lines that contain
different p1 names. I wouldn't mind li...
Hi, I recently opened a ticket about the odd behaviour/misleading
documentation about the "name" filter, and this is the explanation I was
given: Below are some IKE debug lines to use as a reference for the
explanation. The lines I have highlighted i...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.