Hi Everyone - banging my head against the wall here on why source name
resolution is working only on ONE device? See pic - it works on the
first listed client but none of the others. What am I missing? I would
like the fortigate to resolve names of *...
Hi - we used to receive messages when an intrusion was observed on 5.x
devices but after upgrading to 6.4, we no longer do. I see in Security
Fabric/Automation stiches there is no category for notification of
attempted intrusion. How are people handl...
Hello - I apologize if this is a dumb question (networking isn't our
strong suit) but when a user is connected to VPN, shouldn't we be able
to ping that PC and map drives, etc? The connected user can see our LAN
just fine but we can't see the remote ...
Hello, I am adding a new IP range to our WAN1 port and came across a
weird issue/confusion on how the fgt is defining these fields in the
GUI. I am probably overthinking it, but are we supposed to put in the
full Assigned LAN Netblock address with /2...
Hi Everyone - first post here. I'm new to fortinet but hopefully I have
a simple question for the experts. We are about to activate a new WAN
service from a new ISP. Currently, our 100D is configured only for WAN1,
but I would like to keep that confi...
Olamie wrote:Hi,how was this issue eventually resolved. i am currently
experiencing the same issue on two fortigate 50E devices. please help I
posted a fix here, just had this
For anyone else who has this issue, same thing happened to me just
yesterday. Only affected some sites, not all and happened out of the
blue - absolutely NO changes (by us) were made to firewall, routing,
DNS, etc...literally happened overnight.The p...
So, I turned on "Device Detection" on the LAN Network interface and it
resolves some MAC addresses and names in the "Device" column, but not
the Source and not for all and not accurately. There are duplicate MACs
for several different devices and not...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.