Good day everyone,I added to my repo folder with FortiAnalyzer Handlers
collection ready to use.Your feedback, and ideas for new Handlers are
always welcome.Repo:
https://github.com/yuriskinfo/Fortinet-tools/tree/main/Fortianalyzer-handlers
Thanks.
Good day everyone, hope you all are doing well. I created a Github repo
where will collect scripts, tools, anything that helps in daily work
with Fortinet products.So far put a collection of Fortigate automation
stitches (21) you may find helpful. Ne...
Good day everyone, was wondering - I am reading Fortinet documentation a
lot (here in community "Tips", admin guides etc.) and sometimes stumble
on incorrect/outdated or plain typo/incorrect info. Is there a way to
alert someone on that?Thanks E.g.
h...
Good day everyone, here is a guide I wrote to harden your Fortigate VPN
SSL in additional ways.Your feedback is welcome and will be included in
the updates.Linkedin: Fortigate VPN SSL Hardening Guide Thanks P.S.
Tried to upload the original PDF but s...
Good day everyone, I'd be glad to hear your input on - what are
benefits/disadvantages of IPSec site-to-site 2 tunnels between 2
Fortigates, each having 2 ISP links inside/outside SD-WAN membership?
SD-WAN config including both ISP links for Internet...
It means you were connected to the LAN interface of the FGT. To be able
to access from the LAN as well as WAN - add your LAN range to the
trusthost as well - 192.168.1.0/24. WAN1 is SPF1 indeed. No, you do not
need additional policies except Trustedh...
Hi, nope, there is no such option. But you do have option of creating
DDOS policy per source/destination IP - you could create as top most the
specific DDOS rules for Pingdom servers IP to basically exempt them from
DDOS policy.
I do use it as a failsafe measure when configuring some FOrtigate
remotely and can lose management connection to it. For example when
changing the default route or WAN interface of FGT to which I am
connected via the same WAN interface - if something...
You need to do 2 things:Enable management protocols on the interface you
are trying to reach - https/pingSet trusted host(s) for your admin
username in Fortigate to be allowed to access the interface. System ->
Administrators