Description This article describes how to restrict queries to a specific
IP address with a DNS policy. Pre-requisite: Secondary IP is configured
in the network interface. DNS Zone and settings pre-setup. Scope
FortiADC GLB. Solution By default, when ...
Description This article describes symptoms of bandwidth usage being
exceeded, the result of the over usage, and ways to restore the user’s
access. Scope FortiAppSec Cloud WAF. Solution FortiAppSec Cloud WAF
consists of two license subscriptions: App...
Description This article describes how to use severity-based action in
the Virtual Server WAF profile. Scope FortiADC. Solution The predefined
'Medium-Level-Security' profile has no category enabled and denies
signature triggers based on the configur...
Description This article describes sensitivity considerations when
managing the network interface name in FortiADC CLI. Scope FortiADC.
Solution When managing network interfaces via CLI, ensure to input the
network interface name the same as the exis...
Description This article describes symptoms of the Threat Analytics
hyperlink problem in the FortiWeb dashboard, workaround steps, and its
fix. Scope FortiWeb, FortiWeb-VM. Solution In the FortiWeb dashboard,
users can quickly access the Threat Analy...
Hello @adam283849 By default, Layer 4 VS uses DNAT as its packet
forwarding method and source IP will not be NAT'd. Direct routing is
basically a No NAT. I believe document below will help you understand
packet forwarding method difference available ...
Hello @luis_abreu, If your requirement is to bypass security scans then
URL Access feature is able to do it.
https://docs.fortinet.com/document/fortiweb/7.4.6/administration-guide/232579/restricting-access-based-on-specific-urls
>> Match the URL Acce...
Hello @defsdefs12, FortiADC 7.6.0 now supports HA cluster up to 8 member
nodes. Please refer New Features documentation.
https://docs.fortinet.com/document/fortiadc/7.6.0/new-features/092029/high-availability
Thanks. Regards, Shafiq
Hey @defsdefs12, I'd suggest to start with understanding the HA
deployment modes and redundancy objectives to be met. You can refer
below documentation as it provides sample configuration, topology, how
traffic flows in HA and troubleshooting
steps.h...