Description This article describes the various use cases that PKI
certificates are used for in the FortiGate, how to enable the
certificates for specific features with examples and the priority order
in which the certificate configurations are applie...
Description This article describes the steps to change the HA password
in a FortiGate High Availability cluster, and what to expect after the
password change. Scope FortiGate. Solution In a FortiGate High
Availability cluster, the HA password should ...
Description This article describes how to troubleshoot issues with the
Spanning Tree Protocol (STP). Spanning Tree Protocol (STP) is a
link-management protocol to enable a layer 2 loop-free topology. STP
enables a network to have redundant paths for ...
Description This article describes how to retrieve useful device
parameters like MAC address, IP address, vendor details, OS details,
firmware version, etc of all the connected devices in the network in
real-time from the FortiGate Scope FortiGate. S...
Description This article describes how high memory usage on a
FortiSwitch could be triggered due to a few reasons and how to analyze
high memory usage on a FortiSwitch, identify potential causes that could
trigger this, and how to remediate it. High ...