Description This article describes the troubleshooting process when a
scheduled backup of FortiPortal does not work due to no access to
download docker images. Scope FortiPortal v7.x. Solution Most users
deploy FortiPortal without any access to the i...
Description This article describes how to view IPS signature details
using FortiManager. There are times when security administrators must
deep dive into a particular IPS alert to know why a signature got
triggered. In such scenarios, viewing the IPS...
Description This article describes that FortiAnalyzer comes with
physical disk drives that are configured in RAID. The RAID controller
runs a scheduled consistency check on all the RAID arrays to ensure that
all data is consistent. This check general...
Hi @MohammedYasin - Please be aware of the PSIRT that was published
after my last comment - https://www.fortiguard.com/psirt/FG-IR-24-535 -
and take actions accordingly.
I did not quite understand what you mean by "1:1" policy entries. The
more specific subnets and granular policies come at the top and the
broader ones flow below them. So, your specific subnet LAN users will be
at the top and will have their 1:1 bloc...
Hi @okllee , If you have a FortiManager, I would recommend using the
consistency check tool that can help clean up your firewall policies -
https://docs.fortinet.com/document/fortimanager/7.6.2/administration-guide/233367/perform-a-policy-consistency...
Hi @JimBo , Thanks for the clarification. I agree that JSConsole is a
powerful tool. For admin access, there is no way to configure a policy
based on application. The only way to restrict access is to have local
in policies that can limit the IPs and...
Hi @HANDL_Eric , The understanding is correct. The firewall will match
the 5 tuple entry and then look at the UTM part of the policy. Having
said that, you could have multiple application signatures within one
profile. For instance, if you have the T...