how to configure a local-in policy on a HA reserved management interface. Scope Administrators can configure a local-in policy through the CLI with various services and source and destination addresses to have precise control over the specific traffic heading towards FortiGate interfaces.Firewal...| community.fortinet.com
I am attempting to setup an ipsec Ikev2 VPN using the Windows Native Client. The attempt to connect fails immediately with the "IKE authentication credentials are unacceptable" error. I have found this article: https://community.fortinet.com/t5/FortiGate/Technical-Tip-IKE-authentication-credential...| community.fortinet.com
Hi, I’m trying to use FortiAnalyzer (FAZ) to monitor IPsec tunnel down events in a large-scale SD-WAN. Event Handlers are in place and SMTP email alerts are configured, but I’m seeing: IPsec down events don’t always generate alerts. FAZ is at HQ. When the branch-to-HQ IPsec tunnel drops, FAZ d...| community.fortinet.com
Hi FNAC admins and It seems on FortiNAC-F 7.4 and 7.6 (didn't test on 7.2), when doing enter-shell the user admin can't do sudo. Is there a special way to do that or has it just been removed?| community.fortinet.com
Hi, Which Firewall model is recommended for an average organisation for the user counts mentioned below with NGFW capabilities? 250-500 users 500-750 users 750-1000 users Thanks in advance| community.fortinet.com
The community is a place to collaborate, share insights and experiences, and get answers to questions.| community.fortinet.com
and itemizes key credentials to maintain in order to assure strong security best practices. Administrators are advised to periodically refresh these credentials, in addition to giving particular attention in any event where an organization may need to give heightened attention to security. It is str...| community.fortinet.com
the standard procedure to format a FortiGate Hard Disk, which is used for logging purposes.If the procedure fails, refer to this article. Scope FortiGate (all versions). Solution Note 1: If necessary, consider performing a backup of logs before formatting (see details below). Note 2: In an HA ...| community.fortinet.com
This article explains how to verify the checksum of firmware which has been downloaded from the Customer Service and Support web portal.The download section provides a means to obtain firmware images and also retrieve firmware image checksums. Scope Firmware download. Solution The integrity of a...| community.fortinet.com
the steps to take when there is evidence of compromised device integrity on the Fortinet devices. It’s possible that a device may become corrupted, for example due to power issues, abrupt turn-off, or maybe environmental anomalies, or in some cases of malicious activity. In such cases it is import...| community.fortinet.com