Spoiler alert: Current FortiOS versions do not allow BGP blackhole routing. But we have a workaround ready for you.
Spoiler alert: Current FortiOS versions do not allow BGP blackhole routing. But we have a workaround ready for you.
Fortinet has released FortiOS 7.6.3 on April 17th. There are a lot of resovled issues but again another feature was completely removed. After the SSLVPN (tunnel- and web-mode) has been completely removed on models with only 2GB RAM and the small G models, now SSLVPN tunnel-mode has been removed on…
Einleitung One-Arm-Installation bedürfen einem speziellen Augenmerk, insbesondere wenn es um den Redirect vom Traffic geht – also Traffic, der über das gleiche logische Interface rausgeschickt wird, wo er auch reingekommen ist. Auf der Fortigate wird der Redirect Traffic per default erlaubt, so dass der Traffic ohne weitere Prüfung durch die…
In the last few days, Fortinet has sent an email message to a wide audience of FortiGate Cloud customers. The subject of the message is “Important: Upcoming FortiGate Cloud FortiGate Firmware Upgrade Policy Change” . In this article you will find the most important facts and information. The FortiGate Cloud…
We have updated our CheatSheet for the FortiAnalyzer/FortiManager to the OS version 7.4. We still have the divided sections for FortiAnalyzer Logging, FortiAnalyzer Reporting and FortiManager with all of our regularly used commands and some CLI-based debug examples that are also featured in the official training materials. We hope that…
In this article, we want to point out some indicators used to determine if your FortiGate is under attack.
Last update: 29. January 2025 In our daily support work we often see FortiGates in use on which the basic settings like time zone, host name and so on have never been set correctly. Therefore we would like to provide you with a small guide on this page, with which…
Do you have FortiSwitches that do not accept configuration changes made on the FortiGate switch controller? Also, when you run the CLI command ‘execute switch-controller get-conn-status’, do you see the ‘flag’ with a value of ‘E’?
… or accessed from any unauthorized party. In some cases it’s not even necessary to hack a system to gain access to it. For example it may be enough to leak a configuration file to allow unauthorized system access. Fortunately, many cases of a suspected hack turn out to be…
When configuring the Border Gateway Protocol (BGP) Router, you may encounter issues where dynamic routing doesn’t work as expected due to configuration problems. This article provides a handy set of troubleshooting commands to address these issues effectively.