Most Liked Posts Recent Solutions
No Content Available

User Activity

Hi guys, Am I correct in saying that application control (or all security profiles for that matter) are not involved in the policy matching process in FortiOS. Once a policy is matched via source, destination, port or time, the security profiles of t...
Hi all, I have observed that when using the creating 2 custom services using the same port number, the firewall will recognise that port number globally with only one of the custom services, therefore if anything else arrives on at a policy on that p...
Hi all, I have never actually tried to configure email filtering on the FGT itself and was wondering if anyone had any experience in the following: a) is it any good? b) can you use the file quarantine for AV to quarantine emails? - if so can end use...
Hi guys, What are the advantages of having three boxes operating in HA? Would it be more efficient to upgrade from 2 x HA firewalls running A-P to a bigger box in HA or to add an additional box to the existing cluster? Essentially, 1000 users behind ...
Hi, A customer has a suspicious user that is visiting inappropriate websites during working hours - I have figured out the IP and the customer would like to know when that IP accesses the LAN as so they can ' catch' the user. Is there a way that you ...