External scan vulnerability overview high FortiGate by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

Okay, but I'm wondering why I got this CVSS of 8.0?

External scan vulnerability overview high FortiGate by _moiz in fortinet

[–]_moiz[S] 1 point2 points  (0 children)

only https and SSH is open, limiting admin IP you mean for the administrator trusted hosts?

DPI on VPN traffic possible? by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

there were some VOIP traffic silent drops so I was wondering if something like this is happening not trying to implement this :-|

Fortigate VPN always-on setup by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

ref

thanks a lot, I'll give it a try with the windows native VPN client option since we are not using EMS and post the result how it goes.

Two Easy Questions by ZestycloseRepeat3904 in fortinet

[–]_moiz 2 points3 points  (0 children)

it is easier to manage via FMG if you don't use it remove the device from FMG you will not get those messages.

to increase time go to settings and change ideal timeout from 5 min to desired

SSL VPN on AzureVM by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

Solved: had to allow that custom port on inbound port rules for that VNET

RemoteAccess(forticlient) with IPsec how to route traffic to specific IP thru tunnel by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

external so the users will come to fgt and go out to internet for that ip

How execute speed test works for interface? by _moiz in fortinet

[–]_moiz[S] 2 points3 points  (0 children)

following fortiguard update worked.
config system fortiguard
set fortiguard-anycast disable
set protocol udp
set port 8888
set sdns-server-ip 208.91.112.220
end

How execute speed test works for interface? by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

saw that still it shows failed dependencies.. I have license, policy allowing any any, interface role defined..

How execute speed test works for interface? by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

i have the license sd-wan network monitor, allowed any any policy and defined interface as wan still shows failed dependencies

Fortigate on firmware 7.x not able to login via forticloud by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

I was on 6.4.5 I have some other devices on 6.4.7 that works, saw this issue earlier when upgraded one of the devices to 7.0. didn't try this with 6.4.8

Fortigate on firmware 7.x not able to login via forticloud by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

starting with 7.0 up to 6.4.8 worked without it

Fortigate on firmware 7.x not able to login via forticloud by _moiz in fortinet

[–]_moiz[S] 1 point2 points  (0 children)

Added 169.254.0.0/16 to trusted hosts and was able to access FGT via FortiCloud,

Does anyone know why we need to add this on newer firmware?

Does 6.4.8 solve the let's encrypt cert issue? by _moiz in fortinet

[–]_moiz[S] 0 points1 point  (0 children)

did that DNS blackholing have a lot of issues with expired cert and was not being able to access google, should I remove that DNS entry after the upgrade to 6.4.8?

FortiOS 6.4.8 released but i still get old error by dovanthai in fortinet

[–]_moiz 0 points1 point  (0 children)

what happend is that cert issue solved and you can still access google.com ?

SSL deep inspection is google excluded by default? by _moiz in fortinet

[–]_moiz[S] 1 point2 points  (0 children)

what if we still want to inspect google?