Description This article describes how to securely encrypt and
authenticate HA traffic Scope 7.4.2+ GA Releases. Solution Consider a
scenario where a network administrator has the following topology: There
is an HA cluster which consists of two units...
Description This article describes the capability of FortiOS to check if
there is an existing session established with an IP that now belongs to
the External Threat Feed list. Scope FortiGate v7.2.1+ Solution Let's
assume a network administrator is m...
Description This article describes the capabilities of VRF0. Scope
FortiGate v6.x and v7.x. Solution FortiGate has been configured with one
physical interface 'port3' which belongs to the default VRF and one
loopback named 'loopback_Test' on VRF 1. T...
Description This article describes how to identify the root cause of an
hasync high CPU utilization. Scope FortiGate v6.x and v7.x. Solution
Let's assume a network administrator identifies that his device has high
CPU usage on one of its CPU cores. B...
Description This article describes how to configure the OSPF settings in
order to configure a deterministic desired path. Scope FortiGate v6.x
and v7.x. Solution Let's assume a network administrator has configured
the below topology: The goal is to r...