<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1532920267188739518</atom:id><lastBuildDate>Thu, 09 Apr 2026 06:15:31 +0000</lastBuildDate><category>fortigate</category><category>software</category><category>fortios</category><category>CLI</category><category>fortimanager</category><category>fortianalyzer</category><category>potential bugs</category><category>troubleshooting</category><category>tips+tricks</category><category>fortimail</category><category>configuration examples</category><category>debug</category><category>forticlient</category><category>VPN</category><category>fortiweb</category><category>gui</category><category>fortidb</category><category>firmware updates</category><category>ipsec</category><category>access lists</category><category>dynamic routing</category><category>fortiap</category><category>fortigate-one</category><category>hardware</category><category>interface mode</category><category>ipv6</category><category>SSL VPN</category><category>application control</category><category>cloud</category><category>don&#39;t try this at home</category><category>experimental</category><category>forticarrier</category><category>fortiscan</category><category>fortiswitch</category><category>fortivm</category><category>links</category><category>new features</category><category>ospf</category><category>performance</category><category>review</category><category>shortcuts</category><category>totally obvious things</category><title>Firewall Guru</title><description>A real world resource for Fortinet firewalls including How-Tos and Frequently Asked Questions</description><link>http://firewallguru.blogspot.com/</link><managingEditor>noreply@blogger.com (Sebastian)</managingEditor><generator>Blogger</generator><openSearch:totalResults>207</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-5312771380009131683</guid><pubDate>Mon, 13 Jun 2022 20:29:00 +0000</pubDate><atom:updated>2022-06-13T15:29:03.947-05:00</atom:updated><title>FortiClient - RSA New Pin Is Wrong (-7201) error</title><atom:summary type="text">This message is somewhat misleading.One of our users was attempting to login to the VPN and their Active Directory password had expired.When they tried to follow the steps to enter their new password they received the above error message.The root cause was that the new password they were trying to use did not meet the Active Directory password complexity requirements.So while the error message </atom:summary><link>http://firewallguru.blogspot.com/2022/06/forticlient-rsa-new-pin-is-wrong-7201.html</link><author>noreply@blogger.com (Sebastian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi79nVXUqYej2CIngcN8eRwfAp6qqljJYAwk_PjGZ7pmo543KRZ_rXiESy2ZkipU4IGN8F9lFRfGm_YSKtXRwiB5rp8aQG2gOWxf3NPJMt7zZNUM54fB52qAtDieg3Zsgcdi1DRaWQADoS4WJyaU4KPl6GL36jPBqjfXubnAuW42Fk1Xo_PGh926ULZ/s72-c/ac862fd86d574d059e632916a7da77ec.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-6239415988207727760</guid><pubDate>Thu, 24 Mar 2022 03:14:00 +0000</pubDate><atom:updated>2022-03-23T22:14:07.614-05:00</atom:updated><title>Problems with FortiClient 7.0.2 and Firefox</title><atom:summary type="text">&amp;nbsp;We noticed during recent testing that FortiClient 7.0.2 has an issue with Firefox, specifically any Google services such as Google Search and GMail.While web-filtering was enabled on the client an initial access to Google would work in Firefox, however after a minute or so nothing would happen when trying to refresh the browser session.The root cause appears to be related to 0RTT (Zero </atom:summary><link>http://firewallguru.blogspot.com/2022/03/problems-with-forticlient-702-and.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-2821461467749624593</guid><pubDate>Wed, 02 Sep 2020 21:21:00 +0000</pubDate><atom:updated>2020-09-02T16:21:11.920-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cloud</category><category domain="http://www.blogger.com/atom/ns#">debug</category><category domain="http://www.blogger.com/atom/ns#">forticlient</category><category domain="http://www.blogger.com/atom/ns#">gui</category><category domain="http://www.blogger.com/atom/ns#">potential bugs</category><title>FortiClient EMS Cloud Login Problem - Solved</title><atom:summary type="text">&amp;nbsp;I noticed today that when you logout from your cloud based FortiClient EMS instance and then try to login again you receive the following error message in Firefox:{&quot;result&quot;: {&quot;retval&quot;: 0, &quot;message&quot;: &quot;Local signin is not available in EMS Cloud&quot;}}&amp;nbsp;&amp;nbsp;It appears to be a cookie related issue in Firefox. When I delete any cookies in the browser referencing &quot;forticlient&quot; I am able to </atom:summary><link>http://firewallguru.blogspot.com/2020/09/forticlient-ems-cloud-login-problem.html</link><author>noreply@blogger.com (Sebastian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs0UzOMp7tJ4GTUONfkgKvAFamO8pybQY9ag_Vl0p0kM97vCLCMwGx0SJNw5srwwpixlZXpui13wS7HQDB-FPHZpYSbRFPiS64ouBeYsNpd5kdSZKg4P_ulEIBeAKPVGTsrWbM0xqFrYU/s72-c/Screenshot_2.png" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-2931824185316942120</guid><pubDate>Thu, 23 Aug 2018 19:38:00 +0000</pubDate><atom:updated>2018-08-23T14:40:06.342-05:00</atom:updated><title>Beware - Upgrade to FortiOS 5.6.3+ with IPSec VPNs</title><atom:summary type="text">If you are upgrading from version 5.4.5, 5.4.6, or 5.4.7 to FortiOS 5.6.3, the IPsec phase1 psksecret setting might be lost. To avoid this, upgrade to FortiOS 5.6.2 and then to 5.6.3. If the psksecret setting is lost, you will need to reconfigure it after upgrading.

Even if you have saved configs you will need to reset the passwords since FortiOS 5.6.3 will not allow you to paste the encrypted </atom:summary><link>http://firewallguru.blogspot.com/2018/08/beware-upgrade-to-fortios-563-with.html</link><author>noreply@blogger.com (Sebastian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpuMu7UBkrbIU0YA5d7ydqRne-ZZ2FG6KztmMvr6tgQ6YE41wIDz-R-eTtePMCTdHZbSkDZWGEzz0hYrhyjZ3ZtGISGVIV1zLL7SquaKd9R_JzBqen6pdnBdXYZ9rIXYxMKYtn3bbO3Fg/s72-c/Screenshot_1.png" height="72" width="72"/><thr:total>23</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-2550810785987995989</guid><pubDate>Thu, 29 Dec 2016 20:58:00 +0000</pubDate><atom:updated>2016-12-29T14:58:38.564-06:00</atom:updated><title>Cisco ASA to Fortigate conversion</title><atom:summary type="text">I&#39;m getting ready to migrate a number of Cisco ASA firewalls to Fortigate.
Fortinet sells a ~$4000 license for their FortiConverter which I didn&#39;t want to spend.

My goal was to automate the conversion of objects which will save time and virtually eliminate the possibility of typos.

The below perl script is what I came up with.

-Syntax: &quot;perl converter.pl &amp;lt;ASA config file name&amp;gt;&quot; (e.g. &quot;</atom:summary><link>http://firewallguru.blogspot.com/2016/12/cisco-asa-to-fortigate-conversion.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>16</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-4350056212860214926</guid><pubDate>Thu, 29 Dec 2016 19:39:00 +0000</pubDate><atom:updated>2016-12-29T13:41:08.700-06:00</atom:updated><title>How-to: Automatically revert a config on a FortiGate </title><atom:summary type="text">
There&#39;s nothing worse than remotely configuring a firewall and then 
loosing access once you&#39;ve made your changes. Having a failsafe 
mechanism in place to revert to a previous config automatically will 
help you minimise potential issues and save you alot of stress! Luckily FortiOS gives you a few options on how to save your running 
config which we&#39;ll discuss below.

We&#39;ll go through each of </atom:summary><link>http://firewallguru.blogspot.com/2016/12/how-to-automatically-revert-config-on.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-5525203452843719716</guid><pubDate>Thu, 01 Oct 2015 20:24:00 +0000</pubDate><atom:updated>2015-10-01T15:24:17.020-05:00</atom:updated><title>HA Console authentication when using remote Auth</title><atom:summary type="text">When you login to the CLI via a RADIUS or TACACS account and you then use &quot;exec ha manage 1&quot; to manage the subordinate unit you have to re-enter your user credentials.
I remember seeing this in my TAM days. I&#39;ll submit a feature request to have the authentication carried over.</atom:summary><link>http://firewallguru.blogspot.com/2015/10/ha-console-authentication-when-using.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-2925575528919665494</guid><pubDate>Fri, 21 Aug 2015 15:37:00 +0000</pubDate><atom:updated>2015-08-21T10:37:05.590-05:00</atom:updated><title>Disable SSL VPN Portal</title><atom:summary type="text">Here&#39;s one for the serious customizer.
If you are wanting to only accept IPSEC VPN connections via FortiClient and you don&#39;t want/need the SSL VPN portal here&#39;s the CLI config for turning off the SSL VPN page.

config vpn ssl settings
 set sslvpn-enable disable
end 
</atom:summary><link>http://firewallguru.blogspot.com/2015/08/disable-ssl-vpn-portal.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-431461926922524994</guid><pubDate>Wed, 19 Aug 2015 16:14:00 +0000</pubDate><atom:updated>2015-08-19T11:14:40.708-05:00</atom:updated><title></title><atom:summary type="text">Wow .. it&#39;s been a while :)
Haven&#39;t worked at Fortinet since January of this year. But my new gig just invested in Fortinet equipment. So stay tuned for new posts!</atom:summary><link>http://firewallguru.blogspot.com/2015/08/wow.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-8381485651944340501</guid><pubDate>Mon, 03 Nov 2014 23:12:00 +0000</pubDate><atom:updated>2014-11-03T17:12:09.559-06:00</atom:updated><title>HA with different revision hardware</title><atom:summary type="text">There may come a time when you have rev.1 and rev.2 hardware of a particular platform that you&#39;re trying to form an HA cluster with. To successfully accomplish this you need to tell the firewall to ignore the difference in hardware revision.

In FortiOS 4.3 and earlier:
config system global
set ignore-hardware-revision enable
end 

In FortiOS 5.0 and later:
exec ha ignore-hardware-revision enable</atom:summary><link>http://firewallguru.blogspot.com/2014/11/ha-with-different-revision-hardware.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-5918543709856132190</guid><pubDate>Thu, 25 Sep 2014 21:47:00 +0000</pubDate><atom:updated>2014-09-25T16:47:34.318-05:00</atom:updated><title>More Shellshock Info</title><atom:summary type="text">
FortiGuard Advisory with status of affected products

FortiGuard Shellshock Blog Post</atom:summary><link>http://firewallguru.blogspot.com/2014/09/more-shellshock-info.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-6046364219741445872</guid><pubDate>Thu, 25 Sep 2014 15:44:00 +0000</pubDate><atom:updated>2014-09-25T10:44:38.018-05:00</atom:updated><title>Bash Vulnerability Signatures</title><atom:summary type="text">The newly announced Bash / Shellshock vulnerability is document in CVE2014-6271.

Here are IPS rules for immediate manual deployment. Fortinet has already generated
a new IPS signature, Bash.Function.Definitions.Remote.Code.Execution, which will be released in the next few hours after it has passed the QA testing process.

Fortigate firewalls do NOT use Bash and are not vulnerable to this exploit</atom:summary><link>http://firewallguru.blogspot.com/2014/09/bash-vulnerability-signatures.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-8529560756358184575</guid><pubDate>Mon, 15 Sep 2014 15:39:00 +0000</pubDate><atom:updated>2014-09-15T10:40:13.233-05:00</atom:updated><title>Switching interface modes</title><atom:summary type="text">By default smaller Fortigate units such as the 60D or 90D series combine their interfaces into a virtual switch. Via a configuration change all ports can be assigned to their own broadcast domains. This is useful for example if you want to configure a number of different trunk ports.

By default the firewalls are also configured with basic policies that permit and NAT outbound traffic as well as </atom:summary><link>http://firewallguru.blogspot.com/2014/09/switching-interface-modes.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-8079060183132098009</guid><pubDate>Wed, 27 Aug 2014 18:57:00 +0000</pubDate><atom:updated>2014-08-27T13:57:14.697-05:00</atom:updated><title>Silence of the Local Broadcasts</title><atom:summary type="text">When setting up a new FortiGate you tend to receive a lot of logs for traffic destined to 255.255.255.255 (aka the global broadcast address) or x.x.x.255 (your local subnet broadcast address). To reduce clutter and have the firewall drop these broadcasts silently use:

FortiAnalyzer:
config log fortianalyzer filter&amp;nbsp;&amp;nbsp;&amp;nbsp; set local-traffic disableend

Log Disk
config log disk filter </atom:summary><link>http://firewallguru.blogspot.com/2014/08/silence-of-local-broadcasts.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-9018177547882359456</guid><pubDate>Tue, 29 Jul 2014 18:42:00 +0000</pubDate><atom:updated>2014-07-29T13:43:09.097-05:00</atom:updated><title>New Feature Highlight: Dedicated Management CPU</title><atom:summary type="text">In FortiOS 5.2 and higher you can dedicate one of the CPUs for management access, in other words GUI and CLI access. If the system is running under extremely high loads this will guarantee access to management functions.

This feature is available in 2U firewalls and blades only that have multiple CPUs.

To enable this feature (default disabled):

conf system npu&amp;nbsp;&amp;nbsp;&amp;nbsp; set </atom:summary><link>http://firewallguru.blogspot.com/2014/07/new-feature-highlight-dedicated.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-6105653845994740639</guid><pubDate>Mon, 21 Jul 2014 14:26:00 +0000</pubDate><atom:updated>2014-07-21T09:26:50.607-05:00</atom:updated><title>Fortinet Diagnostic WIKI</title><atom:summary type="text">Very useful resource for diagnostic commands.

http://wiki.diagnose.fortinet.com:1080/index.php/Overview</atom:summary><link>http://firewallguru.blogspot.com/2014/07/fortinet-diagnostic-wiki.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-7153786563664434551</guid><pubDate>Thu, 15 May 2014 19:18:00 +0000</pubDate><atom:updated>2014-05-15T14:23:04.323-05:00</atom:updated><title>Exporting a local certificate with private key</title><atom:summary type="text">If you have a local certificate on the Fortigate and the original 
certificate request (csr) was generated on the Fortigate then the 
private key resides on the Fortigate and you need to export this in 
order to install your signed certificate on another server.
The problem with the Fortigate certificate export feature is that it 
will only export the signed certificate (which you likely already </atom:summary><link>http://firewallguru.blogspot.com/2014/05/exporting-local-certificate-with.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-5667902103792230186</guid><pubDate>Fri, 11 Apr 2014 21:15:00 +0000</pubDate><atom:updated>2014-04-11T16:19:48.969-05:00</atom:updated><title>Heartbleed - Part 3</title><atom:summary type="text">Anyone running FortiOS 5.0 GA to 5.0.6 can protect the firewall itself by


limiting access to the firewall&#39;s Admin interface using &quot;Trusted Hosts&quot; in the Admin profiles

or

&amp;nbsp;configuring an interface policy as per below


config firewall interface-policy

    edit 1
        set interface &quot;wan1&quot;
        set srcaddr &quot;all&quot;
        set dstaddr &quot;all&quot;
        set service &quot;HTTPS&quot;
        set </atom:summary><link>http://firewallguru.blogspot.com/2014/04/heartbleed-part-3.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-6841989905614835998</guid><pubDate>Wed, 09 Apr 2014 15:41:00 +0000</pubDate><atom:updated>2014-04-09T10:41:32.623-05:00</atom:updated><title>Heartbleed - Part 2</title><atom:summary type="text">Here is some more information from FortiGuard
http://www.fortiguard.com/advisory/FG-IR-14-011/</atom:summary><link>http://firewallguru.blogspot.com/2014/04/heartbleed-part-2.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-9009628867785926627</guid><pubDate>Tue, 08 Apr 2014 18:51:00 +0000</pubDate><atom:updated>2014-04-08T13:52:55.923-05:00</atom:updated><title>Exporting firewall rules to a CSV</title><atom:summary type="text">Sometimes it can be useful to export and analyze rules in a CSV type format. This comes in especially handy when working with long and complex firewall policies.

I came across the perl script below that takes firewall policies from a text file and performs the CSV conversion for you.

Syntax: csvparse.pl rules.txt

&amp;lt;rules.txt&amp;gt; should be in the following format:

config firewall policy
</atom:summary><link>http://firewallguru.blogspot.com/2014/04/exporting-firewall-rules-to-csv.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>24</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-6233674409672906870</guid><pubDate>Tue, 08 Apr 2014 15:48:00 +0000</pubDate><atom:updated>2014-04-08T10:53:55.262-05:00</atom:updated><title>Heartbleed OpenSSL Vulnerability</title><atom:summary type="text">You can use the following custom IPS signature to detect and block the recently disclosed OpenSSL &quot;Heartbleed&quot; vulnerability.


F-SBID( --name &quot;OpenSSL.TLS.Heartbeat.Information.Disclosure&quot;; --protocol tcp;&amp;nbsp; --flow from_client; --service SSL; --pattern &quot;|18|&quot;; --context packet; --within 1,context; --byte_test 2,&amp;gt;,255,2,relative; )
More information about the vulnerability can be found here</atom:summary><link>http://firewallguru.blogspot.com/2014/04/heartbleed-openssl-vulnerability.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-2787594621534727898</guid><pubDate>Tue, 18 Mar 2014 19:12:00 +0000</pubDate><atom:updated>2014-03-18T14:12:43.947-05:00</atom:updated><title>FortiAuthenticator SCEP</title><atom:summary type="text">You can use SCEP to auto-enroll devices in FortiAuthenticator as well as retrieve CRLs. When configuring this on a firewall or other device the correct URL to use is:

http://&amp;lt;fortiauth IP&amp;gt;/cert/scep

I have asked the technical documentation team to add this to the FortiAuthenticator Admin Guide.</atom:summary><link>http://firewallguru.blogspot.com/2014/03/fortiauthenticator-scep.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-8658447476107909345</guid><pubDate>Fri, 14 Mar 2014 14:20:00 +0000</pubDate><atom:updated>2014-09-15T13:38:37.905-05:00</atom:updated><title>Logging DNS Requests</title><atom:summary type="text">When inspecting DNS traffic it can be useful to log the domain names that are part of the DNS request. In order to accomplish this you can use a custom IPS signature:


IPS
Custom Signature: F-SBID( --attack_id 4153; --name DOM-ALL; --protocol udp;
--service dns; --log DNS_QUERY;)


The signature below allows you to search for and prevent DNS lookups for a specified domain, in this example </atom:summary><link>http://firewallguru.blogspot.com/2014/03/logging-dns-requests.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-2536958424399741898</guid><pubDate>Wed, 05 Mar 2014 18:44:00 +0000</pubDate><atom:updated>2014-03-20T15:22:48.245-05:00</atom:updated><title>Deleting VDOMs</title><atom:summary type="text">VDOMs have quite a number of dependencies that need to be deleted before you can get rid of the VDOM itself. Below is a useful little script that goes through all the sections and purges them so the VDOM can be deleted. Adjust it as needed.

## This script needs to be run interactively. In other words you cannot copy and paste the whole script. You have to acknowledge each purge command. 
## </atom:summary><link>http://firewallguru.blogspot.com/2014/03/deleting-vdoms.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1532920267188739518.post-5243408322303453431</guid><pubDate>Thu, 27 Feb 2014 18:15:00 +0000</pubDate><atom:updated>2014-02-27T12:16:30.233-06:00</atom:updated><title>Replacing firewall hardware which is logging to a FortiAnalyzer</title><atom:summary type="text">When you replace firewall hardware that&#39;s reporting into a FortiAnalyzer due to an RMA or other failure it&#39;s important to make sure you update FortiAnalyzer with the new serial number of the device. Use the following command on the FAZ:

execute device replace &amp;lt;old serial number&amp;gt; &amp;lt;name&amp;gt; &amp;lt;new serial number&amp;gt;</atom:summary><link>http://firewallguru.blogspot.com/2014/02/replacing-firewall-hardware-and.html</link><author>noreply@blogger.com (Sebastian)</author><thr:total>0</thr:total></item></channel></rss>