All systems are operational
Scheduled Maintenance
[SEWAN] Technical maintenance - 13.01.2026

Beginning: 13.01.2026 – 10.00 PM

Ending: 14.01.2026 – 03.00 AM

 

Impact: Few packet loss and SSL-VPN disconnection while switchover.

 

Dear Customer, Dear Partner,

 

Please be informed that our technical team will perform maintenance on firewalls cluster 3.

During the two scheduled nights, you may experience brief packet loss and temporary SSL-VPN disconnections during the switchover.

No action is required on your side.

 

Thank you for your understanding.

 

Best regards;

 

SEWAN Technical Team

Past Incidents

Thursday 22nd February 2024

[SEWAN] Technical maintenance - 22.02.2024 1.00AM and 23.02.2024 1.00AM, scheduled 1 year ago

Beginning: 22.02.2024 – 01.00 AM

Ending: 23.02.2024 – 02.00 AM

Internal ref: DTCAB-4753

Impact: possible packetloss for a few seconds  

 

Dear customer, dear partner,

 

Please note that our technical team will be performing maintenance on 22.02.2024 01.00AM and 23.02.2024 01.00AM. The aim is to increase our Internet bandwidth. During the first intervention, we will route internet traffic to other datacenters and isolate our main router. The switch back will be performed during the second intervention. Some packet loss may occur at these times.

 

No intervention is needed from your side.

   

Best regards;

SEWAN Technical Team

Thursday 15th February 2024

No incidents reported

Wednesday 14th February 2024

No incidents reported

Tuesday 13th February 2024

No incidents reported

Monday 12th February 2024

[SEWAN] Technical maintenance - 09/02 to 11/02, scheduled 1 year ago

Dear Partner,

 

a Fortinet OS security breach has been detected in our Fortinet Firewall platforms concerning the SSL-VPN. This is an "N-Day" vunerability, i.e. a global and major breach that impacts all customers on a very large number of deployed versions. Fortinet has issued a statement on the subject, on a dedicated page.

 

What does this mean? The detected breach is a vulnerability in the Firewall SSL VPN process, enabling a potential attacker (a Hacker) to execute unauthorized code or commands in the system. How does Sewan react to this vulnerability? As soon as the breach was detected, the security teams in Sewan's Technical Department took Fortinet's actions into account and planned an update of all OS versions deployed among Sewan's partners and customers.

 

We recommend that you temporarily disable SSL VPN on your Fortinet interface while our teams perform the upgrade.

 

Update planning :

• Cluster 1 : 09/02/2024 PM

• Cluster 2 : 11/02/2024 PM

• Cluster 3 : 11/02/2024 PM

• Cluster 4 : 09/02/2024 PM

• Cluster 6 : 11/02/2024 PM

• Cluster 7 : 11/02/2024 PM

• Cluster 8 : 09/02/2024 PM

• Cluster HDS : 09/02/2024 PM

This should only cause a small cut, in the worst case.

 

We remain at your disposal for any further information.

 

Sewan Technical Team

Sunday 11th February 2024

No incidents reported

Saturday 10th February 2024

No incidents reported

Friday 9th February 2024

No incidents reported

Thursday 8th February 2024

No incidents reported

Wednesday 7th February 2024

No incidents reported

Tuesday 6th February 2024

No incidents reported

Monday 5th February 2024

No incidents reported

Sunday 4th February 2024

No incidents reported

Saturday 3rd February 2024

No incidents reported

Friday 2nd February 2024

No incidents reported

Thursday 1st February 2024

No incidents reported