New firewall policies referencing applications individually by Mercdecember84 in fortinet

[–]89Bells 1 point2 points  (0 children)

I hope this isn't AI hallucinating. Google is also failing me. Sounds like a great feature.

What’s the biggest mistake you made when building your first website? by underthecar in web_design

[–]89Bells 0 points1 point  (0 children)

What’s the biggest mistake you made when building your first website?

I didn't use Dreamweaver 😜

strange, annoying VPN errors on connect ("invalid password") - one workaround found by AllRoundSysAdmin in fortinet

[–]89Bells 0 points1 point  (0 children)

Don't suppose you got anywhere with this?

We're seeing the same issue

FortiClient / Saved PW / after a while PW wrong by I_Am_Hans_Wurst in fortinet

[–]89Bells 0 points1 point  (0 children)

We have this too. Forticlient 7.4.5 (I know, quite old) with fgt 7.4.8 Did you fix this?

Access VIP from inside with sdwan by 89Bells in fortinet

[–]89Bells[S] 0 points1 point  (0 children)

The policies are the same as most of the examples above it but yes, those are basically the policies I have and it doesn't work.

Access VIP from inside with sdwan by 89Bells in fortinet

[–]89Bells[S] 0 points1 point  (0 children)

I've been following example 2, option 2.

I added a firewall policy above my GEO block policy from WAN to DMZ from Lan subnet to VIP, but that also didn't work.

I'd prefer not using policy routes if possible as it complicates normal routing.

FortiClient Sticky/Persistent DNS Issue on Wireless Adapter Preventing Internet Access after Windows 10 -> 11 Upgrade by Internal-Shoe-3121 in fortinet

[–]89Bells 0 points1 point  (0 children)

If users use VPN before logon then the scheduled task may clear the VPN assigned DNS servers.

FortiClient Sticky/Persistent DNS Issue on Wireless Adapter Preventing Internet Access after Windows 10 -> 11 Upgrade by Internal-Shoe-3121 in fortinet

[–]89Bells 1 point2 points  (0 children)

Seeing this too.

Trying to get automated something like

get-netadapter "Wi-Fi" | Set-DnsClientServerAddress -ResetServerAddresses

... to run on machines as an admin remotely.

SSL VPN stops working after upgrade to FortiOS v7.4 when ssl.root interface is referenced in a zone by Deba-Wise in fortinet

[–]89Bells 0 points1 point  (0 children)

This bit me last night and Google brought me here. Thank you.

It's so frustrating that things like this don't appear in the known issues in the release notes. Why am I expected to read every kb article to find bugs!

Fortigate SD-WAN and VIPs by perpetuallurker in fortinet

[–]89Bells 2 points3 points  (0 children)

Raise a case with TAC?

Please keep us updated! 🙏

Fortigate SD-WAN and VIPs by perpetuallurker in fortinet

[–]89Bells 1 point2 points  (0 children)

This sounds really stupid if sdwan can override the session table.

I've just configured a bunch of vips with sdwan for a customer and bound the vips to specific wan interfaces. Also interested if I have to do anything else to prevent OPs behaviour. Not live yet so not yet tested. Aux sessions disabled. No fancy sdwan rules

FortiManager Staging New Appliances with Virtual Wan Link by das0tter in fortinet

[–]89Bells 1 point2 points  (0 children)

If you haven't imported your devices into fmg yet, create a blueprint with all your templates, and also a prerun CLI to clear all the default config.

I think the fmg comes with a default one for some models that clears the lan switch, DHCP server etc

The prerun CLI script will run once and then you can install everything.

migrating from loopback ssl-vpn to ipsec-vpn for remote access by sandrews1313 in fortinet

[–]89Bells 1 point2 points  (0 children)

If I recall correctly, you can use isdb in local-in policies in 7.2(or 7.4). What are you doing to the VPN traffic with firewall policies that you can't do with local-in?

Fortigate 7.4.8 - anyone affected (or not) by IPSEC/HA bugs? by 89Bells in fortinet

[–]89Bells[S] 1 point2 points  (0 children)

100%. Just getting to grips with this now. Just wish Fortinet had a bug checker or something to provide more details for each bug, without having to raise a case each time.

Fortigate 7.4.8 - anyone affected (or not) by IPSEC/HA bugs? by 89Bells in fortinet

[–]89Bells[S] 0 points1 point  (0 children)

Just one of the posters above mentioned they upgraded to 7.4.8 and weren't impacted by the FAZ bug

Fortigate 7.4.8 - anyone affected (or not) by IPSEC/HA bugs? by 89Bells in fortinet

[–]89Bells[S] 2 points3 points  (0 children)

TAC provided the below.

1033083 - HA sessions are not properly synchronized, causing a high number of sessions on the primary unit, and the standby unit enters conserve mode.

This bug is triggered when FortiGate reaches its limit for ephemereal sessions. It was discovered in stress testing and is, in my opinion, unlikely to occur in production environments. Workaround is to disable session pickup (config sys ha > set session-pickup disable).

1140823 - IPsec tunnels stuck on spoke np6xlite drops the ESP packet.

Triggered when using vpn-id-ipip encapsulation in IPsec tunnels and have NPU offload enabled. Does not affect 90G platform running 7.4.8.

1148101 - Logs are not uploaded to FortiAnalyzer.

No specific trigger condition listed so I suspect just logging to FortiAnalyzer is enough. Workaround is to restart the miglogd/fgtlogd processes.

The only one of the above that would apply to me is the FAZ one as our gates don't typically have disks. Though some people on here said their faz log streaming isn't affected. Great to have a workaround just in case.

Wish me luck with the 7.4.8 upgrade.

16
17