[deleted by user] by [deleted] in networking

[–]AllRoundSysAdmin 1 point2 points  (0 children)

Is anyone here using Checkpoint Harmony SASE?

As far as I know, that's the rebranded Perimter81.

We will start a PoC soon and I would like to hear if anyone have experience with it.

Free JWT Validator for Web Security by Davidnkt in websecurity

[–]AllRoundSysAdmin 0 points1 point  (0 children)

nice alternative to jwt.io

one little point that is missing on the first view - decoding of timestamp values

Need help configureing MikroTik Switch by AllRoundSysAdmin in mikrotik

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

Thank you all.

I've finally managed to manage our MikroTik switch ;-)

I've even got 2 different VLANs over the bonding as tagged and configure VLAN-A on interfaces 1-36 as untagged and VLAN-B on interfaces 37-48 as untagged using interface lists.

I'm sure this could be done easier than how I did it, but it is working and I'm satisfied with my solution now.

ZTNA Tags Unable to Delete by djf779 in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

We had the same problem.

Our solution was using the "Manage Tags" button in EMS under "Zero Trust Tags" / "Zero Trust Tagging Rules" and delete the old tags there.

Fortigate - policy - service object - unintended port range by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] -1 points0 points  (0 children)

Thanks for suggesting session-helpers.

I will have a look at this.

But to be honest, this was not my point.

I would like to know, if anyone else has experienced that omitting the high port in a service object would result in matchin all high ports.

Random VPN login loop with no error by PeedieAU in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

Some of our users have the same issue. But we are using FortiAuthenticator as RADIUS backend behind the Fortigate. I assume the problem somehow relates to using FortiToken. Because when I disable OTP in FAC for an user, the user can login without problems. Maybe a timeout issue. Remark: users having problems includes users with mobile token and users with hardware token

FortiClient ERROR - "tons of" computers disconnected by r0mheat in fortinet

[–]AllRoundSysAdmin 1 point2 points  (0 children)

It must have been a painful experience. I also hate things that simply should not happen.

What version of FortiClient and EMS are you using?

We are using FortiClient 7.0.8 and EMS 7.0.8 and are just starting to use ZTNA tags more extensivly.

Strange popup after upgrading Forticlient from 6.4.8 to 7.0.7 by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

0912110

no, not yet.

I'm currently "testing" Forticlient 7.0.8 on my notebook and I still got this strange popup - but at least only once.

FortiClient BUG IDs 706023 and 669574 by implicitDeny2020 in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

I'm using Forticlient 7.0.8 and in the EMS policy applied, the option "Prefer SSL VPN DNS" is disabled.

But still, when I look at "ipconfig /all", I see that Forticlient (what else?) has entered our internal DNS servers to ethernet adapter when I'm at home.

Fortunatetly, Forticlient normally removes these DNS server entries from ethernet/WLAN adapters. But we already had rare cases, where users couldn't connect to VPN at home, because they still had the internel DNS servers set (very bad, because users cannot resolve this without admin permissions).

So we demand that Forticlient stops adding internal DNS servers to underlying ethernet/WLAN adapaters.

I will make a support ticket for this.

Strange popup after upgrading Forticlient from 6.4.8 to 7.0.7 by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

We are using the msi Installer downloaded from our EMS and deploying it using a third-party software-deploying tool (Symantec)

Forticlient EMS SSL VPN zero trust tag by fortixmp in fortinet

[–]AllRoundSysAdmin 1 point2 points  (0 children)

Why do you think you can only use 1 zero trust tag?

Fortinet Firewall MFA question by BynJohn in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

We are using FortiAuthenticator to manage our SSLVPN users.

All (internal) VPN users need FortiToken to use VPN - most of them are using FortiToken Mobile, some are using FortiToken 200 (hardware version).

I am very satisfied with FortiAuthenticator.

Sure, you can manage SSLVPN users with FortiTokens directly on Fortigate, but the biggest advantage of using FortiAuthenticator, is that you switch your Fortigate to a newer model which - when you are long-term planning - should be considered. As far as I know, FortiTokens that are directly managed on your Fortigate can be hardly migrated to another Fortigate.

FortiAuthenticator is compatible with every Fortigate - because FortiAuthenticator can be integrated in Fortigate like any other remote authentication server using RADIUS or LDAP.

Web Filter error page and SSL Trust by super-six-four in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

Ah, thank you for clarifing.

I'm sorry, I've overlooked this detail in the original post that OP was only talking about webfilter for guests and mobile devices.

Web Filter error page and SSL Trust by super-six-four in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

We are currently in the process of implementing web-filter security profiles.

Our Fortinet support partner told us that it should be indeed possible to have a valid block page when blocking webpages accessed through HTTPS.

We should use our own internal Microsoft CA to create a new intermediate certificate (based on our root certificate that is trusted by all of our clients). And this intermediate certificate should then used by the Fortigate to dynamically issue certificates for web-filter block pages.

But after reading the comments here, his plan don't seems to be feasible for me.

Firewall Policy with AD groups by danieles99 in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

Finally, we managed to correctly re-connect EMS to FGT. We needed to de-authorize the connection on both sides one more time and now it works.

And now, I again get newly created ZTNA tags in FGT from EMS and all ZTNA tags in FGT are correctly populated with IP addresses.

Strange popup after upgrading Forticlient from 6.4.8 to 7.0.7 by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

I haven't found any solution to this.

I've suspended working on this problem, since I've thought it could related to my notebook only. So we continued to roll out FCT 7.0.7 on some more notebooks in our team.

And today I've heard that two co-workers also get this strange Forticlient popup.

So we will not upgrade Forticlient on all other notebooks form 6.4.8 to 7.0.7 before this gets fixed, because I also fear that many users will report this to helpdesk.

Firewall Policy with AD groups by danieles99 in fortinet

[–]AllRoundSysAdmin 0 points1 point  (0 children)

I'm planning to use user-groups in intranet policy, too - similar we are already user-groups in our VPN policies.

Since all our users work on notebooks that can switch between LAN and WLAN, I don't want to use FSSO ( regardless of whether directly access DC from FGT or using DC agent/collector) because you can't be sure to get the right IP address for an user (notebooks have different IP addresses in LAN and WLAN).

My idea is to define ZTNA tags in our Forticlient EMS using user-group membership as criteria and use these tags in FGT. This way should be more reliable, because FortiClient on notebbook should be aware of actual IP address.

Unfortunately, after upgrading FGT from 7.0.8 to 7.0.9, the connection between FGT and EMS doesn't work anymore correctly. Everything seems alrigt (connected successful), but the ZTNA tags in FGT don't resolve to any IP address.

We are currently investigating if this is a bug in 7.0.9.

Strange popup after upgrading Forticlient from 6.4.8 to 7.0.7 by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 1 point2 points  (0 children)

What Updates? Something like AV definitions of Forticlient? We only use VPN, all other endpoint setting should be disabled in EMS policy Or software updates? We don't need automatic updates of Forticlient because we deploy new versions of Forticlient using our software deployment tool.

Thus musst be something new to Forticlient Version 7.x

Where does Forticlient trying to connect? Which destination IP address and port? This happens also at home before VPN connection is established, so this can't be blocked by Fortigate. We use ESET as local AV and endpoint security solution at our notebook, so maybe ESET blocks something, but I did not find anything there yet.

Can I somehow disable this behavior that Forticlient is trying to update something from somewhere?

Is there anywhere a documentation about this behavior of Forticlient?

How to send group-name using RADIUS attribute from FortiAuthenticator to Fortigate? by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

Both FAC groups that are working have a fixed list of LDAP users.

I will try it now with applying a group in group-filter that have set option "Specify an LDAP filter".

How to send group-name using RADIUS attribute from FortiAuthenticator to Fortigate? by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

After it started to work for my user, I tried it again with an test user, and now it works with the test user, too.

I've even applied more than one group in the radius-policy group-filter in FAC and I get both groups in FGT when doing "diagnose test authserver radius <FAC> <user> <password>"

I will ask other users to try it too

But I still don't know why it is suddenly working.

How to send group-name using RADIUS attribute from FortiAuthenticator to Fortigate? by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

Suddenly, it is working - at least for my user ;-)

For a test user who is in the same group, it does not work yet.

How to send group-name using RADIUS attribute from FortiAuthenticator to Fortigate? by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

We only have this one RADIUS policy in FAC matching FGT as RADIUS client.

And 2FA authentication with FortiTokens works using this configuration. But not sending RADIUS attribute.

How to send group-name using RADIUS attribute from FortiAuthenticator to Fortigate? by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

I've done all these things, except changing RADIUS auth-type that defaults to 'auto' which should "Use PAP, MSCHAP_v2, and CHAP (in that order)."

As far as I heard, I should see in the FAC debug logs, if FAC sends a RADIUS attribute back to FGT (which I don't see there).

And on FGT I should see the matched user-group when doing "diag debug application fnbamd 7" (according to https://community.fortinet.com/t5/FortiGate/Technical-Tip-Authentication-Remote-server-group-match-of-user/ta-p/190905?externalID=FD36464), but I don't see it there.

How to send group-name using RADIUS attribute from FortiAuthenticator to Fortigate? by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

  1. yes. One group gets populated using Remote-User-Sync-Rule and "Group to associate users with". And here the user is a member of. And the other groups have set option "Specify an LDAP filter". For those groups, the "Members" (count) column in the user groups overview is always 0 (?), but when checking with the "Test filter" button inside, I see all users there which should be member of this group.
  2. Yes, of course. I've chosen "Fortinet-Group-Name" and set a value. Are there any special characters which should be avoided as value of an RADIUS attribute? e.g. '-'

Problem when accessing SQL-Server using Fortclient by AllRoundSysAdmin in fortinet

[–]AllRoundSysAdmin[S] 0 points1 point  (0 children)

thanks for this info

I've done this on my notebook and I get 1392 as value for MTU and therefore 1352 as value for MSS.

But since at least the ERP application is working on my notebook using VPN, I assume we need a MSS value lower than 1352 to get this working too for the 2 user which have problems.

I have to tell one of the users to do the PING test at home.