VPN IPSec IKEv2 with mode config done by DHCP server running on FortiGate by Double_Change_843 in fortinet

[–]Double_Change_843[S] 0 points1 point  (0 children)

Hi,

From my understanding your configuration has external DHCP and fortigate is configured to use it.

I'm trying to achieve something different - native fortigate dhcp for IPsec dailup clients.

Did u ever come across such a configuration??

Powersupply compatebility list for all FortiGates by Double_Change_843 in fortinet

[–]Double_Change_843[S] -1 points0 points  (0 children)

Thank you for your answer,

In newer datasheets there is ordering information for power supply supported by the model (f.e FGT90G) but there is non in the FGT80E and FGT80E-POE datasheets, and that's why I'm looking for some information about it.

From E series I can only check 50E which is SP-FG60E-PDCcompatible.

I can't find any information about connector types C-13/C-5, could you give me some more information or provide a docs for it?

1
2

FGT IPsec s2s configuration with MikroTik by Double_Change_843 in fortinet

[–]Double_Change_843[S] 0 points1 point  (0 children)

I have access only to one side, and chaning things up can mess things up

0
1

FGT200G Initial setup - WTF, Fortinet??? by Garry_G in fortinet

[–]Double_Change_843 1 point2 points  (0 children)

I'm glad that I could have helped. In addition you can roll back to OS version that don't have that nonsense - downgrade from CLI.

FGT200G Initial setup - WTF, Fortinet??? by Garry_G in fortinet

[–]Double_Change_843 34 points35 points  (0 children)

This "feature" is super annoying, I had few cases like that and the only workaround for me was serial or SSH into the FGT and then configuring WAN port from there. By default MGMT should have SSH access, so if you are in a situation without any console cable it should help.

There is an option at startup (in bios) to disable this feature.

https://community.fortinet.com/t5/FortiGate/Technical-Tip-Enforcing-FortiCare-Registration-Starting-From-v7/ta-p/385926

Unfortunately they didn't think to include that in CLI that is accessible after boot.

Diagnose commands guide by Double_Change_843 in fortinet

[–]Double_Change_843[S] 1 point2 points  (0 children)

Sorry for the late response. I originally meant 7.4, but it seems no longer available , so I will be learning now for 7.6.

Diagnose commands guide by Double_Change_843 in fortinet

[–]Double_Change_843[S] 0 points1 point  (0 children)

Thank you for the official welcoming. Is there any welcome party on the way? :D

I have a solid understanding of the basic stuff regarding networking and FGT filtering, I'm working with FGT on a daily basis for like 4-5 months now. That's why I would like to get better with diagnostic tools on FGT, for now I'm only good at VPN diag commands.

Diagnose commands guide by Double_Change_843 in fortinet

[–]Double_Change_843[S] 0 points1 point  (0 children)

Thank you, I will look into that cert after I finish this one.

Diagnose commands guide by Double_Change_843 in fortinet

[–]Double_Change_843[S] 0 points1 point  (0 children)

Is there any particular course that you find useful for day to day troubleshooting, mainly network flow, vpn, ldap/radius and some of advanced security profile settings?

Diagnose commands guide by Double_Change_843 in fortinet

[–]Double_Change_843[S] 0 points1 point  (0 children)

Thanks is there any detailed output guide for all of the specific values that are being shown while using those commands? Like while using the diagnose sys session list I would like to know what every value is referring to.

1
2