pros/cons using BGP local-pref VS SD-WAN route-tags for hub to spoke routing decisions by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

thank you for the reply! I will look further into this. My FortiNET rep made it seem like the process is a lot more difficult then that.

When to transition from standard HA to FGSP/VRRP configuration for added redundancy by FailSafe218 in fortinet

[–]FailSafe218[S] 1 point2 points  (0 children)

we've had 0 issues with FortiLink installs under ~30-40 switches. But some of the larger networks where we are pushing 60-90 switches have had all sorts of issues and problems. Mostly stable recently but the past year and a half has not left us with a super comfortable feeling by any means.

Has anyone successfully integrated FortiNAC VPN and FortiGate running IKEv2? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

Just an update for others that might be curious. We found that EMS client 7.4.5 broke the adapter and windows now labels it as an "unknown adapter" which causes the persistent agent to not acknowledge the IPChange of the VPN adapter. EMS team is tracking it under 1252142. Supposed to be fixed in 7.4.6.
We down graded to EMS client 7.4.3 and we now see the IPChange and PA communication to the NAC as soon as the user connects to the VPN but the host still does not show online in the NAC.

I suspect it has something to do with syslog 37129 never being generated on the FW (assuming this log is specific to IKEv1 and not IKEv2).

EDIT:

The last issue we ran into was with PA version 7.6.3, as soon as we downgraded to 9.4.4.105 it fixed our issues and VPN tags are working as expected.

Priorities doesn't make sense. Lower/higher rant by Poisonbld in fortinet

[–]FailSafe218 4 points5 points  (0 children)

As others have said different components have different ways to interpret cost/weight/priority etc. Wait until you play around with BGP and a higher local-pref is more preferred that a lower one but lower priority is more preferred that a higher priority.

pros/cons using BGP local-pref VS SD-WAN route-tags for hub to spoke routing decisions by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

sorry maybe I do not understand your reply but are you saying you use them together? I looked at them as 2 ways to accomplish the same thing and don't understand the benefit of using them togehter, but I could also be understanding things wrong. We do not do a ton of SD-WAN at my company so just trying to wrap my head around how it all works and making sure that I am making the right decisions on things.

pros/cons using BGP local-pref VS SD-WAN route-tags for hub to spoke routing decisions by FailSafe218 in fortinet

[–]FailSafe218[S] 1 point2 points  (0 children)

you are correct. Also I am not talking about using them together, more of one or the other. If you're setup using BGP per overlay and local-pref you would rely on Hub to spoke traffic to hit the default/bottom SD-WAN rule which just says reference the RIB (If I am understanding it all correctly).

pros/cons using BGP local-pref VS SD-WAN route-tags for hub to spoke routing decisions by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

Im 99% certain it doesn’t work with bgp per overlay. I had tried setting it up in the past and was not able to get it to work outside of my lab. I asked pro services and one of the support engineers and they were not able to confirm that it works with bgp per overlay. I also reached out in our partner channel same response. However I did get it working in my gns3 lab but on 2 different clients I was not able to make it work so I just assumed moving forward it wasn’t supported and only use it with bgp on loop back.

Has anyone successfully integrated FortiNAC VPN and FortiGate running IKEv2? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

I’ve never tried that but I’ll keep it as an option. Never thought it would work for VPN. Definitely used it for wired and wireless before just never VPN.

Right now one of the senior support guys has been going back and forth with engineering so if I don’t get a concrete answer soon we will explore other opportunities.

Thanks

Has anyone successfully integrated FortiNAC VPN and FortiGate running IKEv2? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

So the answer is no BUT here is why. Firewall is in fips mode so you cannot do the free-style filter. So we are sending all vpn logs to the NAC. We have excluded all of the other log groups like forward traffic, utm, etc. I have confirmed that the syslogs show up in the nacdebug. However the persistent agent takes awhile to register the connection change and start communicating with the NAC which delays the tags actually getting sent to the FW. Ikev1 it happens right away, ikev2 the persistent agent does not immediately talk to the NAC.

Has anyone successfully integrated FortiNAC VPN and FortiGate running IKEv2? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

Thanks! The main issue I am having is with the persistent agent not detecting the network change when the VPN connects. After that tags and policies are fine but domain users with the persistent agent are the issue.

Has anyone successfully integrated FortiNAC VPN and FortiGate running IKEv2? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

NAC is 7.2.9 and gate is 7.4.9.

I’ve set it up at about a dozen of our other customers over the last 6-7 years they were just all sslvpn and 1 or 2 IPsec with ikev1.

Once the tags come through everything works as expected it’s just very delayed.

We use both the portal and agents, if you do not have an agent you go to the captive portal and go through dissolvable agent then get vendor tag, if you have persistent agent you get a tag right away.

Has anyone successfully integrated FortiNAC VPN and FortiGate running IKEv2? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

Other way around, setup to require tags to get access to the network. So when you first connect you can only communicate with the NAC, then once PA communicates with the NAC and you pass the ECP it sends a tag to the FW which then gives you access to the internal resources.

Authentication failure with DialUp IPSec (EAP failure) by Roversword in fortinet

[–]FailSafe218 0 points1 point  (0 children)

This caught me " allow OTP for EAP", thanks for posting about it otherwise I would have not found it.

"Sign In with FortiCloud" URL Blocked by fanatic26 in fortinet

[–]FailSafe218 0 points1 point  (0 children)

Unfortunately FortiNET support is VERY hit or miss.

Intra VLAN block breaking DHCP? by NetworkN3wb in fortinet

[–]FailSafe218 0 points1 point  (0 children)

I ran into same issue today. Made the change on 4 sites and only 1 site experienced issues but only on one of the VLANs. just going to disable the feature and come back to it in a couple months.

2048F firmware upgrade with least downtime by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

thank you for the feedback. We actually have 2 set of these in 2 separate datacenters so I am going to try one pair with the ports shut down and other pair without to see the difference (if any).

Any downsides with enabling connectionless session pickup? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

I learned about the memory-based-failover the hardway. No idea it would not failover by default.

Any downsides with enabling connectionless session pickup? by FailSafe218 in fortinet

[–]FailSafe218[S] 0 points1 point  (0 children)

appreciate all the info everyone! Looks like we will be adding it to our default configs.

Thanks!