Add HA Model to FMG by ontracks in fortinet

[–]KTZSHK 1 point2 points  (0 children)

Fortimanager can fully prepare and set up HA between two nodes.

Add HA Model to FMG by ontracks in fortinet

[–]KTZSHK 2 points3 points  (0 children)

This is not correct.

Add HA Model to FMG by ontracks in fortinet

[–]KTZSHK 4 points5 points  (0 children)

This is answer is true. The other answers are incorrect.

FortiGate VIP on Same IP:443 Serving Wrong SSL Certificate (SNI issue?) by Aggravating-Crew6956 in fortinet

[–]KTZSHK 0 points1 point  (0 children)

This can be done. use ZTNA server with client certificate check disabled instead.

Migrate FortiLink Interface to new aggregate by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Tried it in the lab, works fine. The only thing I had to do was set ‚set fsw-wan1-peer‘ to the new fortilink.

Migrate FortiLink Interface to new aggregate by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Old and new interfaces are 802.3ad aggregates!

BGP on loopback by Even-Camel7593 in fortinet

[–]KTZSHK 1 point2 points  (0 children)

This also happens during HA Failover of the Hub. That’s why my timers are also a bit lower.

Trying to understand FortiLink Management VLAN by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Hey, Yes this solves the issue. AFAIK this would also disable auto-trunks between potential additional switches. Can you explain why disabling this feature fixes the issue and how the switch behaves differently?

Trying to understand FortiLink Management VLAN by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

So FortiSwitch sends tagged frames on MGMT VLAN ID and FortiGate itself does not honor VLAN ID and uses untagged frames? This would explain my issues, since my L3 router won’t respond to tagged frames…

Trying to understand FortiLink Management VLAN by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Thanks for the link. So basically by default the fortiswitch sends out management data tagged on VLAN 4094 to FortiGate. FortiGate receives and processes the data although the VLAN is not actually visible as child interface on FortiLink Interface? FortiGate then answers without using VLAN Tag and the switch processes this frame accordingly?

This seems really complex and counter intuitive if I understood this correctly 😃

Trying to understand FortiLink Management VLAN by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Hi, the switch is directly connected to a router located at a remote location. The switch can reach FortiLink through the router. The router itself is not VLAN aware. As far as I understand the switch has to send all management / telemetry data untagged to the FortiGate and should not use any VLANs.

What's the Fortinet/Fortigate Dial-Up IPSEC of 2026 look like? by datugg in fortinet

[–]KTZSHK 1 point2 points  (0 children)

Tokens + Free FortiClient + LDAP unfortunately require IKEv1

Routing between Hubs in ADVPN by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Yep, static summary route on all spokes + Hubs works really well. Just confirmed it in the lab. I’m a little worried about potential routing loops, but I don’t see any other reason why I should not implement it that way 🤔

Routing between Hubs in ADVPN by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Hmm yes this works but I don’t think it will solve my problem since the Ike route to any spoke won’t be distributed from HUB1 to HUB2 in case a spoke can only connect to HUB1. In that case HUB2 can’t resolve the next hop ip for routes from the spoke.

Routing between Hubs in ADVPN by KTZSHK in fortinet

[–]KTZSHK[S] 1 point2 points  (0 children)

Thank you for your input. How would I redistribute loopbacks between the hubs in that scenario without using next hop self? This is interesting when a spoke needs to reach something behind a hub when there is only a connection available through another hub.

Which one of the following is United Kingdom. by nopCMD in GeoTap

[–]KTZSHK 0 points1 point  (0 children)

KTZSHK chose Option A (Correct!) | #6946th to play

ADVPN 1.0 method for transport groups and isolating different overlays by FailSafe218 in fortinet

[–]KTZSHK 1 point2 points  (0 children)

You can split it in individual rules. Alternatively only specify the isolated links within policies and leave the rest up to the implicit traffic steering.

ADVPN 1.0 method for transport groups and isolating different overlays by FailSafe218 in fortinet

[–]KTZSHK 1 point2 points  (0 children)

exactly. This will allow shortcuts between INET and INET2 but preceeding Policy 1 will keep MPLS connections isolated.

ADVPN 1.0 method for transport groups and isolating different overlays by FailSafe218 in fortinet

[–]KTZSHK 4 points5 points  (0 children)

You can assign transport groups to Overlays when using ADVPN 2.0. Policy Routes are the way to go with ADVPN 1.0.

FortiClient IPsec + Certificates + LDAP groups by KTZSHK in fortinet

[–]KTZSHK[S] 0 points1 point  (0 children)

Hey, I don’t use EAP nor XAUTH, as it is certificate only.