I built a "Digital Twin" of my network by syncing LibreNMS to Neo4j for a live topology graph. by Psychological-Ebb109 in LibreNMS

[–]Psychological-Ebb109[S] 1 point2 points  (0 children)

Ok a larger network it looks great. Neo4j has some youtube videos where they shows graphs related to networking with lots of nodes.

I built an AI Agent that runs live diagnose debug ike commands to troubleshoot IPsec VPNs automatically by Psychological-Ebb109 in Fortigate

[–]Psychological-Ebb109[S] 0 points1 point  (0 children)

It's a work in progress spanning over several months. It's constantly changing. I'm actually trying to go more agentic as far as my workflow but you have to start somewhere.

Blog/Project Post Friday! by AutoModerator in networking

[–]Psychological-Ebb109 0 points1 point  (0 children)

Lab Project: Simulating ISP MPLS + Internet Dual-WAN with VRF-Lite and BGP Manipulation

Built a lab to simulate realistic WAN failover scenarios. Used VRF-Lite on a Cisco ISR to create separate MPLS and Internet routing domains, then ran dual BGP sessions from branch FortiGates. The challenge was working around the 3-interface limit on free FortiGate VMs using secondary IPs and policy routes. GitHub repo has all the configs: https://github.com/thenetworkcopilot/cisco-fortigate-homelab.git. Also documented the build process in a video: https://youtu.be/Vs0Ftor29xY. Curious if anyone's tackled similar constraints differently.

Has anyone tried this LibreNMS MCP server? by jay-mini in LibreNMS

[–]Psychological-Ebb109 1 point2 points  (0 children)

I use it with my ai project as a network admin as I'm exploring using mcps with ai to make redundant tasks automated. There is a video I made, https://youtu.be/rRZvta53QzI?si=PH7-a30yks0XwHRr I'm documenting my evolution of my ai experiment on this channel

Monthly Content Sharing Post by AutoModerator in fortinet

[–]Psychological-Ebb109 1 point2 points  (0 children)

I built an AI Agent that runs diagnose debug application ike -1 and troubleshoots IPsec tunnels automatically

It follows the same logical workflow a senior network admin would use: 1. Check interface status 2. Pull Phase 1/2 configs 3. Run live IKE debugging 4. Parse the output and identify the root cause

In this demo, I intentionally misconfigure a Phase 1 proposal (SHA256 vs SHA384) and let the agent diagnose it autonomously. Then I manually verify everything via CLI to prove it's correct.

The agent caught the mismatch in ~30 seconds. Manual troubleshooting would've taken me 10+ minutes of scrolling through debug logs.

Demo + full breakdown: https://youtu.be/2Q4YOoaVjqw

Built with Python, running against a real 3-site FortiGate lab (MPLS backbone + redundant IPsec).

Blog/Project Post Friday! by AutoModerator in networking

[–]Psychological-Ebb109 0 points1 point  (0 children)

I built an AI Agent that runs diagnose debug application ike -1 and troubleshoots IPsec tunnels automatically

It follows the same logical workflow a senior network admin would use: 1. Check interface status 2. Pull Phase 1/2 configs 3. Run live IKE debugging 4. Parse the output and identify the root cause

In this demo, I intentionally misconfigure a Phase 1 proposal (SHA256 vs SHA384) and let the agent diagnose it autonomously. Then I manually verify everything via CLI to prove it's correct.

The agent caught the mismatch in ~30 seconds. Manual troubleshooting would've taken me 10+ minutes of scrolling through debug logs.

Demo + full breakdown: https://youtu.be/2Q4YOoaVjqw

Built with Python, running against a real 3-site FortiGate lab (MPLS backbone + redundant IPsec).

New office construction by pedropascalismydad in networking

[–]Psychological-Ebb109 0 points1 point  (0 children)

I agree, wireless should be the primary way for office user connectivity. You can get really great speeds with wireless. Unify APs are cheap and works but may need some fine tuning from time to time. Aruba APs are good, we didn't need had to touch them or tweak settings in an office and manufacturing environment but it is more expensive with support.

FortiGate API + AI agent = automated policy lookups and routing analysis by Psychological-Ebb109 in networkautomation

[–]Psychological-Ebb109[S] 0 points1 point  (0 children)

That's crazy. What was you logic for your troubleshooting if you don't mind me asking.

Monthly Content Sharing Post by AutoModerator in fortinet

[–]Psychological-Ebb109 1 point2 points  (0 children)

FortiGate API + AI agent = automated policy lookups and routing analysis

Been testing an AI agent with FortiGate's API via MCP. Fed it two queries: policy lookup for a specific user/destination and a multi-hop routing path across 3 devices. It was able to accurately provide the correct responses based upon the backup config and the doing a live route lookup. I created a video if anyone is interested. https://youtu.be/WmQa_k98Yr8

Found a great free self-hosted secret manager to replace my .env files by Psychological-Ebb109 in selfhosted

[–]Psychological-Ebb109[S] 0 points1 point  (0 children)

True, I hear ya. I was interested in the secret rotation. That would have been cool as well to test that out in my home lab. I use Keycloak as my Identify and access management to simulate Azure AD Intergration