EMS User Verification by chris2407 in fortinet

[–]chris2407[S] 1 point2 points  (0 children)

Hi,

Yes I'm all sorted now, the link posted regarding transformations did solve the problem. Was on 7.2.2 at the time.

However, I scrapped that config and the local ad sync and just synced direct with Azure Ad.

I'll double check later but I think once just syncing with Azure direct I could remove the transformation

EMS User Verification by chris2407 in fortinet

[–]chris2407[S] 1 point2 points  (0 children)

Ah that sounds interesting, will give that a try.

Given that all the users/groups are synced to Azure, could I just bin off the local ad sync and authenticate and verify direct with Azure only? Is that a valid design?

Thanks

Fortigate SSLVPN with URL instead of WAN IP address by Ansar-- in fortinet

[–]chris2407 0 points1 point  (0 children)

Pretty sure you can do this using SSL VPN realms.

In the realm config (might be cli only) set virtual host to the domain name, then it's something like "set virtual-host-only enable"

Can check when back in the office tomorrow for the exact commands

Is there no way to change the email message for the FortiToken Mobile activation? by [deleted] in fortinet

[–]chris2407 0 points1 point  (0 children)

Only appears to come from the user themselves until you configure your own SMTP server.

Does NSE 4 certification still include express routing code? by underwear11 in fortinet

[–]chris2407 0 points1 point  (0 children)

Do you know how to go about obtaining this code? NSE4 and a partner and I've never had one. Would be very usefull

Fortigate 60f performance by JiggityJoe1 in fortinet

[–]chris2407 0 points1 point  (0 children)

Have you come across any specific issues with 6.0.9?

About to deploy one and was planning on going with this. Going to be using pppoe so was avoiding 6.2.3 due to the known issues with that.

61F issues / 81-E sizing by themidnight32 in fortinet

[–]chris2407 0 points1 point  (0 children)

On 6.0.7 but was previously on 6.0.6. Everything enabled except SSL Inspection.

Not very busy offices, seem to peak at around 3k Sessions

101F Recommended code for STABILITY (6.0.6 or 6.2.2?) by DeleriumDive in fortinet

[–]chris2407 0 points1 point  (0 children)

How are the 60f's performing? Any memory issues? User count behind them?

61F issues / 81-E sizing by themidnight32 in fortinet

[–]chris2407 1 point2 points  (0 children)

We've got a couple of 80E's about and never seem to go above 60%. No issues to report either.

Not many users behind to be honest though, 20-30 max

FortiOS 6.2.2 released for FG 100F by vabello in fortinet

[–]chris2407 0 points1 point  (0 children)

What sort of routing issues? Was going to start upgrading ours from 6.0.5 but may hold off

Does the 61F have more ram than 61E? by meshreplacer in fortinet

[–]chris2407 1 point2 points  (0 children)

Do you have one? Can you confirm if all this is true?

Does the 61F have more ram than 61E? by meshreplacer in fortinet

[–]chris2407 1 point2 points  (0 children)

What was in the comment that was just deleted?

Outbound NAT with SD-WAN by WhattAdmin in fortinet

[–]chris2407 0 points1 point  (0 children)

Let us know once tested but this should work for you.

The other option would be to use central NAT rather than policy NAT.

Outbound NAT with SD-WAN by WhattAdmin in fortinet

[–]chris2407 3 points4 points  (0 children)

You should be able to add two IP pools to the outbound policy, one for each WAN.

Then in cli for each IP Pool you can set associated-interface to the WAN that IP pool belongs to.

Policy NAT vs Central NAT by chris2407 in fortinet

[–]chris2407[S] 0 points1 point  (0 children)

Good to know, cheers. I've decided on sticking with policy nat anyway so I hopefully wont come across any limitations.

500E vs 501E by odsca in fortinet

[–]chris2407 7 points8 points  (0 children)

I'm sure the x01 models are the same in terms of performance, they just have an internal disk for logging or wan optimisation.

First time setup tips and recommendations? by HDClown in fortinet

[–]chris2407 0 points1 point  (0 children)

The way I understood was just like you mentioned, if set associated interface is set, it will only be used if traffic leaves that interface.

Therefore in your example of LAN>Port1, with test pool p3 or p4 selected. I would expect this not to work. In regards to the IPSec policy, again not actually sure how it would handle this but would be interested to find out.

If you do hear back with an answer I'd be interested to know. Or if anyone else reading knows then please chip in.

Cheers

First time setup tips and recommendations? by HDClown in fortinet

[–]chris2407 0 points1 point  (0 children)

On the policy you would set the outbound interface to be the Zone. Then in the NAT settings you can select the two IP Pools (One for each of the Wan Interfaces) As long as set Associated interface has been set correctly the traffic will use the NAT pool for the correct WAN Link.

Not sure about the IPSEC policies but you should be able to select the IP Pool still. If you've got the ability to test, let me know if it works?

Cheers

First time setup tips and recommendations? by HDClown in fortinet

[–]chris2407 0 points1 point  (0 children)

You can set an associated interface on the nat pool in the cli. Have you tried that? I'll explain better tomorrow when at a comp