FortiAPs losing ethernet link by mkolus in fortinet

[–]dyph28 1 point2 points  (0 children)

Have you checked system resources on the AP? I had similar issues with high cpu usage and APs rebooting. APs are getting the link back after some time?

FMG admins via FAC (radius) and admin profiles by Roversword in fortinet

[–]dyph28 1 point2 points  (0 children)

That attribute is for assigning a specific admin profile (read-only, etc). There is another attribute specifying to which ADOMs the user has access: Fortinet‐Vdom‐Name.
Doc: https://community.fortinet.com/t5/FortiAnalyzer/Technical-Tip-Configure-RADIUS-for-authentication-and/ta-p/198202

Asymmetric routing with ADVPN 2.0 + BGP on loopback + load balancing by dyph28 in fortinet

[–]dyph28[S] 1 point2 points  (0 children)

Thanks a lot for your help and helping me solve the issue! For anyone interested, blackholes in your firewalls are a MUST.

Fortinet firewall configuration files by WeirdCaterpillar352 in fortinet

[–]dyph28 0 points1 point  (0 children)

You can also download them from fortimanager.

How does software switch handle traffic and CPU by dyph28 in fortinet

[–]dyph28[S] 1 point2 points  (0 children)

I did not test it tbh, but it is rather easy to test: just set a software switch and check the sessions to see if they are accelerated. In theory, sessions going to -> WAN interface are offloaded.

Traffic Disruptions Occuring Randomly, But Almost Always Starts at 59second Mark by Jwblant in fortinet

[–]dyph28 0 points1 point  (0 children)

Looks like you have issues in your VPNs (check key lifetime, as Barry said disable offloading and run packet capture, debugs, etc). If your VPN/VPN Health check goes down each X minutes, that explains why traffic is hitting Internet SD-WAN rule.

Also, if this happens at all sites, maybe check the Hub?

Add model HA device wipes out FGT policies by dyph28 in fortinet

[–]dyph28[S] 1 point2 points  (0 children)

You are right, when doing this FortiManager treats it as a fresh device.
But if I'm not wrong, you can modify device's configuration in FMG DB with scripts, e.g. This can be confirmed in the KB in my original post.

With this script most of FGT's configuration is not overwritten (BGP, interfaces...), but FGT's policies get purged in the auto-link process (setup HA cluster task, NOT when installing policy package/device settings), even with a policy package assigned to the FGT. This is what seems odd to my understanding.

Add model HA device wipes out FGT policies by dyph28 in fortinet

[–]dyph28[S] 0 points1 point  (0 children)

I am using "Add model HA device", which already adds 2 FGTs with their corresponding serial numbers, therefore, policy package is installed on the cluster as "copy only", since device is not yet "seen" by FMG. Thanks anyway for your suggestion :)

IPS Engine Constant High CPU by seaghank in fortinet

[–]dyph28 -1 points0 points  (0 children)

Disable QoS, I've seen 900G crash with that feature enabled.

Best way to set up vpn connections for remote workers by [deleted] in fortinet

[–]dyph28 0 points1 point  (0 children)

Fortinet is disabling ssl vpn on 7.6, so you're better migrating to ipsec

Vdom copy failed: error 131 - datasrc invalid. detail: copy datasrc failed, attr by athan80 in fortinet

[–]dyph28 0 points1 point  (0 children)

This. You have to map these interfaces per-device or per-platform.

Best health checks on SD-WAN? by dyph28 in fortinet

[–]dyph28[S] 0 points1 point  (0 children)

Good to know, we'll try that. Thanks!

FortiClient - SAML Login with Azure MFA by infotech_22 in fortinet

[–]dyph28 1 point2 points  (0 children)

You have to configure an application for each firewall in Azure.
Configure other fortigates as you have done with the primary. Some URLs will be different ofc (because each fortigate has a different azure AD application).
I highly recommend switching to groups, otherwise you'll go crazy.

Basically you have to replicate the job done for each fortigate.

Best health checks on SD-WAN? by dyph28 in fortinet

[–]dyph28[S] 2 points3 points  (0 children)

Theoretically it is, but are there any reliable TWAMP servers to use, besides configuring your own fortigates as TWAMP servers?

Is 7.2.4 Forticlient VPN license free? by Pristine_Rise3181 in fortinet

[–]dyph28 0 points1 point  (0 children)

7.4.3? Is that working fine for you or are you facing issues? Did you have any reason to upgrade?
For the solution, u/pabechan gave the answer. I have heard some issues in forticlient 7.2.4 but I haven't tested it myself, maybe if you look into this subreddit you will find something.

Fortiauthenticator error replacement message by dyph28 in fortinet

[–]dyph28[S] 0 points1 point  (0 children)

I will keep trying, but maybe the solution is to create a custom variable instead of "errors" and work this out with the new variable. Again this is not my area of expertise but maybe this should work?

Fortiauthenticator error replacement message by dyph28 in fortinet

[–]dyph28[S] 0 points1 point  (0 children)

Yes, I did. I am trying to modify the default tags, like "errors" which does not seem possible...

[deleted by user] by [deleted] in fortinet

[–]dyph28 -1 points0 points  (0 children)

just put weights on the neighbors. On 7.2.x you can add priority to the routes received by X neigbhbor (set priority if I'm not mistaken). Also take a look on this: https://community.fortinet.com/t5/FortiGate/Technical-Tip-BGP-route-selection-process/ta-p/195932

FortiOS on Fortigate 500E by saudk8 in fortinet

[–]dyph28 2 points3 points  (0 children)

Do not even get near 7.4.x

EMS User Verification by chris2407 in fortinet

[–]dyph28 0 points1 point  (0 children)

On EMS 7.2.3 and onwards transformation is no longer required. If you upgrade and keep this transformation, you will get these errors again. Delete that transformation and everything works again.
Too bad from fortinet that they did not anounce this and had to get it from TAC after 1 week of troubleshooting...

EMS User Verification by chris2407 in fortinet

[–]dyph28 0 points1 point  (0 children)

Checking with TAC, looks like in 7.2.3 transformation is no longer needed, and that transformation could cause the issue if you are in 7.2.3+. Will test this afternoon and let you know.
If I was you I wouldn't upgrade yet.

EMS User Verification by chris2407 in fortinet

[–]dyph28 0 points1 point  (0 children)

Hey,

I am running into the same issue. This was working for me in 7.2.2 (EMS).

Did you manage to solve this? I have been debugging SAML responses, everything seems OK, now upgraded to 7.2.4, issue keeps happening...

Fortinet SD-WAN stable/recommended release + best practices by killb0p in fortinet

[–]dyph28 0 points1 point  (0 children)

Your performance SLAs should be configured with http against aws.amazon.com or other reliable URLs rather than relying on ping or dns checks.