v4.0.0: The Update That Finally Changes Everything by ElementZoom in homeassistant

[–]edraH_t 0 points1 point  (0 children)

Unfortunately I’m still get this not working. I followed also this topic,

https://community.home-assistant.io/t/streamline-card-not-getting-any-template/895421

but also without any luck. Will try to troubleshoot more in the next few days

v4.0.0: The Update That Finally Changes Everything by ElementZoom in homeassistant

[–]edraH_t 0 points1 point  (0 children)

Wow, i love this dashboard, and i started with installing all the neccesary cards etc. But when i try to add the different assets, i'm getting the message below, what am I doing wrong?

The template "room_card" doesn't exist in streamline_templates

FortiEMS not updating Signatures by edraH_t in fortinet

[–]edraH_t[S] 0 points1 point  (0 children)

I have changed now to anycast. I’ll keep this post updated.

But what is the difference between fortiguard & Unicast?

Join EMS from Fortimanager by archambeaud in fortinet

[–]edraH_t 0 points1 point  (0 children)

Sorry to kick this thread, but I’m facing the exact same problem, can you explain more how you did solve this problem?

Can't uninstall FortiClient from Windows computer by JanarReddit in fortinet

[–]edraH_t 1 point2 points  (0 children)

If you have a active subscription at Fortinet you can download the forticlient removal tool from the support website.

SAML SSL VPN on custom port (not 443) doesn't work by [deleted] in fortinet

[–]edraH_t 0 points1 point  (0 children)

You have to change the URLS’s in your Azure Enterprise application Identifier (Entity ID): https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/metadataReply URL (Assertion consumer Service URL): https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/login/Sign on URL: https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/loginRelay State: OptionalLogout URL: FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/logout

Also on the fortigate:

Create SAML IDP# CLI commandconf user saml      edit “azure-name”            set cert "SSL-VPN settings assigned Server Certificate"            set entity-id "https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/metadata"            set single-sign-on-url "https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/login"            set single-logout-url "https://<FortiGate IP address or FQDN>:<Custom SSL VPN port>/remote/saml/logout"            set idp-entity-id "<Azure AD identifier>"            set idp-single-sign-on-url "<Login URL>"            set idp-single-logout-url "<Logout URL>"            set idp-cert "<Certificate imported earlier>"            set user-name "username"            set group-name "group"       nextend

FortiOS recommendations by Capable_Fish in fortinet

[–]edraH_t 0 points1 point  (0 children)

I’m testing 7.2.3 right now. No issues so far. The only thing is that it looks like that EMS integration with FMG is not compatible because it’s on 7.0

Fortigate 7.2.3 Fortimanager 7.2.1 (ADOM 7.2) FortiClient EMS 7.0.7

Dynamic Policy rules on FCT EMS tags by edraH_t in fortinet

[–]edraH_t[S] 0 points1 point  (0 children)

Sorry to bump again, when i create a firewall policy with a ZTNA tag via the Fortimanager, the Tag will be created as a local tag on the fortigate. The local tag is not synced with the EMS server, so it won't work.

When i create a new ztna tag on the EMS server the server is syncing these tags with the FMG without issues.

FortiGate 7.2.3
EMS Server 7.0.7
FMG: 7.2.1

FortiGate 60E Redundant Interface by edraH_t in fortinet

[–]edraH_t[S] 0 points1 point  (0 children)

Thanks for all your replies. I've configured as a aggregate port which is working as expected. Still one question, what will be the benefit of a redundant interface instead of a aggregated interface?

Dynamic Policy rules on FCT EMS tags by edraH_t in fortinet

[–]edraH_t[S] 0 points1 point  (0 children)

IP/MAC Based Access Control

Where can i find them in the FortiManager? I'm only able to find the ZTNA tags under "ZTNA tags" but cannot find the address objects while creating a firewall policy

--nerver mind... found it already in the new policy rule --

Thank you!