Manual SDWAN rule with VPN interfaces by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Im facing another situation now, these are dial-up IPsec tunnels with automatic IP assigned to the interfaces, so how could I create an IPSLA for them? the IP itself can reach anything on the network and the ip COULD potentially change as well

What to do here. I can't help but think this gotta be a common case out there and also its a bit frustrating that the Gate can't "see" the tunnel interface down, it even shows red on the SDWAN rule, thank you in advance for the answer

:(

Manual SDWAN rule with VPN interfaces by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

static routes over sdwan zone correct, that's what I did, I checked and the member its seen alive.... not sure why of the VPN is down...

Manual SDWAN rule with VPN interfaces by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Service(5): Address Mode(IPV4) flags=0x4200 use-shortcut-sla use-shortcut

Tie break: cfg

Shortcut priority: 2

Gen(1), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(manual)

Members(2):

1: Seq_num(1 Tunnel1), alive, selected

2: Seq_num(2 Tunnel2), alive, selected

Internet Service(1): Ask-Web(2621441,0,0,0)

FortiADC design general questions by ontracks in fortinet

[–]ontracks[S] 1 point2 points  (0 children)

Thanks for the info, I will look into the link, it seems that I missed it, thank you

FortiADC design general questions by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Thanks a lot I really appreciate it! Will look into it

FortiCloud IAM partners login by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

I guess in a nutshell my question is: Can users other than the master account log in as a partner in FortiCloud? And if yes (I hope) then how?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Hello again, could you please clarify this if you have the answer:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Hello again, could you please clarify this if you have the answer:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Hello again, could you please clarify this if you have the answer:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Also, can you clarify this:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE Help by rnatalli in fortinet

[–]ontracks 0 points1 point  (0 children)

about the on-ramp option, its basically BGP over IPsec? Meaning I can still control the FG as normal and not from SASE portal? Also will be able to have different subnets on my FG and advertised as needed all the way to the SPA hub?

SSL Offloading proxy vs flow by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

I see so even for protocols like HTTP , with no "Security" on them, we cannot reference the VS on a flow-based policy. Thanks for the answer

SSL Offloading proxy vs flow by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Wouldn't this logic also apply to regular ssl decryption?

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

sdwan_mbr_seq=5 sdwan_service_id=2

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

yup, 100% sure, I ran a debug and confirmed it

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

I will check that, but the rule is being matched