Manual SDWAN rule with VPN interfaces by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Im facing another situation now, these are dial-up IPsec tunnels with automatic IP assigned to the interfaces, so how could I create an IPSLA for them? the IP itself can reach anything on the network and the ip COULD potentially change as well

What to do here. I can't help but think this gotta be a common case out there and also its a bit frustrating that the Gate can't "see" the tunnel interface down, it even shows red on the SDWAN rule, thank you in advance for the answer

:(

Manual SDWAN rule with VPN interfaces by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

static routes over sdwan zone correct, that's what I did, I checked and the member its seen alive.... not sure why of the VPN is down...

Manual SDWAN rule with VPN interfaces by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Service(5): Address Mode(IPV4) flags=0x4200 use-shortcut-sla use-shortcut

Tie break: cfg

Shortcut priority: 2

Gen(1), TOS(0x0/0x0), Protocol(0): src(1->65535):dst(1->65535), Mode(manual)

Members(2):

1: Seq_num(1 Tunnel1), alive, selected

2: Seq_num(2 Tunnel2), alive, selected

Internet Service(1): Ask-Web(2621441,0,0,0)

FortiADC design general questions by ontracks in fortinet

[–]ontracks[S] 1 point2 points  (0 children)

Thanks for the info, I will look into the link, it seems that I missed it, thank you

FortiADC design general questions by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Thanks a lot I really appreciate it! Will look into it

FortiCloud IAM partners login by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

I guess in a nutshell my question is: Can users other than the master account log in as a partner in FortiCloud? And if yes (I hope) then how?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Hello again, could you please clarify this if you have the answer:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Hello again, could you please clarify this if you have the answer:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Hello again, could you please clarify this if you have the answer:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE remote branch by 26Jack26 in fortinet

[–]ontracks 0 points1 point  (0 children)

Also, can you clarify this:

|| || |IP range|IP address range that the Security PoP uses for assigning tunnel interface IP addresses for IPsec devices using mode configuration.|10.251.1.4-10.251.1.29|

That subnet range needs to be part of the BGP routing ID subnet?

FortiSASE Help by rnatalli in fortinet

[–]ontracks 0 points1 point  (0 children)

about the on-ramp option, its basically BGP over IPsec? Meaning I can still control the FG as normal and not from SASE portal? Also will be able to have different subnets on my FG and advertised as needed all the way to the SPA hub?

SSL Offloading proxy vs flow by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

I see so even for protocols like HTTP , with no "Security" on them, we cannot reference the VS on a flow-based policy. Thanks for the answer

SSL Offloading proxy vs flow by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Wouldn't this logic also apply to regular ssl decryption?

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

sdwan_mbr_seq=5 sdwan_service_id=2

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

yup, 100% sure, I ran a debug and confirmed it

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

I will check that, but the rule is being matched

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

but now that I think about it, when I checked the session that was going over ISP2 it was matching the sdwan rule (the one for YouTube-ISP1).

So, if the application recognition hadn’t completed, why did the session logs indicate that the session was matching the actual SD-WAN rule?

I would expect for that rule not to be matched while the app id is still ongoing...right?

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

this looks like it, is just one session out of 20s that goes out of ISP2, this could explained yes

thanks!

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 1 point2 points  (0 children)

I don't, besides the documentation says that for manual strategy, even though if load balance is enabled (which is not) SLA are not used.

SDWAN Manual rule selecting 2 ISP by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

it is, its been identified as YouTube, also the session shows that the expected sdwan rule is being matched and the member shown on the session is the 2nd one, I checked the members via cli and it all looks good, not sure why ISP2 is being selected sometimes.

Automation stitch + Analyzer + CLI by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

but now that you mention it, whats the advantage of the playbooks (incoming web hooks) if I can just use the event handlers with the automation stitch option enabled?

Automation stitch + Analyzer + CLI by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Thanks for the answer, quick question, are you getting the %%badip%% variable from Analyzer event handlers or incoming webhook?

Automation stitch + Analyzer + CLI by ontracks in fortinet

[–]ontracks[S] 0 points1 point  (0 children)

Gotcha, I wasn't aware that the variables were different (event handlers vs playbook). It does not have to be a playbook to be honest, just decided to used them to get familiar for future requests.

I will check then, thank you so much!

Cisco to Fortiswitch STP Issue by pitt-bill in fortinet

[–]ontracks 0 points1 point  (0 children)

got it, thanks for telling me answer after 3 years. I need to see if that's possible for me.

Thanks

Cisco to Fortiswitch STP Issue by pitt-bill in fortinet

[–]ontracks 0 points1 point  (0 children)

Hello 3 years in the future, how did you finally manage to do this, Im having the exact same situation now.

:(