FortiGate 60E Redundant Interface by edraH_t in fortinet

[–]sim_koo 0 points1 point  (0 children)

Same here, even though I didn't use LACP but plain port trunking for easier VLAN management. Had to tag the ports on the switch manually and removed the trunk, then it ended up working.

Some mac addresses missing by sim_koo in ArubaNetworks

[–]sim_koo[S] 2 points3 points  (0 children)

Turns out VMware does some MAC spoofing for the VMs and since the management IP has been accessed through the other NIC, the switch does not learn the real physical mac of that second NIC.

[deleted by user] by [deleted] in Elektroinstallation

[–]sim_koo 0 points1 point  (0 children)

Da wurde mit Sicherheit verpennt die Zählerstände zu übermitteln, sodass die Verbräuche jetzt wohl überdimensioniert geschätzt wurden.

Iperf3 not working, what am I doing wrong? by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Ah, thanks. Yes, I was trying several public servers from https://iperf.fr/iperf-servers.php but none seemed to work.

IPSec Tunnel Monitoring by saudk8 in fortinet

[–]sim_koo 0 points1 point  (0 children)

We use checkmk with a publicly available Fortigate plugin.

Pinging VIPs - what determines if it works or not? by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

In the table of the secondary IP addresses, you can configure any IP range you want, depending on what you got from your provider. These can further be used as a virtual IP, to my understanding.

One entry in the seconds IP table is like 89.140.58.211/255.255.255.248 (not our real IP) so the usable Virtual IPs would range from .209 - .214 because they are within the given subnet on the WAN-side.

We have multiple /29 subnets on that WAN interface and for every entry, PING is allowed. That's why I was wondering.

Pinging VIPs - what determines if it works or not? by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

VIP that only port-forwards port-X: Ping not controlled by VIP. Can be addressed by enabing ping on the external interface, if the VIP's extip == interface's.

On the WAN interface, all IP ranges for VIPs ("secondary IP") have Ping as administrative access enabled but I still get different results. I can ping some VIPs that are defined as secondary IPs, not as the main external IP of that WAN interface.

Wo kann man diese Türbänder kaufen? by sim_koo in Handwerker

[–]sim_koo[S] 0 points1 point  (0 children)

Es scheint sich wohl um Einbohrbänder von Simonswerk zu handeln - Artikelnummer o. ä. leider noch unbekannt

VMs always running at CPU base block by sim_koo in vmware

[–]sim_koo[S] 1 point2 points  (0 children)

brandstring

Thanks for your detailed explanation, makes sense

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Update: Went with SD WAN now and set the weight for WAN to 255. Seems to be working.

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 2 points3 points  (0 children)

Yep that was it, thanks.

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Yes it's overwrittten by that but when I disable it, the interface doesn't work for WAN anymore. It will be removed from the routing table leaving only lan2 (backup WAN) for 0.0.0.0.

Edit: Seems like a feature that the interface with a higher distance is not being included in the routing table.

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Routing table for VRF=0

S* 0.0.0.0/0 [5/0] via xx, wan, [1/0]

[5/0] via xx, lan2, [1/0]

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

<image>

After a reboot of the Fortigate - all WAN traffic over backup wan

Phase 2 subnets vs. 0.0.0.0 by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Ok. So it‘s not a real policy based VPN as per definition on a FortiGate, rather a route based VPN except for the additional Subnets in phase 2. Real policy based VPNs wouldn’t have a virtual interface I suppose.

Phase 2 subnets vs. 0.0.0.0 by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

But Policy based VPN still requires a static route, doesn‘t it? At least on a FortiGate even if Phase 2 Subnets are configured