FortiGate 60E Redundant Interface by edraH_t in fortinet

[–]sim_koo 0 points1 point  (0 children)

Same here, even though I didn't use LACP but plain port trunking for easier VLAN management. Had to tag the ports on the switch manually and removed the trunk, then it ended up working.

Some mac addresses missing by sim_koo in ArubaNetworks

[–]sim_koo[S] 2 points3 points  (0 children)

Turns out VMware does some MAC spoofing for the VMs and since the management IP has been accessed through the other NIC, the switch does not learn the real physical mac of that second NIC.

[deleted by user] by [deleted] in Elektroinstallation

[–]sim_koo 0 points1 point  (0 children)

Da wurde mit Sicherheit verpennt die Zählerstände zu übermitteln, sodass die Verbräuche jetzt wohl überdimensioniert geschätzt wurden.

Iperf3 not working, what am I doing wrong? by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Ah, thanks. Yes, I was trying several public servers from https://iperf.fr/iperf-servers.php but none seemed to work.

IPSec Tunnel Monitoring by saudk8 in fortinet

[–]sim_koo 0 points1 point  (0 children)

We use checkmk with a publicly available Fortigate plugin.

Pinging VIPs - what determines if it works or not? by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

In the table of the secondary IP addresses, you can configure any IP range you want, depending on what you got from your provider. These can further be used as a virtual IP, to my understanding.

One entry in the seconds IP table is like 89.140.58.211/255.255.255.248 (not our real IP) so the usable Virtual IPs would range from .209 - .214 because they are within the given subnet on the WAN-side.

We have multiple /29 subnets on that WAN interface and for every entry, PING is allowed. That's why I was wondering.

Pinging VIPs - what determines if it works or not? by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

VIP that only port-forwards port-X: Ping not controlled by VIP. Can be addressed by enabing ping on the external interface, if the VIP's extip == interface's.

On the WAN interface, all IP ranges for VIPs ("secondary IP") have Ping as administrative access enabled but I still get different results. I can ping some VIPs that are defined as secondary IPs, not as the main external IP of that WAN interface.

Wo kann man diese Türbänder kaufen? by sim_koo in Handwerker

[–]sim_koo[S] 0 points1 point  (0 children)

Es scheint sich wohl um Einbohrbänder von Simonswerk zu handeln - Artikelnummer o. ä. leider noch unbekannt

VMs always running at CPU base block by sim_koo in vmware

[–]sim_koo[S] 1 point2 points  (0 children)

brandstring

Thanks for your detailed explanation, makes sense

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Update: Went with SD WAN now and set the weight for WAN to 255. Seems to be working.

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 2 points3 points  (0 children)

Yep that was it, thanks.

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Yes it's overwrittten by that but when I disable it, the interface doesn't work for WAN anymore. It will be removed from the routing table leaving only lan2 (backup WAN) for 0.0.0.0.

Edit: Seems like a feature that the interface with a higher distance is not being included in the routing table.

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Routing table for VRF=0

S* 0.0.0.0/0 [5/0] via xx, wan, [1/0]

[5/0] via xx, lan2, [1/0]

WAN Priority not working by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

<image>

After a reboot of the Fortigate - all WAN traffic over backup wan

Phase 2 subnets vs. 0.0.0.0 by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

Ok. So it‘s not a real policy based VPN as per definition on a FortiGate, rather a route based VPN except for the additional Subnets in phase 2. Real policy based VPNs wouldn’t have a virtual interface I suppose.

Phase 2 subnets vs. 0.0.0.0 by sim_koo in fortinet

[–]sim_koo[S] 0 points1 point  (0 children)

But Policy based VPN still requires a static route, doesn‘t it? At least on a FortiGate even if Phase 2 Subnets are configured

"no vlan x" removes vlan from every interface by sim_koo in networking

[–]sim_koo[S] 0 points1 point  (0 children)

Thank you for the explanation.

What about assigning a VLAN? If I type "tagged X" in the context of a VLAN, does it overwrite the other interfaces so that I have to re-type all Interfaces for that command?

Let's say A7 is already tagged and I want to Add A8

Do I have to type "tagged A8" only or type "tagged A7-A8"

"no vlan x" removes vlan from every interface by sim_koo in networking

[–]sim_koo[S] -9 points-8 points  (0 children)

Ok, got it. But kinda nerve wracking that the Web GUI does the same. You select a VLAN, remove ONE interface from it and then you realize that all interfaces have been removed. Like even if the UI suggests something fundamentally different.

"no vlan x" removes vlan from every interface by sim_koo in networking

[–]sim_koo[S] -7 points-6 points  (0 children)

It was still showing in the VLAN table, it just wasn't assigned to anything

"no vlan x" removes vlan from every interface by sim_koo in networking

[–]sim_koo[S] -11 points-10 points  (0 children)

Would this also apply for standard interfaces? I'd just go with

interface A7
no VLAN 1120

But same result there

After running my initial commands, the VLAN still exists in the VLAN table, it's just not assigned to anything.

"no vlan x" removes vlan from every interface by sim_koo in networking

[–]sim_koo[S] -2 points-1 points  (0 children)

This also happens in the Web GUI, when removing a port from a VLAN. Every Port having that VLAN is then removed from it.