Not that guy

Just more ramblings of another IT Guy

Check Fortigate interface for errors

You can use the following command to check a Fortigate interfacefor any possible errirs that may affect traffic performance

# diagnose hardware deviceinfo nic <port_name>

Fortinets Irish support number

Fortinet have setup an Irish support number which means calls to france are no longer required. While the calls are routed to the same location the costs go down.
The number for Fortinet is 1800 309 150 .

Determine FortiAP when not connected to Fortigate

When faced with the need to determine what version of firmware a FortiAP is running with connecting it to a Fortigate, connect to the FortiAP via the console and run the following command “fap-get-status”

Convert Cisco Juniper and Checkpoint configs to Fortifagate compatible

The FortiConverter converts configuration files from Juniper, Checkpoint and Cisco

The conversion process will not convert all settings but will do enough to take the major work out of moving to a Fortigate
It can be found here

Backup cisco switch config to TFTP server

To backup the running config on a cisco switch to a TFTP server
#copy running-config tftp:

To make a backup of the VLAN.dat file
#copy flash:vlan.dat tftp:

Add VLAN to cisco switch

When you need to group ports on a cisco switch into a VLAN do the following

  1. Log onto terminal
  2. enable
  3. conf t
  4. vlan 1001  (where 1001 is the vlan id to be assigned
  5. name ExampleVLANname
  6. exit

This creates the VLAN. Now it is time to assign the ports to the VLAN

Whicle still in “conf t”

  1. interface fastethernet 0/1  (where 0/1 is the port to be edited)
  2. switchport access vlan 1001
  3. no shutdown
  4. exit

Make sure to copy the running config to startup

#copy run start

Adding Fortigate to Fortimanager

When attempting to add a Fortigate to a FortiManager you may encounter the following error when trying to import the device.

“fortimanager failed to discover device with IP address”

 

If this is the case check the time settings on the Fortigate and verify they match the FortiManager

Microsoft Update breaks Fortigate SSL VPN portal

It seems that a a recent update provided by Microsoft to fix vulnerabilities in  has broken fuctionality of the SSL VPN on Fortigate devices. If you see the following error messages when browsing to the login page you may be expierencing this issue:

 

Internet Explorer:
Internet Explorer cannot display the webpage

Firefox:
The connection was reset
The connection to the server was reset while the page was loading.

Chrome:
No data received
Unable to load the web page because the server sent no data.

 

The update released by Microsoft is to fix a vulnerability in SSL 3.0 and TLS 1.0. The vulnerability could allow information disclosure if an attacker intercepts encrypted web traffic served from an affected system. More from Microsoft here

 

Fortinet’s customer support bulletin CSB-120117-1 refers to the issue. Custom firmware which includes a patch is available on demand from Fortinet support. . Forthcoming general releases will include this fix.

Steelhead Default username and password

The default username and password for Riverbed Steelhead are:

Username = admin

Password = password

 

To reset the unit to factory defaults do the following

> enable

#reset factory reload

 

 

A quick Google is sometimes easier than having to look up documentation…..

Group Policy checking

When trying to troubleshoot why a group policy does not appear to be applying to a user the following command can be used

“gpresult /r”

This will tell you what policies are applied and which ones are not.