<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1532920267188739518</id><updated>2026-03-29T11:31:11.614-05:00</updated><category term="fortigate"/><category term="software"/><category term="fortios"/><category term="CLI"/><category term="fortimanager"/><category term="fortianalyzer"/><category term="potential bugs"/><category term="troubleshooting"/><category term="tips+tricks"/><category term="fortimail"/><category term="configuration examples"/><category term="debug"/><category term="forticlient"/><category term="VPN"/><category term="fortiweb"/><category term="gui"/><category term="fortidb"/><category term="firmware updates"/><category term="ipsec"/><category term="access lists"/><category term="dynamic routing"/><category term="fortiap"/><category term="fortigate-one"/><category term="hardware"/><category term="interface mode"/><category term="ipv6"/><category term="SSL VPN"/><category term="application control"/><category term="cloud"/><category term="don&#39;t try this at home"/><category term="experimental"/><category term="forticarrier"/><category term="fortiscan"/><category term="fortiswitch"/><category term="fortivm"/><category term="links"/><category term="new features"/><category term="ospf"/><category term="performance"/><category term="review"/><category term="shortcuts"/><category term="totally obvious things"/><title type='text'>Firewall Guru</title><subtitle type='html'>A real world resource for Fortinet firewalls including How-Tos and Frequently Asked Questions</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/15029150331907372597</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='21' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjunzvCKfjKXRIO43xmxbcHazlrn-0AuKC47PoPf7hh5O8F3JT42xdpMamP3XKhtRp1S4XMg4sS6y8LD-8_YmsYUYwroKvjM7NorlxO8H2-gQmfxnt8HGg20WGBtvXnYg/s220/n522347016_8176.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>207</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-5312771380009131683</id><published>2022-06-13T15:29:00.000-05:00</published><updated>2022-06-13T15:29:03.947-05:00</updated><title type='text'>FortiClient - RSA New Pin Is Wrong (-7201) error</title><summary type="text">This message is somewhat misleading.One of our users was attempting to login to the VPN and their Active Directory password had expired.When they tried to follow the steps to enter their new password they received the above error message.The root cause was that the new password they were trying to use did not meet the Active Directory password complexity requirements.So while the error message </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/5312771380009131683/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/5312771380009131683?isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5312771380009131683'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5312771380009131683'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2022/06/forticlient-rsa-new-pin-is-wrong-7201.html' title='FortiClient - RSA New Pin Is Wrong (-7201) error'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi79nVXUqYej2CIngcN8eRwfAp6qqljJYAwk_PjGZ7pmo543KRZ_rXiESy2ZkipU4IGN8F9lFRfGm_YSKtXRwiB5rp8aQG2gOWxf3NPJMt7zZNUM54fB52qAtDieg3Zsgcdi1DRaWQADoS4WJyaU4KPl6GL36jPBqjfXubnAuW42Fk1Xo_PGh926ULZ/s72-c/ac862fd86d574d059e632916a7da77ec.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-6239415988207727760</id><published>2022-03-23T22:14:00.000-05:00</published><updated>2022-03-23T22:14:07.614-05:00</updated><title type='text'>Problems with FortiClient 7.0.2 and Firefox</title><summary type="text">&amp;nbsp;We noticed during recent testing that FortiClient 7.0.2 has an issue with Firefox, specifically any Google services such as Google Search and GMail.While web-filtering was enabled on the client an initial access to Google would work in Firefox, however after a minute or so nothing would happen when trying to refresh the browser session.The root cause appears to be related to 0RTT (Zero </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/6239415988207727760/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/6239415988207727760?isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6239415988207727760'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6239415988207727760'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2022/03/problems-with-forticlient-702-and.html' title='Problems with FortiClient 7.0.2 and Firefox'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-2821461467749624593</id><published>2020-09-02T16:21:00.002-05:00</published><updated>2020-09-02T16:21:11.920-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="debug"/><category scheme="http://www.blogger.com/atom/ns#" term="forticlient"/><category scheme="http://www.blogger.com/atom/ns#" term="gui"/><category scheme="http://www.blogger.com/atom/ns#" term="potential bugs"/><title type='text'>FortiClient EMS Cloud Login Problem - Solved</title><summary type="text">&amp;nbsp;I noticed today that when you logout from your cloud based FortiClient EMS instance and then try to login again you receive the following error message in Firefox:{&quot;result&quot;: {&quot;retval&quot;: 0, &quot;message&quot;: &quot;Local signin is not available in EMS Cloud&quot;}}&amp;nbsp;&amp;nbsp;It appears to be a cookie related issue in Firefox. When I delete any cookies in the browser referencing &quot;forticlient&quot; I am able to </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/2821461467749624593/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/2821461467749624593?isPopup=true' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2821461467749624593'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2821461467749624593'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2020/09/forticlient-ems-cloud-login-problem.html' title='FortiClient EMS Cloud Login Problem - Solved'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs0UzOMp7tJ4GTUONfkgKvAFamO8pybQY9ag_Vl0p0kM97vCLCMwGx0SJNw5srwwpixlZXpui13wS7HQDB-FPHZpYSbRFPiS64ouBeYsNpd5kdSZKg4P_ulEIBeAKPVGTsrWbM0xqFrYU/s72-c/Screenshot_2.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-2931824185316942120</id><published>2018-08-23T14:38:00.001-05:00</published><updated>2018-08-23T14:40:06.342-05:00</updated><title type='text'>Beware - Upgrade to FortiOS 5.6.3+ with IPSec VPNs</title><summary type="text">If you are upgrading from version 5.4.5, 5.4.6, or 5.4.7 to FortiOS 5.6.3, the IPsec phase1 psksecret setting might be lost. To avoid this, upgrade to FortiOS 5.6.2 and then to 5.6.3. If the psksecret setting is lost, you will need to reconfigure it after upgrading.

Even if you have saved configs you will need to reset the passwords since FortiOS 5.6.3 will not allow you to paste the encrypted </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/2931824185316942120/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/2931824185316942120?isPopup=true' title='23 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2931824185316942120'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2931824185316942120'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2018/08/beware-upgrade-to-fortios-563-with.html' title='Beware - Upgrade to FortiOS 5.6.3+ with IPSec VPNs'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpuMu7UBkrbIU0YA5d7ydqRne-ZZ2FG6KztmMvr6tgQ6YE41wIDz-R-eTtePMCTdHZbSkDZWGEzz0hYrhyjZ3ZtGISGVIV1zLL7SquaKd9R_JzBqen6pdnBdXYZ9rIXYxMKYtn3bbO3Fg/s72-c/Screenshot_1.png" height="72" width="72"/><thr:total>23</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-2550810785987995989</id><published>2016-12-29T14:58:00.002-06:00</published><updated>2016-12-29T14:58:38.564-06:00</updated><title type='text'>Cisco ASA to Fortigate conversion</title><summary type="text">I&#39;m getting ready to migrate a number of Cisco ASA firewalls to Fortigate.
Fortinet sells a ~$4000 license for their FortiConverter which I didn&#39;t want to spend.

My goal was to automate the conversion of objects which will save time and virtually eliminate the possibility of typos.

The below perl script is what I came up with.

-Syntax: &quot;perl converter.pl &amp;lt;ASA config file name&amp;gt;&quot; (e.g. &quot;</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/2550810785987995989/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/2550810785987995989?isPopup=true' title='16 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2550810785987995989'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2550810785987995989'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2016/12/cisco-asa-to-fortigate-conversion.html' title='Cisco ASA to Fortigate conversion'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>16</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-4350056212860214926</id><published>2016-12-29T13:39:00.003-06:00</published><updated>2016-12-29T13:41:08.700-06:00</updated><title type='text'>How-to: Automatically revert a config on a FortiGate </title><summary type="text">
There&#39;s nothing worse than remotely configuring a firewall and then 
loosing access once you&#39;ve made your changes. Having a failsafe 
mechanism in place to revert to a previous config automatically will 
help you minimise potential issues and save you alot of stress! Luckily FortiOS gives you a few options on how to save your running 
config which we&#39;ll discuss below.

We&#39;ll go through each of </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/4350056212860214926/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/4350056212860214926?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/4350056212860214926'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/4350056212860214926'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2016/12/how-to-automatically-revert-config-on.html' title='How-to: Automatically revert a config on a FortiGate '/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-5525203452843719716</id><published>2015-10-01T15:24:00.001-05:00</published><updated>2015-10-01T15:24:17.020-05:00</updated><title type='text'>HA Console authentication when using remote Auth</title><summary type="text">When you login to the CLI via a RADIUS or TACACS account and you then use &quot;exec ha manage 1&quot; to manage the subordinate unit you have to re-enter your user credentials.
I remember seeing this in my TAM days. I&#39;ll submit a feature request to have the authentication carried over.</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/5525203452843719716/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/5525203452843719716?isPopup=true' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5525203452843719716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5525203452843719716'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2015/10/ha-console-authentication-when-using.html' title='HA Console authentication when using remote Auth'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-2925575528919665494</id><published>2015-08-21T10:37:00.000-05:00</published><updated>2015-08-21T10:37:05.590-05:00</updated><title type='text'>Disable SSL VPN Portal</title><summary type="text">Here&#39;s one for the serious customizer.
If you are wanting to only accept IPSEC VPN connections via FortiClient and you don&#39;t want/need the SSL VPN portal here&#39;s the CLI config for turning off the SSL VPN page.

config vpn ssl settings
 set sslvpn-enable disable
end 
</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/2925575528919665494/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/2925575528919665494?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2925575528919665494'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2925575528919665494'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2015/08/disable-ssl-vpn-portal.html' title='Disable SSL VPN Portal'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-431461926922524994</id><published>2015-08-19T11:14:00.002-05:00</published><updated>2015-08-19T11:14:40.708-05:00</updated><title type='text'></title><summary type="text">Wow .. it&#39;s been a while :)
Haven&#39;t worked at Fortinet since January of this year. But my new gig just invested in Fortinet equipment. So stay tuned for new posts!</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/431461926922524994/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/431461926922524994?isPopup=true' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/431461926922524994'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/431461926922524994'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2015/08/wow.html' title=''/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-8381485651944340501</id><published>2014-11-03T17:12:00.000-06:00</published><updated>2014-11-03T17:12:09.559-06:00</updated><title type='text'>HA with different revision hardware</title><summary type="text">There may come a time when you have rev.1 and rev.2 hardware of a particular platform that you&#39;re trying to form an HA cluster with. To successfully accomplish this you need to tell the firewall to ignore the difference in hardware revision.

In FortiOS 4.3 and earlier:
config system global
set ignore-hardware-revision enable
end 

In FortiOS 5.0 and later:
exec ha ignore-hardware-revision enable</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/8381485651944340501/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/8381485651944340501?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8381485651944340501'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8381485651944340501'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/11/ha-with-different-revision-hardware.html' title='HA with different revision hardware'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-5918543709856132190</id><published>2014-09-25T16:47:00.000-05:00</published><updated>2014-09-25T16:47:34.318-05:00</updated><title type='text'>More Shellshock Info</title><summary type="text">
FortiGuard Advisory with status of affected products

FortiGuard Shellshock Blog Post</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/5918543709856132190/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/5918543709856132190?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5918543709856132190'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5918543709856132190'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/09/more-shellshock-info.html' title='More Shellshock Info'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-6046364219741445872</id><published>2014-09-25T10:44:00.001-05:00</published><updated>2014-09-25T10:44:38.018-05:00</updated><title type='text'>Bash Vulnerability Signatures</title><summary type="text">The newly announced Bash / Shellshock vulnerability is document in CVE2014-6271.

Here are IPS rules for immediate manual deployment. Fortinet has already generated
a new IPS signature, Bash.Function.Definitions.Remote.Code.Execution, which will be released in the next few hours after it has passed the QA testing process.

Fortigate firewalls do NOT use Bash and are not vulnerable to this exploit</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/6046364219741445872/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/6046364219741445872?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6046364219741445872'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6046364219741445872'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/09/bash-vulnerability-signatures.html' title='Bash Vulnerability Signatures'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-8529560756358184575</id><published>2014-09-15T10:39:00.003-05:00</published><updated>2014-09-15T10:40:13.233-05:00</updated><title type='text'>Switching interface modes</title><summary type="text">By default smaller Fortigate units such as the 60D or 90D series combine their interfaces into a virtual switch. Via a configuration change all ports can be assigned to their own broadcast domains. This is useful for example if you want to configure a number of different trunk ports.

By default the firewalls are also configured with basic policies that permit and NAT outbound traffic as well as </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/8529560756358184575/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/8529560756358184575?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8529560756358184575'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8529560756358184575'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/09/switching-interface-modes.html' title='Switching interface modes'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-8079060183132098009</id><published>2014-08-27T13:57:00.001-05:00</published><updated>2014-08-27T13:57:14.697-05:00</updated><title type='text'>Silence of the Local Broadcasts</title><summary type="text">When setting up a new FortiGate you tend to receive a lot of logs for traffic destined to 255.255.255.255 (aka the global broadcast address) or x.x.x.255 (your local subnet broadcast address). To reduce clutter and have the firewall drop these broadcasts silently use:

FortiAnalyzer:
config log fortianalyzer filter&amp;nbsp;&amp;nbsp;&amp;nbsp; set local-traffic disableend

Log Disk
config log disk filter </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/8079060183132098009/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/8079060183132098009?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8079060183132098009'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8079060183132098009'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/08/silence-of-local-broadcasts.html' title='Silence of the Local Broadcasts'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-9018177547882359456</id><published>2014-07-29T13:42:00.002-05:00</published><updated>2014-07-29T13:43:09.097-05:00</updated><title type='text'>New Feature Highlight: Dedicated Management CPU</title><summary type="text">In FortiOS 5.2 and higher you can dedicate one of the CPUs for management access, in other words GUI and CLI access. If the system is running under extremely high loads this will guarantee access to management functions.

This feature is available in 2U firewalls and blades only that have multiple CPUs.

To enable this feature (default disabled):

conf system npu&amp;nbsp;&amp;nbsp;&amp;nbsp; set </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/9018177547882359456/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/9018177547882359456?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/9018177547882359456'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/9018177547882359456'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/07/new-feature-highlight-dedicated.html' title='New Feature Highlight: Dedicated Management CPU'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-6105653845994740639</id><published>2014-07-21T09:26:00.001-05:00</published><updated>2014-07-21T09:26:50.607-05:00</updated><title type='text'>Fortinet Diagnostic WIKI</title><summary type="text">Very useful resource for diagnostic commands.

http://wiki.diagnose.fortinet.com:1080/index.php/Overview</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/6105653845994740639/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/6105653845994740639?isPopup=true' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6105653845994740639'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6105653845994740639'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/07/fortinet-diagnostic-wiki.html' title='Fortinet Diagnostic WIKI'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-7153786563664434551</id><published>2014-05-15T14:18:00.001-05:00</published><updated>2014-05-15T14:23:04.323-05:00</updated><title type='text'>Exporting a local certificate with private key</title><summary type="text">If you have a local certificate on the Fortigate and the original 
certificate request (csr) was generated on the Fortigate then the 
private key resides on the Fortigate and you need to export this in 
order to install your signed certificate on another server.
The problem with the Fortigate certificate export feature is that it 
will only export the signed certificate (which you likely already </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/7153786563664434551/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/7153786563664434551?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/7153786563664434551'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/7153786563664434551'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/05/exporting-local-certificate-with.html' title='Exporting a local certificate with private key'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-5667902103792230186</id><published>2014-04-11T16:15:00.002-05:00</published><updated>2014-04-11T16:19:48.969-05:00</updated><title type='text'>Heartbleed - Part 3</title><summary type="text">Anyone running FortiOS 5.0 GA to 5.0.6 can protect the firewall itself by


limiting access to the firewall&#39;s Admin interface using &quot;Trusted Hosts&quot; in the Admin profiles

or

&amp;nbsp;configuring an interface policy as per below


config firewall interface-policy

    edit 1
        set interface &quot;wan1&quot;
        set srcaddr &quot;all&quot;
        set dstaddr &quot;all&quot;
        set service &quot;HTTPS&quot;
        set </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/5667902103792230186/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/5667902103792230186?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5667902103792230186'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5667902103792230186'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/04/heartbleed-part-3.html' title='Heartbleed - Part 3'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-6841989905614835998</id><published>2014-04-09T10:41:00.003-05:00</published><updated>2014-04-09T10:41:32.623-05:00</updated><title type='text'>Heartbleed - Part 2</title><summary type="text">Here is some more information from FortiGuard
http://www.fortiguard.com/advisory/FG-IR-14-011/</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/6841989905614835998/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/6841989905614835998?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6841989905614835998'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6841989905614835998'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/04/heartbleed-part-2.html' title='Heartbleed - Part 2'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-9009628867785926627</id><published>2014-04-08T13:51:00.001-05:00</published><updated>2014-04-08T13:52:55.923-05:00</updated><title type='text'>Exporting firewall rules to a CSV</title><summary type="text">Sometimes it can be useful to export and analyze rules in a CSV type format. This comes in especially handy when working with long and complex firewall policies.

I came across the perl script below that takes firewall policies from a text file and performs the CSV conversion for you.

Syntax: csvparse.pl rules.txt

&amp;lt;rules.txt&amp;gt; should be in the following format:

config firewall policy
</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/9009628867785926627/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/9009628867785926627?isPopup=true' title='24 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/9009628867785926627'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/9009628867785926627'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/04/exporting-firewall-rules-to-csv.html' title='Exporting firewall rules to a CSV'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>24</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-6233674409672906870</id><published>2014-04-08T10:48:00.000-05:00</published><updated>2014-04-08T10:53:55.262-05:00</updated><title type='text'>Heartbleed OpenSSL Vulnerability</title><summary type="text">You can use the following custom IPS signature to detect and block the recently disclosed OpenSSL &quot;Heartbleed&quot; vulnerability.


F-SBID( --name &quot;OpenSSL.TLS.Heartbeat.Information.Disclosure&quot;; --protocol tcp;&amp;nbsp; --flow from_client; --service SSL; --pattern &quot;|18|&quot;; --context packet; --within 1,context; --byte_test 2,&amp;gt;,255,2,relative; )
More information about the vulnerability can be found here</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/6233674409672906870/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/6233674409672906870?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6233674409672906870'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/6233674409672906870'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/04/heartbleed-openssl-vulnerability.html' title='Heartbleed OpenSSL Vulnerability'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-2787594621534727898</id><published>2014-03-18T14:12:00.001-05:00</published><updated>2014-03-18T14:12:43.947-05:00</updated><title type='text'>FortiAuthenticator SCEP</title><summary type="text">You can use SCEP to auto-enroll devices in FortiAuthenticator as well as retrieve CRLs. When configuring this on a firewall or other device the correct URL to use is:

http://&amp;lt;fortiauth IP&amp;gt;/cert/scep

I have asked the technical documentation team to add this to the FortiAuthenticator Admin Guide.</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/2787594621534727898/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/2787594621534727898?isPopup=true' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2787594621534727898'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2787594621534727898'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/03/fortiauthenticator-scep.html' title='FortiAuthenticator SCEP'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-8658447476107909345</id><published>2014-03-14T09:20:00.005-05:00</published><updated>2014-09-15T13:38:37.905-05:00</updated><title type='text'>Logging DNS Requests</title><summary type="text">When inspecting DNS traffic it can be useful to log the domain names that are part of the DNS request. In order to accomplish this you can use a custom IPS signature:


IPS
Custom Signature: F-SBID( --attack_id 4153; --name DOM-ALL; --protocol udp;
--service dns; --log DNS_QUERY;)


The signature below allows you to search for and prevent DNS lookups for a specified domain, in this example </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/8658447476107909345/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/8658447476107909345?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8658447476107909345'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/8658447476107909345'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/03/logging-dns-requests.html' title='Logging DNS Requests'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-2536958424399741898</id><published>2014-03-05T12:44:00.003-06:00</published><updated>2014-03-20T15:22:48.245-05:00</updated><title type='text'>Deleting VDOMs</title><summary type="text">VDOMs have quite a number of dependencies that need to be deleted before you can get rid of the VDOM itself. Below is a useful little script that goes through all the sections and purges them so the VDOM can be deleted. Adjust it as needed.

## This script needs to be run interactively. In other words you cannot copy and paste the whole script. You have to acknowledge each purge command. 
## </summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/2536958424399741898/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/2536958424399741898?isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2536958424399741898'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/2536958424399741898'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/03/deleting-vdoms.html' title='Deleting VDOMs'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1532920267188739518.post-5243408322303453431</id><published>2014-02-27T12:15:00.003-06:00</published><updated>2014-02-27T12:16:30.233-06:00</updated><title type='text'>Replacing firewall hardware which is logging to a FortiAnalyzer</title><summary type="text">When you replace firewall hardware that&#39;s reporting into a FortiAnalyzer due to an RMA or other failure it&#39;s important to make sure you update FortiAnalyzer with the new serial number of the device. Use the following command on the FAZ:

execute device replace &amp;lt;old serial number&amp;gt; &amp;lt;name&amp;gt; &amp;lt;new serial number&amp;gt;</summary><link rel='replies' type='application/atom+xml' href='http://firewallguru.blogspot.com/feeds/5243408322303453431/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/1532920267188739518/5243408322303453431?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5243408322303453431'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1532920267188739518/posts/default/5243408322303453431'/><link rel='alternate' type='text/html' href='http://firewallguru.blogspot.com/2014/02/replacing-firewall-hardware-and.html' title='Replacing firewall hardware which is logging to a FortiAnalyzer'/><author><name>Sebastian</name><uri>http://www.blogger.com/profile/08701147779838193450</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>