Fortinet Security Fabic

 Core:

  • Minimum of two Fortigate devices: one root, and one or more downstream
  • At least one of: FortiAnalyzer, FortiAnalyzer Cloud, or FortiGate Cloud



























LAB notes:


on FGT, add FAZ got error, from cli:


exec log fortianalyzer test-connectivity

Failed to get FAZ's status. SSL error. (-3)




Solution:


on FAZ:

FAZVM64 # config system global

(global)# set enc-algorithm low

(global)# set ssl-low-encryption enable

(global)# set oftp-ssl-protocol tlsv1.0

(global)# end 

enc-algorithm setting change will cause all existing FGFM tunnel/WebService connection reset. Do you want to continue? (y/n)y





Local-Fortigate # show system csf
config system csf
    set status enable
    set group-name "fortinet"
    config trusted-list
        edit "xxxxx"
            set serial "xxxxx"
            set index 1
        next
    end
end

Local-Fortigate # show full system csf
config system csf

.....
    set downstream-access disable 
       !!Enable/disable downstream device access to this device's configuration and data.

    set configuration-sync default  
       !! default    Synchronize configuration for IPAM, FortiAnalyzer, FortiSandbox, and Central Management to root node.
       !! local      Do not synchronize configuration with root node


    set fabric-object-unification default
       !!on root only
       !!default    Global CMDB objects will be synchronized in Security Fabric.
       !!local      Global CMDB objects will not be synchronized to and from this device.
.....
end

Comments

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.