Core:
- Minimum of two Fortigate devices: one root, and one or more downstream
- At least one of: FortiAnalyzer, FortiAnalyzer Cloud, or FortiGate Cloud
LAB notes:
on FGT, add FAZ got error, from cli:
exec log fortianalyzer test-connectivity
Failed to get FAZ's status. SSL error. (-3)
Solution:
on FAZ:
FAZVM64 # config system global
(global)# set enc-algorithm low
(global)# set ssl-low-encryption enable
(global)# set oftp-ssl-protocol tlsv1.0
(global)# end
enc-algorithm setting change will cause all existing FGFM tunnel/WebService connection reset. Do you want to continue? (y/n)y
Local-Fortigate # show system csf
config system csf
    set status enable
    set group-name "fortinet"
    config trusted-list
        edit "xxxxx"
            set serial "xxxxx"
            set index 1
        next
    end
end
Local-Fortigate # show full system csf
config system csf
.....
    set downstream-access disable 
       !!Enable/disable downstream device access to this device's configuration and data.
    set configuration-sync default  
       !! default    Synchronize configuration for IPAM, FortiAnalyzer, FortiSandbox, and Central Management to root node.
       !! local      Do not synchronize configuration with root node
    set fabric-object-unification default
       !!on root only
       !!default    Global CMDB objects will be synchronized in Security Fabric.
       !!local      Global CMDB objects will not be synchronized to and from this device.
.....
end
Comments
Post a Comment