Search This Blog

Monday, April 20, 2015

Cisco ASA Logging

Cisco ASA logging configuration to syslog server includes AnyConnect users connect/disconnect events:

logging enable
logging buffered debugging
logging asdm informational
logging device-id string <STRING>
logging host <INTERFACE> <SYSLOG_IP>
logging class auth trap informational
logging class vpdn trap informational
logging class vpn trap informational
logging class vpnc trap informational
logging class webvpn trap informational

STRING – the Cisco ASA device-id which can be used for syslog filtering

INTERFACE – the interface facing the syslog server


SYSLOG_IP – the syslog server IP address

Thursday, April 16, 2015

Fortigate VDOM feature is missing



Since FortiOS 5.x the VDOM enable feature, which was on the GUI under System -> Dashboard -> Status -> System Information widget, is missing in the SOHO models.

To enable it we need to log-in into the CLI:

FGT #
FGT # config system global

FGT (global) # set vdom-admin enable

FGT (global) # end

You will be logged out for the operation to take effect
Do you want to continue? (y/n)y

exit

Tuesday, April 14, 2015

Fortigate DHCP Reservation

The following configuration require FortiOS 5.x.

CLI Configuration

Enter system DHCP server configuration:

FGT # config system dhcp server
FGT (server) # edit 1
FGT (1) # config reserved-address
FGT (reserved-address) #

Choose 1 or any other number according to your DHCP pools for the different interfaces.

For each client reservation use the following syntax with different number:

edit 1
set ip 192.168.0.110
set mac 01:65:ed:23:ba:e5
set description WIRELESS-AP
next

Please note that the reserved IP must be within the DHCP scope.

Web GUI Configuration



Go to System -> Monitor -> DHCP Monitor and Right click on the device:


 Type the desired reserved IP and comment and click OK: