FSSO funcionando normalmente.
FORTIGATE # diagnose debug authd fsso list
----FSSO logons----
IP: 10.0.0.2 User: SPOK Groups: CN=CONSULTANT,OU=GRUPO,OU=BILOLA,DC=MONSTRA,DC=LOCAL+CN=ACCESS_FULL,OU=GRUPO,OU=KURUMIN,DC=MONSTRA,DC=LOCAL Workstation: KABLAU MemberOf: ACCESS FULL CONSULTORIA
Total number of logons listed: 1, filtered: 0
----end of FSSO logons----
Porém ao acessar o Agente você nota está está recebendo a mensagem de "Not Verified" para estação.
Habilite o serviço Registro Remoto em Services.
Acesse o Registro do Windows HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ SecurePipeServers\winreg
Adicione o Serviço Local e coloque permissão de Leitura , caso ele já esteja configurado e o Not Verified ainda constar no agente, modifique a permissão pra Controle Total.
Verificar o consumo de CPU FORTIGATE# get system performance top Run Time: 2 days, 4 hours and 44 minutes 2U, 2S, 96I; 1843T, 1415F, 153KF authd 74 S 8.6 0.9 newcli 3364 R 2.8 0.7 ipsengine 3182 S < 0.0 4.1 pyfcgid 3319 S 0.0 1.5 pyfcgid 3318 S 0.0 1.5 proxyworker 56 S 0.0 1.4 httpsd 114 S 0.0 1.4 httpsd 117 S 0.0 1.2 pyfcgid 3316 S 0.0 1.2 pyfcgid 3317 S 0.0 1.1 cmdbsvr 36 S 0.0 1.1 miglogd 42 S 0.0 1.1 httpsd 44 S 0.0 0.8 httpsd 113 S 0.0 0.8 iked 78 S 0.0 0.8 newcli 3350 S 0.0 0.7 fgfmd 100 S 0.0 0.7 src-vis 84 S 0.0 0.7 fcnacd 75 S 0.0 0.7 cw_acd 101 S 0.0 0.6 Verificação de Tráfego FORTIGATE# get system performance firewall statistics getting traffic statistics... Browsing: 10014170 packets, 7688174225 bytes DNS: 228686 packets, 22137858 bytes E-Mail: 2657460 packets, 1255411117 bytes FTP: 0 packets, 0 bytes Gaming: 0 packets, 0 bytes IM: 0 packets, 0 bytes Newsgroups: 0 packets, 0 bytes P2P: 0 packets, 0 bytes Streaming: 0 packets, 0 bytes TFTP: 0 packets, 0 bytes VoIP: 0 packets, 0 bytes Generic TCP: 20329044 packets, 13913188326 bytes Generic UDP: 444630 packets, 127355536 bytes Generic ICMP: 379816 packets, 25450000 bytes Generic IP: 161589 packets, 5231988 bytes
Verificação de Status FORTIGATE# get system status Version: XX Virus-DB: 23.00580 Extended DB: 22.00839 IPS-DB: 5.00593 IPS-ETDB: 0.00000 Serial-Number: FORTIGATE Botnet DB: x.xxxx BIOS version: 04000023 System Part-Number: xxxx-xx Log hard disk: Available Internal Switch mode: switch Hostname: ADONAI Operation Mode: NAT Current virtual domain: root Max number of virtual domains: XX Virtual domains status: 1 in NAT mode, 0 in TP mode Virtual domain configuration: disable FIPS-CC mode: disable Current HA mode: standalone Branch point: 271 Release Version Information: GA System time: XX
Verificar a configuração das interfaces físicas FORTIGATE # get system interface physical == [onboard] ==[dmz] mode: dhcp ip: 192.168.25.103 255.255.255.0 ipv6: ::/0 status: up speed: 1000Mbps (Duplex: full) ==[internal] mode: static ip: 10.0.0.254 255.0.0.0 ipv6: ::/0 status: up speed: 1000Mbps (Duplex: full) ==[wan1] mode: pppoe ip: 179.15.44.83 255.255.255.255 ipv6: ::/0 status: up speed: 1000Mbps (Duplex: full) ==[wan2] mode: dhcp ip: 211.1.11.7 255.255.254.0 ipv6: ::/0 status: up speed: 1000Mbps (Duplex: full) ==[modem] mode: pppoe ip: 0.0.0.0 0.0.0.0 ipv6: ::/0 status: down speed: n/a Checar a tabela ARP FORTIGATE# get system arp Address Age(min) Hardware Addr Interface 200.000.00.00 92 00:01:5c:71:84:46 wan2 10.0.0.11 0 00:25:11:b4:92:54 internal 10.0.0.14 0 c8:9c:dc:c7:a9:4d internal 10.0.0.20 0 18:a9:9b:fb:db:8d internal 10.0.0.21 0 e0:69:95:20:d4:d2 internal 10.0.0.29 0 10:78:d2:ba:dd:8e internal 10.0.0.32 0 00:24:8c:a2:b6:59 internal 10.0.0.38 9 00:01:01:01:33:34 internal 10.0.0.39 0 00:25:22:4f:c9:31 internal 10.0.0.41 0 00:14:2a:7e:99:a4 internal 10.0.0.51 0 00:1e:c9:1b:0f:12 internal 10.0.0.52 0 d8:9d:67:e2:52:db internal 10.0.0.58 11 00:15:5d:28:89:02 internal 10.0.0.79 0 bc:5f:f4:cb:ed:50 internal 10.0.0.96 0 c8:9c:dc:0d:8f:83 internal 10.0.0.104 13 00:1f:e2:33:fb:5f internal 10.0.0.117 0 00:25:22:3a:12:bd internal 10.0.0.118 0 44:87:fc:b1:d3:d1 internal 10.0.0.119 0 00:26:18:96:5c:f6 internal 10.0.0.121 0 c8:9c:dc:ce:bf:59 internal 10.0.0.122 0 c8:9c:dc:ce:bf:1a internal 10.0.0.135 0 e0:69:95:20:d9:6c internal 10.0.0.155 0 a4:ba:db:04:87:50 internal 10.0.0.166 1 00:1f:e2:32:a4:17 internal 10.0.0.176 1 00:15:5d:28:89:01 internal 10.0.0.192 0 bc:ee:7b:21:ef:5b internal 10.0.0.199 0 78:45:c4:ff:bf:ac internal 10.0.0.250 2 90:02:a9:b5:3f:33 internal 192.168.25.1 0 68:15:90:fc:66:16 dmz
Checar a tabela de roteamento FORTIGATE# get router info routing-table all Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default S* 0.0.0.0/0 [1/0] via 187.100.231.2, ppp1 C 10.0.0.0/8 is directly connected, internal C 169.254.1.1/32 is directly connected, PPTPVPN_0 is directly connected, PPTPVPN_0 C XXX.XXX.XXX.XXX/32 is directly connected, ppp1 C XXX.XXX.XXX.XXX/32 is directly connected, ppp1 S 192.168.2.1/32 [1/0] is directly connected, PPTPVPN_0 C 192.168.25.0/24 is directly connected, dmz C XXX.XXX.XXX.XXX/23 is directly connected, wan2
x