We were recently troubleshooting an issue with our deployed Fortinet Fortigate 
firewalls and noticed that they're rebooting every night. The reboot was quick 
enough that it wasn't being picked up by our monitoring system (which polls 
every 5 minutes), and tracked down the issue to RANCiD. We set up remote 
syslogging and were able to glean this from the logs:
 
Feb 27 03:14:47 fortigate date=2025-02-26 time=22:02:51 devname="fortigate" 
devid="FG40FITK00000001" eventtime=1740625371766672700 tz="-0500" 
logid="0100032002" type="event" subtype="system" level="alert" vd="root" 
logdesc="Admin login failed" sn="0" user="rancid" ui="ssh(192.0.2.10)" 
method="ssh" srcip=192.0.2.10 dstip=198.51.100.10 action="login" 
status="failed" reason="ssh_key_invalid" msg="Administrator rancid login failed 
from ssh(192.0.2.10) because of invalid ssh key"
Feb 27 03:14:49 fortigate date=2025-02-26 time=22:02:53 devname="fortigate" 
devid="FG40FITK00000001" eventtime=1740625372916992740 tz="-0500" 
logid="0100032001" type="event" subtype="system" level="information" vd="root" 
logdesc="Admin login successful" sn="1740625372" user="rancid" 
ui="ssh(192.0.2.10)" method="ssh" srcip=192.0.2.10 dstip=198.51.100.10 
action="login" status="success" reason="none" profile="super_admin" 
msg="Administrator rancid logged in successfully from ssh(192.0.2.10)"
Feb 27 03:14:49 fortigate date=2025-02-26 time=22:02:53 devname="fortigate" 
devid="FG40FITK00000001" eventtime=1740625373254849640 tz="-0500" 
logid="0100044546" type="event" subtype="system" level="information" vd="root" 
logdesc="Attribute configured" user="rancid" ui="ssh(192.0.2.10)" action="Edit" 
cfgtid=1982529536 cfgpath="system.console" cfgattr="output[more->standard]" 
msg="Edit system.console "
Feb 27 03:14:56 fortigate date=2025-02-26 time=22:03:00 devname="fortigate" 
devid="FG40FITK00000001" eventtime=1740625380414160400 tz="-0500" 
logid="0100032003" type="event" subtype="system" level="information" vd="root" 
logdesc="Admin logout successful" sn="1740625372" user="rancid" 
ui="ssh(192.0.2.10)" method="ssh" srcip=192.0.2.10 dstip=198.51.100.10 
action="logout" status="success" duration=8 state="Config-Changed" 
reason="exit" msg="Administrator rancid logged out from ssh(192.0.2.10)"
Feb 27 03:14:56 fortigate date=2025-02-26 time=22:03:00 devname="fortigate" 
devid="FG40FITK00000001" eventtime=1740625380414186840 tz="-0500" 
logid="0100032102" type="event" subtype="system" level="alert" vd="root" 
logdesc="Configuration changed" user="rancid" ui="ssh(192.0.2.10)" 
msg="Configuration is changed in the admin session"
...
Feb 27 03:44:52 fortigate date=2025-02-26 time=22:32:56 devname="fortigate" 
devid="FG40FITK00000001" eventtime=1740627176128914740 tz="-0500" 
logid="0100036881" type="event" subtype="system" level="notice" vd="root" 
logdesc="Configuration reverted due to timeout" msg="Configuration reverted due 
to cfg-revert-timeout reached"
 
If the fortigate script is anything like the cisco ones, I assume rancid is 
sending some commands to disable paging, the fortigate detects this as a config 
change. Our Fortigates have cfg-save revert set, which auto-reverts the config 
because it's not being saved (which involves rebooting the device).
 
Has anyone dealt with this issue with RANCiD and cfg-save revert on Fortinet 
FortiGate firewalls? Is there any solution other than to just disable cfg-save 
revert (by setting it to automatic or manual).
 
Cheers,

Gary T. Giesen
_______________________________________________
Rancid-discuss mailing list
[email protected]
https://www.shrubbery.net/mailman/listinfo/rancid-discuss

Reply via email to