All looking for help with a wdiget\script for my NOC to monitor VPN status on fortigate. Ever since fortigate v7 screwed monitoring for us. Yall have any suggestions?
Following as I'd be interested in this as well.Using "List Resources" to identify VPN's was never a go on any version of FortiOS as SWI was clearly picking up the wrong info and showing, in a number of our FWs that the VPNs were up (or even down) when that quite simply wasn't the case.I then entered into a lengthy discussion with Fortinet support who auto-closed my ticket when I had the temerity to go on leave (despite telling them). The only thing I found was this KB article (probs get spam blocked now): https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-monitor-the-individual-VPN-tunnel-by-SNMP/ta-p/225491 but their support couldn't help tell me how to associate which OID to which VPN tunnel.My plan had bene once I had the building blocks to identify the OID to a tunnel, I could go off and create a UnDP for each.
Following, because I have the same issue. I think you're on the right track - I think we can essentially extend the MIB to find the answers we're looking for. I had to do something similar for another project where I was trying to track some HPE fiber port info:
https://www.solarwinds.com/documentation/en/flarehelp/npm/npm_2022-3/content/core-duplicating-an-existing-poller-sw344.htm
and
https://www.solarwinds.com/documentation/en/flarehelp/npm/npm_2022-3/content/core-creating-universal-device-pollers-sw551.htm
Select the MIB table you need
Check "Looking for an OID"
Add a custom name
Use the existing Table MIB - and update the ".#" with the row number
Select "Get"
Example: