0 Replies Latest reply on Jul 6, 2010 3:58 PM by glenthms

    Fortigate 80C login failing

    glenthms

      We are running Fortigate firewalls across multiple locations.  I want to be able to backup a specific VDOM Configuration but am finding that I can't even get past the login part due to a banner that was imposed due to security requirements that shows up as soon as you login.  You are forced to type 'a' for accept in order to get ot the global prompt. 

      This is what we need to happen and I am not exactly sure what steps to take to get there.

      The Fortigate activity needs to login, then type 'a' to accept the agreement.  At that point I need it to do the following commands..

      config vdom

      edit VDOM_PRIMARY

      show full-configuration

       

       

       

      Here is the capture output from when it runs.

       

       


      <NEWSESSION Kiwi CatTools 3.4.0 7/6/2010 1:38:43 PM>
      <PROTOCOL=Telnet>
      <DEVICE TYPE=Fortinet.FortiOS.General>
      <ACTIVITY TYPE=Device.Backup.Running Config>
      <ACTIVITY SCRIPT=C:\Program Files\CatTools3\Scripts\Client.Device.Backup.Running Config.txt>
      <USERS NAME FOR DEVICE=f1.hamilton>
      <C OK 1:38:43 PM><R-1:38:44 PM>[13][10]FGT80C3909641701 login: <W-1:38:44 PM>*****[13]<R-1:38:44 PM>******[13][10]Password: <W-1:38:44 PM>*******[13]<R-1:38:44 PM>*********[13][10]<R-1:38:45 PM>Welcome ![13][10][13][10][13][10]W A R N I N G W A R N I N G W A R N I N G W A R N I N G [13][10]This is a private computer system. Unauthorized access or use [13][10]is prohibited and subject to prosecution and/or disciplinary [13][10]action. All use of this system constitutes consent to [13][10]monitoring at all times and users are not entitled to any [13][10]expectation of privacy. If monitoring reveals possible evidence[13][10]of violation of criminal statutes, this evidence and any other [13][10]related information, including identification information about [13][10]the user, may be provided to law enforcement officials.[13][10]If monitoring reveals violations of security regulations or[13][10]unauthorized use, employees who violate security regulations or[13][10]make unauthorized use of this system are subject to appropriate [13][10]disciplinary action.[13][10]W A R N I N G W A R N I N G W A R N I N G W A R N I N G[13][10] (Press 'a' to accept):<W-1:38:46 PM>          <D 1:38:46 PM>
      <SCRIPT VALUES>
      <HOSTNAME="">
      <PROMPT VTY="">
      <PROMPT ENABLE="">
      <PROMPT CONFIG="">


      ================================================================================
      WFMDRetVal=1 Waiting for: "Login incorrect"
      WFMDRetVal=2 Waiting for: "% Authentication failed"
      WFMDRetVal=3 Waiting for: "ogin:"
      WFMDRetVal=4 Waiting for: "assword:"
      WFMDRetVal=5 Waiting for: "          "
      WFMDBuffer="*********[13][10]welcome ![13][10][13][10][13][10]w a r n i n g w a r n i n g w a r n i n g w a r n i n g [13][10]this is a private computer system. unauthorized access or use [13][10]is prohibited and subject to prosecution and/or disciplinary [13][10]action. all use of this system constitutes consent to [13][10]monitoring at all times and users are not entitled to any [13][10]expectation of privacy. if monitoring reveals possible evidence[13][10]of violation of criminal statutes, this evidence and any other [13][10]related information, including identification information about [13][10]the user, may be provided to law enforcement officials.[13][10]if monitoring reveals violations of security regulations or[13][10]unauthorized use, employees who violate security regulations or[13][10]make unauthorized use of this system are subject to appropriate [13][10]disciplinary action.[13][10]w a r n i n g w a r n i n g w a r n i n g w a r n i n g[13][10] (press 'a' to accept):"
      ================================================================================