Hi,
I really need help to solve following problem.
When I try to install device settings via FortiManager I get error
'Installation to real device failed'
It's really simple configuration just allow web management on interfaces.
Don't know how to debug this issue.
Reagrds
Peter
Hi @datakom ,
Can you share some screenshot regarding this and you may enable debug as per below and share as well the output:
diag debug application securityconsole 255
diag debug enable
(run the install again)
<pre>
FMG# Request [gui flatui_proxy:25628:1]:
{ "client": "gui flatui_proxy:25628", "id": 1, "method": "exec", "params": [{ "data": { "adom": 160, "dev_rev_comments": "", "flags": 2, "master_session": 40847, "scope": [{ "oid": 838, "vdom_oid": 1}, { "oid": 838, "vdom_oid": 3}]}, "target start": 1, "url": "install\/device"}], "root": "securityconsole", "session": 40847}
Chkperm Response [gui flatui_proxy:25628:1]:
{ "id": 1, "result": [{ "status": { "code": 0, "message": "OK"}, "url": "install\/device"}], "session": 40847}
SECURITY_CONSOLE: master_session id is 40847
Response [gui flatui_proxy:25628:1]:
{ "id": 1, "result": [{ "data": { "task": 3332}, "status": { "code": 0, "message": "OK"}, "url": "install\/device"}]}
SECURITY_CONSOLE: Load device candidates n=1 : 0 hours 0 minutes 0.001646 seconds.
SECURITY_CONSOLE: create task lines done,r=0
SECURITY_CONSOLE:
Create task lines time:: 0 hours 0 minutes 0.004241 seconds.
SECURITY_CONSOLE:
Prepare global policies time: 0 hours 0 minutes 0.000025 seconds.
SECURITY_CONSOLE: (25637) pid=1, devid = 838, idx=0, max_cpu=1.
SECURITY_CONSOLE:
Prepare device (1) data time: 0 hours 0 minutes 0.299883 seconds.
SECURITY_CONSOLE: Load dynamic obj time: 0 hours 0 minutes 0.001426 seconds.
SECURITY_CONSOLE: (1) [FG01[copy] root] Start copying shared objs to devdb, device(FG01), vdomid(root) (reason:none)
SECURITY_CONSOLE: (1) Using mm method.
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2736 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2743 is copied
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2737 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2742 is copied
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2738 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2741 is copied
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2739 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2740 is copied
SECURITY_CONSOLE: (1) [FG01[copy] root] Copy done (reason:none)
SECURITY_CONSOLE: (1) Compile time: 0 hours 0 minutes 1.531262 seconds.
SECURITY_CONSOLE: (1) Import time: 0 hours 0 minutes 0.014351 seconds.
SECURITY_CONSOLE: (1) Change dvm status time: 0 hours 0 minutes 0.000000 seconds.
SECURITY_CONSOLE: allow_global=1, dev global dirty=1, dev global changed=1
SECURITY_CONSOLE: (1) device 838 connection was down
SECURITY_CONSOLE: (1) Copy to device done
SECURITY_CONSOLE: (1) Prepare dev install file time: 0 hours 0 minutes 0.369385 seconds.
SECURITY_CONSOLE:
(1) Overall time: 0 hours 0 minutes 2.404670 seconds.
SECURITY_CONSOLE:
1 of 1 devices is done
mpool dev-storage-mpool alloc count 38k, size 1mb
Device Handle handle refcnt = 1
mpool dev-ctx-mpool alloc count 2090k, size 75mb
SECURITY_CONSOLE: [1] pid=25637: installed=0, err=0, copied=1, failed=0
SECURITY_CONSOLE: reap child 25637 (0)
SECURITY_CONSOLE: __read_copy_result,1938:Installed=0, err=0, copied=1, failed=0
SECURITY_CONSOLE: Installed=0, err=0, copied=1, failed=0, max_cpu=1
SECURITY_CONSOLE: Overall time: 0 hours 0 minutes 2.539532 seconds.
Prepare /var/tmp/securityconsole/40847/install_summary.
SECURITY_CONSOLE: (1) [Write summary[preview][] ] Write preview done (reason:none)
mpool adom-storage-mpool alloc count 0k, size 0mb
Global Handle handle refcnt = 1
mpool adom-ctx-mpool alloc count 546k, size 19mb
SECURITY_CONSOLE:
All device is done, elapse time: 0 hours 0 minutes 2.587036 seconds.
SECURITY_CONSOLE: security_console_reclaim_child,658: try to reclaim child...
SECURITY_CONSOLE: reap child 25630 (0)
SECURITY_CONSOLE: refresh wait queue, triggered session=40847
SECURITY_CONSOLE: Waitlist:
Request [gui flatui_proxy:25628:unknown]:
{ "client": "gui flatui_proxy:25628", "method": "exec", "params": [{ "data": { "adom": 160, "device": 838}, "target start": 1, "url": "\/securityconsole\/install\/preview"}], "session": 40847}
Chkperm Response [gui flatui_proxy:25628:unknown]:
{ "result": [{ "status": { "code": 0, "message": "OK"}, "url": "\/securityconsole\/install\/preview"}], "session": 40847}
Response [gui flatui_proxy:25628:unknown]:
{ "result": [{ "data": { "task": 3333}, "status": { "code": 0, "message": "OK"}, "url": "\/securityconsole\/install\/preview"}]}
SECURITY_CONSOLE: security_console_reclaim_child,658: try to reclaim child...
SECURITY_CONSOLE: reap child 25673 (0)
SECURITY_CONSOLE: refresh wait queue, triggered session=40847
SECURITY_CONSOLE: Waitlist:
Request [gui flatui_proxy:25628:unknown]:
{ "client": "gui flatui_proxy:25628", "method": "exec", "params": [{ "data": { "adom": 160, "device": 838}, "target start": 1, "url": "\/securityconsole\/preview\/result"}], "session": 40847}
Chkperm Response [gui flatui_proxy:25628:unknown]:
{ "result": [{ "status": { "code": 0, "message": "OK"}, "url": "\/securityconsole\/preview\/result"}], "session": 40847}
Response [gui flatui_proxy:25628:unknown]:
{ "result": [{ "data": { "message": "config system interface\n edit \"wan1\"\n unset allowaccess\n next\n edit \"wan2\"\n unset allowaccess\n next\n edit \"WAN_PRI\"\n set allowaccess https ping snmp http fgfm\n next\n edit \"WAN_BCK\"\n set allowaccess https ping snmp http fgfm\n next\nend\nconfig log fortianalyzer setting\n set source-ip \x.x.x.x\"\nend\nconfig firewall local-in-policy\n edit 10\n set srcaddr \"grp_ST_mgmt\"\n next\nend\n"}, "status": { "code": 0, "message": "OK"}, "url": "\/securityconsole\/preview\/result"}]}
SECURITY_CONSOLE: security_console_reclaim_child,658: try to reclaim child...
SECURITY_CONSOLE: Reclain child fail, pid=-1, error=10,No child processes.
SECURITY_CONSOLE: Waitlist:
Request [gui flatui_proxy:25801:1]:
{ "client": "gui flatui_proxy:25801", "id": 1, "method": "exec", "params": [{ "data": { "adom": 160, "dev_rev_comments": "", "flags": 0, "master_session": 40847, "scope": [{ "oid": 838, "vdom": "global", "vdom_oid": 1}, { "oid": 838, "vdom": "root", "vdom_oid": 3}]}, "target start": 1, "url": "install\/device"}], "root": "securityconsole", "session": 40847}
Chkperm Response [gui flatui_proxy:25801:1]:
{ "id": 1, "result": [{ "status": { "code": 0, "message": "OK"}, "url": "install\/device"}], "session": 40847}
SECURITY_CONSOLE: master_session id is 40847
Response [gui flatui_proxy:25801:1]:
{ "id": 1, "result": [{ "data": { "task": 3334}, "status": { "code": 0, "message": "OK"}, "url": "install\/device"}]}
SECURITY_CONSOLE: Load device candidates n=1 : 0 hours 0 minutes 0.001188 seconds.
SECURITY_CONSOLE: create task lines done,r=0
SECURITY_CONSOLE:
Create task lines time:: 0 hours 0 minutes 0.002831 seconds.
SECURITY_CONSOLE:
Prepare global policies time: 0 hours 0 minutes 0.000025 seconds.
SECURITY_CONSOLE: (25809) pid=1, devid = 838, idx=0, max_cpu=1.
SECURITY_CONSOLE:
Prepare device (1) data time: 0 hours 0 minutes 0.206570 seconds.
SECURITY_CONSOLE: Load dynamic obj time: 0 hours 0 minutes 0.001439 seconds.
SECURITY_CONSOLE: (1) [FG01[copy] root] Start copying shared objs to devdb, device(FG01), vdomid(root) (reason:none)
SECURITY_CONSOLE: (1) Using mm method.
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2736 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2743 is copied
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2737 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2742 is copied
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2738 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2741 is copied
SECURITY_CONSOLE: ipsec template obj cat: 160, oid: 2739 is copied
SECURITY_CONSOLE: ipsec template obj cat: 161, oid: 2740 is copied
SECURITY_CONSOLE: (1) [FG01[copy] root] Initiate request to install to real device (reason:none)
SECURITY_CONSOLE: (1) Compile time: 0 hours 0 minutes 1.495532 seconds.
SECURITY_CONSOLE: (1) Import time: 0 hours 0 minutes 0.148279 seconds.
SECURITY_CONSOLE: (1) Change dvm status time: 0 hours 0 minutes 0.000000 seconds.
SECURITY_CONSOLE: allow_global=1, dev global dirty=1, dev global changed=1
SECURITY_CONSOLE: (1) [FG01[copy] root] Copy to device done (reason:none)
SECURITY_CONSOLE: (1) Prepare dev install file time: 0 hours 0 minutes 0.332093 seconds.
SECURITY_CONSOLE:
(1) Overall time: 0 hours 0 minutes 2.367966 seconds.
SECURITY_CONSOLE:
1 of 1 devices is done
SECURITY_CONSOLE: adom 160 pkg_status changed
mpool dev-storage-mpool alloc count 38k, size 1mb
Device Handle handle refcnt = 1
mpool dev-ctx-mpool alloc count 2089k, size 75mb
SECURITY_CONSOLE: [1] pid=25809: installed=1, err=0, copied=1, failed=0
SECURITY_CONSOLE: reap child 25809 (0)
SECURITY_CONSOLE: __read_copy_result,1938:Installed=1, err=0, copied=1, failed=0
SECURITY_CONSOLE: Installed=1, err=0, copied=1, failed=0, max_cpu=1
SECURITY_CONSOLE: Overall time: 0 hours 0 minutes 2.511041 seconds.
Request [gui flatui_proxy:25892:1]:
{ "client": "gui flatui_proxy:25892", "id": 1, "method": "exec", "params": [{ "data": { "adom": 160}, "target start": 1, "url": "package\/cancel\/install"}], "root": "securityconsole", "session": 40847}
Chkperm Response [gui flatui_proxy:25892:1]:
{ "id": 1, "result": [{ "status": { "code": 0, "message": "OK"}, "url": "package\/cancel\/install"}], "session": 40847}
Response [gui flatui_proxy:25892:1]:
{ "id": 1, "result": [{ "status": { "code": 0, "message": "OK"}, "url": "package\/cancel\/install"}]}
Request [gui flatui_proxy:25893:1]:
{ "client": "gui flatui_proxy:25893", "id": 1, "method": "exec", "params": [{ "data": { "adom": 160}, "target start": 1, "url": "package\/cancel\/install"}], "root": "securityconsole", "session": 40847}
Chkperm Response [gui flatui_proxy:25893:1]:
{ "id": 1, "result": [{ "status": { "code": 0, "message": "OK"}, "url": "package\/cancel\/install"}], "session": 40847}
Response [gui flatui_proxy:25893:1]:
{ "id": 1, "result": [{ "status": { "code": 0, "message": "OK"}, "url": "package\/cancel\/install"}]}
SECURITY_CONSOLE: security_console_reclaim_child,658: try to reclaim child...
SECURITY_CONSOLE: reap child 25904 (0)
SECURITY_CONSOLE: refresh wait queue, triggered session=40847
SECURITY_CONSOLE: Waitlist:
SECURITY_CONSOLE: security_console_reclaim_child,658: try to reclaim child...
SECURITY_CONSOLE: reap child 25906 (0)
SECURITY_CONSOLE: refresh wait queue, triggered session=40847
SECURITY_CONSOLE: Waitlist:
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
SECURITY_CONSOLE: active session pid=25803, session=40847, ongoing (pid exists)
User | Count |
---|---|
2561 | |
1357 | |
796 | |
650 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.