We have changed the config file to the below, we only really want the Remote Access tab available or at the very least be the default tab when opened but regardless of changes made it opens on the Compliance & Telemetry tab and also shows the vulnerability tab aswell.
These are the parts of our config that I understand should control this:
Forticlient Config ssytem settings:
<default_tab>VPN</default_tab>
Under Endpoint Control:
<ui> <display_antivirus>0</display_antivirus> <display_webfilter>0</display_webfilter> <display_firewall>0</display_firewall> <display_vpn>1</display_vpn> <display_vulnerability_scan>0</display_vulnerability_scan> <display_sandbox>0</display_sandbox> <display_compliance>0</display_compliance> <hide_compliance_warning>0</hide_compliance_warning> <registration_dialog> <show_profile_details>1</show_profile_details> </registration_dialog> </ui>
Driving us crazy what are we missing?
Thank you
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
This is straight from our EMS server which creates the XML from the options selected. On this profile we are hiding everything except VPN and Webfilter. Note though that this is directly below the close of the "System" tags. I can't see your post while posting this one but it looks correct to me.... Perhaps you can submit your entire XML and I can compare it vs what is in mine generated via EMS?
</system>
<endpoint_control>
<ui> <display_antivirus>0</display_antivirus> <display_sandbox>0</display_sandbox> <display_webfilter>1</display_webfilter> <display_firewall>0</display_firewall> <display_vpn>1</display_vpn> <display_vulnerability_scan>0</display_vulnerability_scan> <hide_compliance_warning>1</hide_compliance_warning> </ui>
Hi FCB,
Thank you for the reply, tried to change the lay out similar to yours but still the same so will copy my whole XML below:
<?xml version="1.0" encoding="UTF-8" ?>
<forticlient_configuration>
<forticlient_version>6.0.2.128</forticlient_version>
<version>6.0.2</version>
<exported_by_version>6.0.2.0128</exported_by_version>
<date>2021/07/08</date>
<partial_configuration>0</partial_configuration>
<os_version>windows</os_version>
<os_architecture>x64</os_architecture>
<system>
<ui>
<disable_backup>0</disable_backup>
<ads>1</ads>
<default_tab>VPN</default_tab>
<flashing_system_tray_icon>1</flashing_system_tray_icon>
<hide_system_tray_icon>0</hide_system_tray_icon>
<suppress_admin_prompt>0</suppress_admin_prompt>
<password />
<culture_code>os-default</culture_code>
<gpu_rendering>0</gpu_rendering>
<replacement_messages>
<quarantine>
<title>
<title>
<![CDATA[]]>
</title>
</title>
<statement>
<remediation>
<![CDATA[]]>
</remediation>
</statement>
<remediation>
<remediation>
<![CDATA[]]>
</remediation>
</remediation>
</quarantine>
</replacement_messages>
</ui>
<log_settings>
<onnet_local_logging>1</onnet_local_logging>
<level>6</level>
<!--0=emergency, 1=alert, 2=critical, 3=error, 4=warning, 5=notice, 6=info, 7=debug, -->
<log_events>ipsecvpn,sslvpn,scheduler,update,firewall,shield,endpoint,configd</log_events>
<!--ipsecvpn=ipsec vpn, sslvpn=ssl vpn, firewall=firewall, av=antivirus, antiexploit=antiexploit, sandboxing=sandboxing, webfilter=webfilter, vuln=vulnerability scan, wanacc=wan acceleration, fssoma=single sign-on mobility for fortiauthenticator, scheduler=scheduler, update=update, proxy=fortiproxy, shield=fortishield, endpoint=endpoint control, configd=configuration, -->
<remote_logging>
<log_upload_enabled>0</log_upload_enabled>
<log_upload_server />
<log_upload_ssl_enabled>1</log_upload_ssl_enabled>
<log_retention_days>90</log_retention_days>
<log_upload_freq_minutes>120</log_upload_freq_minutes>
<log_generation_timeout_secs>900</log_generation_timeout_secs>
<netlog_categories>7</netlog_categories>
<log_protocol>faz</log_protocol>
<netlog_server />
</remote_logging>
</log_settings>
<proxy>
<update>0</update>
<online_scep>0</online_scep>
<type>http</type>
<address />
<port>80</port>
<username>
<![CDATA[**]]>
</username>
<password>
<![CDATA[**]]>
</password>
</proxy>
<update>
<use_custom_server>0</use_custom_server>
<restrict_services_to_regions />
<server />
<port>80</port>
<timeout>60</timeout>
<failoverport />
<fail_over_to_fdn>1</fail_over_to_fdn>
<use_proxy_when_fail_over_to_fdn>1</use_proxy_when_fail_over_to_fdn>
<auto_patch>0</auto_patch>
<submit_virus_info_to_fds>1</submit_virus_info_to_fds>
<submit_vuln_info_to_fds>1</submit_vuln_info_to_fds>
<!-- update_action applies to software updates only and can be one of: notify_only, download_and_install, download_only, disable -->
<update_action>disable</update_action>
<scheduled_update>
<enabled>1</enabled>
<type>interval</type>
<daily_at>01:24</daily_at>
<update_interval_in_hours>1</update_interval_in_hours>
</scheduled_update>
</update>
<fortiproxy>
<enabled>0</enabled>
<enable_https_proxy>1</enable_https_proxy>
<http_timeout>60</http_timeout>
<client_comforting>
<pop3_client>1</pop3_client>
<pop3_server>1</pop3_server>
<smtp>1</smtp>
</client_comforting>
<selftest>
<enabled>1</enabled>
<last_port>**</last_port>
<notify>1</notify>
</selftest>
</fortiproxy>
<certificates>
<crl>
<ocsp>
<enabled>0</enabled>
<server />
<port />
</ocsp>
</crl>
<hdd />
<ca />
</certificates>
</system>
<endpoint_control>
<ui>
<display_antivirus>0</display_antivirus>
<display_webfilter>0</display_webfilter>
<display_firewall>10/display_firewall>
<display_vpn>1</display_vpn>
<display_vulnerability_scan>0</display_vulnerability_scan>
<display_sandbox>0</display_sandbox>
<display_compliance>0</display_compliance>
<hide_compliance_warning>0</hide_compliance_warning>
<registration_dialog>
<show_profile_details>1</show_profile_details>
</registration_dialog>
</ui>
<enabled>1</enabled>
<!--Format: <probe_timeout:keep_alive_timeout> in seconds. Default: <1:5>. Note: changing connect timeouts might affect performance.-->
<socket_connect_timeouts>1:5</socket_connect_timeouts>
<system_data>**</system_data>
<disable_unregister>0</disable_unregister>
<disable_fgt_switch>0</disable_fgt_switch>
<show_bubble_notifications>1</show_bubble_notifications>
<avatar_enabled>0</avatar_enabled>
<onnet_addresses>
<address />
</onnet_addresses>
<onnet_mac_addresses />
<alerts>
<notify_server>1</notify_server>
<alert_threshold>1</alert_threshold>
</alerts>
<fortigates>
<fortigate>
<serial_number />
<name />
<registration_password />
<addresses />
</fortigate>
</fortigates>
<local_subnets_only>0</local_subnets_only>
<notification_server />
<nac>
<processes>
<process id="" rule="present">
<signature name="" />
</process>
</processes>
<files>
<path id="" />
</files>
<registry>
<path id="" />
</registry>
</nac>
</endpoint_control>
<vpn>
<options>
<current_connection_name>**</current_connection_name>
<current_connection_type>**</current_connection_type>
<autoconnect_tunnel />
<autoconnect_only_when_offnet>0</autoconnect_only_when_offnet>
<keep_running_max_tries>0</keep_running_max_tries>
<disable_internet_check>0</disable_internet_check>
<minimize_window_on_connect>1</minimize_window_on_connect>
<allow_personal_vpns>1</allow_personal_vpns>
<disable_connect_disconnect>0</disable_connect_disconnect>
<show_vpn_before_logon>0</show_vpn_before_logon>
<use_windows_credentials>1</use_windows_credentials>
<use_legacy_vpn_before_logon>0</use_legacy_vpn_before_logon>
<show_negotiation_wnd>0</show_negotiation_wnd>
<vendor_id />
</options>
<sslvpn>
<options>
<enabled>1</enabled>
<keep_connection_alive>0</keep_connection_alive>
<prefer_sslvpn_dns>1</prefer_sslvpn_dns>
<dnscache_service_control>0</dnscache_service_control>
<!--0=disable dnscache service, 1=do not touch dnscache service, 2=restart dnscache service, 3=sc control dnscache paramchange-->
<use_legacy_ssl_adapter>0</use_legacy_ssl_adapter>
<preferred_dtls_tunnel>0</preferred_dtls_tunnel>
<no_dhcp_server_route>0</no_dhcp_server_route>
<no_dns_registration>0</no_dns_registration>
<disallow_invalid_server_certificate>0</disallow_invalid_server_certificate>
</options>
<connections />
</sslvpn>
<ipsecvpn>
<options>
<enabled>1</enabled>
<beep_if_error>0</beep_if_error>
<usewincert>1</usewincert>
<use_win_current_user_cert>1</use_win_current_user_cert>
<use_win_local_computer_cert>1</use_win_local_computer_cert>
<block_ipv6>1</block_ipv6>
<uselocalcert>0</uselocalcert>
<usesmcardcert>1</usesmcardcert>
<enable_udp_checksum>0</enable_udp_checksum>
<disable_default_route>0</disable_default_route>
<show_auth_cert_only>0</show_auth_cert_only>
<check_for_cert_private_key>0</check_for_cert_private_key>
<enhanced_key_usage_mandatory>0</enhanced_key_usage_mandatory>
</options>
<connections>
<connection>
<name>**</name>
<single_user_mode>0</single_user_mode>
<!--when single_user_mode=1 the tunnel cannot be connected if more than one user is logged on the computer-->
<type>manual</type>
<ui>
<show_passcode>0</show_passcode>
<show_remember_password>0</show_remember_password>
<show_alwaysup>0</show_alwaysup>
<show_autoconnect>0</show_autoconnect>
<save_username>0</save_username>
</ui>
<ike_settings>
<version>1</version>
<implied_SPDO>0</implied_SPDO>
<implied_SPDO_timeout>0</implied_SPDO_timeout>
<xauth_timeout>0</xauth_timeout>
<prompt_certificate>*</prompt_certificate>
<description />
<server>**</server>
<authentication_method>**</authentication_method>
<auth_data>
<certificate>
<common_name>
<match_type>
<![CDATA[simple]]>
</match_type>
<pattern>
<![CDATA[VPN UserCert]]>
</pattern>
</common_name>
<issuer>
<match_type>
<![CDATA[simple]]>
</match_type>
<pattern>
<![CDATA[NORSUBCA01]]>
</pattern>
</issuer>
</certificate>
</auth_data>
<mode>aggressive</mode>
<dhgroup>5;</dhgroup>
<key_life>**</key_life>
<localid />
<peerid />
<nat_traversal>1</nat_traversal>
<mode_config>1</mode_config>
<enable_local_lan>0</enable_local_lan>
<nat_alive_freq>5</nat_alive_freq>
<dpd>1</dpd>
<dpd_retry_count>3</dpd_retry_count>
<dpd_retry_interval>5</dpd_retry_interval>
<enable_ike_fragmentation>0</enable_ike_fragmentation>
<xauth>
<enabled>1</enabled>
<prompt_username>1</prompt_username>
<username>**</username>
<password />
</xauth>
<proposals>
<proposal>**</proposal>
<proposal>**</proposal>
</proposals>
</ike_settings>
<ipsec_settings>
<remote_networks>
<network>
<addr>**</addr>
<mask>**</mask>
</network>
<network>
<addr>::/0</addr>
<mask>::/0</mask>
</network>
</remote_networks>
<dhgroup>5</dhgroup>
<key_life_type>seconds</key_life_type>
<key_life_seconds>43200</key_life_seconds>
<key_life_Kbytes>5120</key_life_Kbytes>
<replay_detection>0</replay_detection>
<pfs>0</pfs>
<use_vip>1</use_vip>
<virtualip>
<type>modeconfig</type>
<ip>**</ip>
<mask>**</mask>
<dnsserver>**</dnsserver>
<winserver>**</winserver>
</virtualip>
<proposals>
<proposal>**</proposal>
<proposal>**</proposal>
</proposals>
</ipsec_settings>
<on_connect>
<script>
<os>windows</os>
<script>
<!--Write MS DOS batch script inside the CDATA tag below.-->
<!--One line per command, just like a regular batch script file.-->
<!--The script will be executed in the context of the user that connected the tunnel.-->
<!--Wherever you write #username# in your script, it will be automatically substituted with the xauth username of the user that connected the tunnel.-->
<!--Wherever you write #password# in your script, it will be automatically substituted with the xauth password of the user that connected the tunnel.-->
<!--Remember to check your xml file before deploying to ensure that carriage returns/line feeds are present.-->
<![CDATA[**]]>
</script>
</script>
</on_connect>
<on_disconnect>
<script>
<os>windows</os>
<script>
<!--Write MS DOS batch script inside the CDATA tag below.-->
<!--One line per command, just like a regular batch script file.-->
<!--The script will be executed in the context of the user that connected the tunnel.-->
<!--Wherever you write #username# in your script, it will be automatically substituted with the xauth username of the user that connected the tunnel.-->
<!--Wherever you write #password# in your script, it will be automatically substituted with the xauth password of the user that connected the tunnel.-->
<!--Remember to check your xml file before deploying to ensure that carriage returns/line feeds are present.-->
<![CDATA[]]>
</script>
</script>
</on_disconnect>
</connection>
</connections>
</ipsecvpn>
</vpn>
<vulnerability_scan>
<enabled>1</enabled>
<scan_on_registration>0</scan_on_registration>
<scan_on_signature_update>1</scan_on_signature_update>
<windows_update>1</windows_update>
<proxy_enabled>0</proxy_enabled>
<automatic_maintenance>
<scan_on_maintenance>0</scan_on_maintenance>
<maintenance_period>0</maintenance_period>
<maintenance_deadline>0</maintenance_deadline>
</automatic_maintenance>
<auto_patch></auto_patch>
<scheduled_scans></scheduled_scans>
</vulnerability_scan>
</forticlient_configuration>
<?xml version="1.0" encoding="UTF-8" ?><forticlient_configuration> <forticlient_version>6.0.2.128</forticlient_version> <version>6.0.2</version> <exported_by_version>6.0.2.0128</exported_by_version> <date>2021/07/08</date> <partial_configuration>0</partial_configuration> <os_version>windows</os_version> <os_architecture>x64</os_architecture> <system> <ui> <disable_backup>0</disable_backup> <ads>1</ads> <default_tab>VPN</default_tab> <flashing_system_tray_icon>1</flashing_system_tray_icon> <hide_system_tray_icon>0</hide_system_tray_icon> <suppress_admin_prompt>0</suppress_admin_prompt> <password /> <culture_code>os-default</culture_code> <gpu_rendering>0</gpu_rendering> <replacement_messages> <quarantine> <title> <title> <![CDATA[]]> </title> </title> <statement> <remediation> <![CDATA[]]> </remediation> </statement> <remediation> <remediation> <![CDATA[]]> </remediation> </remediation> </quarantine> </replacement_messages> </ui> <log_settings> <onnet_local_logging>1</onnet_local_logging> <level>6</level> <!--0=emergency, 1=alert, 2=critical, 3=error, 4=warning, 5=notice, 6=info, 7=debug, --> <log_events>ipsecvpn,sslvpn,scheduler,update,firewall,shield,endpoint,configd</log_events> <!--ipsecvpn=ipsec vpn, sslvpn=ssl vpn, firewall=firewall, av=antivirus, antiexploit=antiexploit, sandboxing=sandboxing, webfilter=webfilter, vuln=vulnerability scan, wanacc=wan acceleration, fssoma=single sign-on mobility for fortiauthenticator, scheduler=scheduler, update=update, proxy=fortiproxy, shield=fortishield, endpoint=endpoint control, configd=configuration, --> <remote_logging> <log_upload_enabled>0</log_upload_enabled> <log_upload_server /> <log_upload_ssl_enabled>1</log_upload_ssl_enabled> <log_retention_days>90</log_retention_days> <log_upload_freq_minutes>120</log_upload_freq_minutes> <log_generation_timeout_secs>900</log_generation_timeout_secs> <netlog_categories>7</netlog_categories> <log_protocol>faz</log_protocol> <netlog_server /> </remote_logging> </log_settings> <proxy> <update>0</update> <online_scep>0</online_scep> <type>http</type> <address /> <port>80</port> <username> <![CDATA[**]]> </username> <password> <![CDATA[**]]> </password> </proxy> <update> <use_custom_server>0</use_custom_server> <restrict_services_to_regions /> <server /> <port>80</port> <timeout>60</timeout> <failoverport /> <fail_over_to_fdn>1</fail_over_to_fdn> <use_proxy_when_fail_over_to_fdn>1</use_proxy_when_fail_over_to_fdn> <auto_patch>0</auto_patch> <submit_virus_info_to_fds>1</submit_virus_info_to_fds> <submit_vuln_info_to_fds>1</submit_vuln_info_to_fds> <!-- update_action applies to software updates only and can be one of: notify_only, download_and_install, download_only, disable --> <update_action>disable</update_action> <scheduled_update> <enabled>1</enabled> <type>interval</type> <daily_at>01:24</daily_at> <update_interval_in_hours>1</update_interval_in_hours> </scheduled_update> </update> <fortiproxy> <enabled>0</enabled> <enable_https_proxy>1</enable_https_proxy> <http_timeout>60</http_timeout> <client_comforting> <pop3_client>1</pop3_client> <pop3_server>1</pop3_server> <smtp>1</smtp> </client_comforting> <selftest> <enabled>1</enabled> <last_port>**</last_port> <notify>1</notify> </selftest> </fortiproxy> <certificates> <crl> <ocsp> <enabled>0</enabled> <server /> <port /> </ocsp> </crl> <hdd /> <ca /> </certificates> </system> <endpoint_control> <ui> <display_antivirus>0</display_antivirus> <display_webfilter>0</display_webfilter> <display_firewall>10/display_firewall> <display_vpn>1</display_vpn> <display_vulnerability_scan>0</display_vulnerability_scan> <display_sandbox>0</display_sandbox> <display_compliance>0</display_compliance> <hide_compliance_warning>0</hide_compliance_warning> <registration_dialog> <show_profile_details>1</show_profile_details> </registration_dialog> </ui> <enabled>1</enabled> <!--Format: <probe_timeout:keep_alive_timeout> in seconds. Default: <1:5>. Note: changing connect timeouts might affect performance.--> <socket_connect_timeouts>1:5</socket_connect_timeouts> <system_data>**</system_data> <disable_unregister>0</disable_unregister> <disable_fgt_switch>0</disable_fgt_switch> <show_bubble_notifications>1</show_bubble_notifications> <avatar_enabled>0</avatar_enabled> <onnet_addresses> <address /> </onnet_addresses> <onnet_mac_addresses /> <alerts> <notify_server>1</notify_server> <alert_threshold>1</alert_threshold> </alerts> <fortigates> <fortigate> <serial_number /> <name /> <registration_password /> <addresses /> </fortigate> </fortigates> <local_subnets_only>0</local_subnets_only> <notification_server /> <nac> <processes> <process id="" rule="present"> <signature name="" /> </process> </processes> <files> <path id="" /> </files> <registry> <path id="" /> </registry> </nac> </endpoint_control> <vpn> <options> <current_connection_name>**</current_connection_name> <current_connection_type>ipsec</current_connection_type> <autoconnect_tunnel /> <autoconnect_only_when_offnet>0</autoconnect_only_when_offnet> <keep_running_max_tries>0</keep_running_max_tries> <disable_internet_check>0</disable_internet_check> <minimize_window_on_connect>1</minimize_window_on_connect> <allow_personal_vpns>1</allow_personal_vpns> <disable_connect_disconnect>0</disable_connect_disconnect> <show_vpn_before_logon>0</show_vpn_before_logon> <use_windows_credentials>1</use_windows_credentials> <use_legacy_vpn_before_logon>0</use_legacy_vpn_before_logon> <show_negotiation_wnd>0</show_negotiation_wnd> <vendor_id /> </options> <sslvpn> <options> <enabled>1</enabled> <keep_connection_alive>0</keep_connection_alive> <prefer_sslvpn_dns>1</prefer_sslvpn_dns> <dnscache_service_control>0</dnscache_service_control> <!--0=disable dnscache service, 1=do not touch dnscache service, 2=restart dnscache service, 3=sc control dnscache paramchange--> <use_legacy_ssl_adapter>0</use_legacy_ssl_adapter> <preferred_dtls_tunnel>0</preferred_dtls_tunnel> <no_dhcp_server_route>0</no_dhcp_server_route> <no_dns_registration>0</no_dns_registration> <disallow_invalid_server_certificate>0</disallow_invalid_server_certificate> </options> <connections /> </sslvpn> <ipsecvpn> <options> <enabled>1</enabled> <beep_if_error>0</beep_if_error> <usewincert>1</usewincert> <use_win_current_user_cert>1</use_win_current_user_cert> <use_win_local_computer_cert>1</use_win_local_computer_cert> <block_ipv6>1</block_ipv6> <uselocalcert>0</uselocalcert> <usesmcardcert>1</usesmcardcert> <enable_udp_checksum>0</enable_udp_checksum> <disable_default_route>0</disable_default_route> <show_auth_cert_only>0</show_auth_cert_only> <check_for_cert_private_key>0</check_for_cert_private_key> <enhanced_key_usage_mandatory>0</enhanced_key_usage_mandatory> </options> <connections> <connection> <name>**</name> <single_user_mode>0</single_user_mode> <!--when single_user_mode=1 the tunnel cannot be connected if more than one user is logged on the computer--> <type>manual</type> <ui> <show_passcode>0</show_passcode> <show_remember_password>0</show_remember_password> <show_alwaysup>0</show_alwaysup> <show_autoconnect>0</show_autoconnect> <save_username>0</save_username> </ui> <ike_settings> <version>1</version> <implied_SPDO>0</implied_SPDO> <implied_SPDO_timeout>0</implied_SPDO_timeout> <xauth_timeout>0</xauth_timeout> <prompt_certificate>*</prompt_certificate> <description /> <server>**</server> <authentication_method>**</authentication_method> <auth_data> <certificate> <common_name> <match_type> <![CDATA[simple]]> </match_type> <pattern> <![CDATA[VPN UserCert]]> </pattern> </common_name> <issuer> <match_type> <![CDATA[simple]]> </match_type> <pattern> <![CDATA[NORSUBCA01]]> </pattern> </issuer> </certificate> </auth_data> <mode>aggressive</mode> <dhgroup>5;</dhgroup> <key_life>**</key_life> <localid /> <peerid /> <nat_traversal>1</nat_traversal> <mode_config>1</mode_config> <enable_local_lan>0</enable_local_lan> <nat_alive_freq>5</nat_alive_freq> <dpd>1</dpd> <dpd_retry_count>3</dpd_retry_count> <dpd_retry_interval>5</dpd_retry_interval> <enable_ike_fragmentation>0</enable_ike_fragmentation> <xauth> <enabled>1</enabled> <prompt_username>1</prompt_username> <username>**</username> <password /> </xauth> <proposals> <proposal>**</proposal> <proposal>**</proposal> </proposals> </ike_settings> <ipsec_settings> <remote_networks> <network> <addr>**</addr> <mask>**</mask> </network> <network> <addr>::/0</addr> <mask>::/0</mask> </network> </remote_networks> <dhgroup>5</dhgroup> <key_life_type>seconds</key_life_type> <key_life_seconds>43200</key_life_seconds> <key_life_Kbytes>5120</key_life_Kbytes> <replay_detection>0</replay_detection> <pfs>0</pfs> <use_vip>1</use_vip> <virtualip> <type>modeconfig</type> <ip>**</ip> <mask>**</mask> <dnsserver>**</dnsserver> <winserver>**</winserver> </virtualip> <proposals> <proposal>**</proposal> <proposal>**</proposal> </proposals> </ipsec_settings> <on_connect> <script> <os>windows</os> <script> <!--Write MS DOS batch script inside the CDATA tag below.--> <!--One line per command, just like a regular batch script file.--> <!--The script will be executed in the context of the user that connected the tunnel.--> <!--Wherever you write #username# in your script, it will be automatically substituted with the xauth username of the user that connected the tunnel.--> <!--Wherever you write #password# in your script, it will be automatically substituted with the xauth password of the user that connected the tunnel.--> <!--Remember to check your xml file before deploying to ensure that carriage returns/line feeds are present.--> <![CDATA[**]]> </script> </script> </on_connect> <on_disconnect> <script> <os>windows</os> <script> <!--Write MS DOS batch script inside the CDATA tag below.--> <!--One line per command, just like a regular batch script file.--> <!--The script will be executed in the context of the user that connected the tunnel.--> <!--Wherever you write #username# in your script, it will be automatically substituted with the xauth username of the user that connected the tunnel.--> <!--Wherever you write #password# in your script, it will be automatically substituted with the xauth password of the user that connected the tunnel.--> <!--Remember to check your xml file before deploying to ensure that carriage returns/line feeds are present.--> <![CDATA[]]> </script> </script> </on_disconnect> </connection> </connections> </ipsecvpn> </vpn> <vulnerability_scan> <enabled>1</enabled> <scan_on_registration>0</scan_on_registration> <scan_on_signature_update>1</scan_on_signature_update> <windows_update>1</windows_update> <proxy_enabled>0</proxy_enabled> <automatic_maintenance> <scan_on_maintenance>0</scan_on_maintenance> <maintenance_period>0</maintenance_period> <maintenance_deadline>0</maintenance_deadline> </automatic_maintenance> <auto_patch></auto_patch> <scheduled_scans></scheduled_scans> </vulnerability_scan></forticlient_configuration>
So you're not running EMS at all here? If not I think I'd try a much newer version (6.2.x or 6.4.x) and see what happens - been a while now since we ran 6.0 code
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1547 | |
1031 | |
749 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.