Hi community, I was having a look at this part of the admin guide:
https://docs.fortinet.com/document/fortimanager/7.4.2/administration-guide/906193/using-fortimanager-device-database-variables-in-jinjaAnd
I saw this script:{%- for intf in DEVDB_syst<!-- --><!-- --><!-- --><!-- --><!-- --><!-- -->...
Hi,I know about this, but I don't really understand where the
DEVDB_system_interface comes from. Can you explain this to me? (I can
guess the syntax from how the fortigate CLI works ofc, but haven't found
it in the docs, that's what i'm saying.)
This might be a bit of a shady suggestion.. but what if you make a GRE
or IPsec tunnel från a local loopback/physical interface of the client
fortigate and route it through the SSL VPN tunnel? I guess that could
solve your issue.
Now that I think about it, check the NSE4 material. It has a section
about Fortigate as an IPsec client and having devices behind it. Maybe
there's a good answer in that training.