FortiAuthenticator 4.0 Setup

Troubleshooting

Troubleshooting includes useful tips and commands to help deal with issues that may occur. For additional help, contact customer support. See Troubleshooting on page 159 for more information.

If you have issues when attempting authentication on a FortiGate unit using the FortiAuthenticator, there are some FortiAuthenticator and FortiGate settings to check.

In addition to these settings you can use log entries, monitors, and debugging information to determine more knowledge about your authentication problems. For help with FortiAuthenticator logging, see Logging on page 154. For help with FortiGate troubleshooting, see the FortiOS Handbook Troubleshooting and User Authentication guides chapters.

FortiAuthenticator settings

When checking FortiAuthenticator settings, you should ensure that:

l there is an authentication client entry for the FortiGate unit. See RADIUS service on page 91, l the user trying to authenticate has a valid active account that is not disabled, and that the username and password are spelled correctly,

CLI commands

  • the user account allows RADIUS authentication if RADIUS is enabled on the FortiGate unit, l the FortiGate unit can communicate with the FortiAuthenticator unit, on the required ports:

RADIUS Authentication: UDP/1812

LDAP: TCP/389 l the user account exists l as a local user on the FortiAuthenticator (if using RADIUS authentication), l in the local LDAP directory (if using local LDAP authentication), l in the remote LDAP directory (if using RADIUS authentication with remote LDAP password validation),

  • the user is a member in the expected user groups and these user groups are allowed to communicate on the authentication client (the FortiGate unit, for example),
  • If authentication fails with the log error bad password, try resetting the password. If this fails, verify that the preshared secret is identical on both the FortiAuthenticator unit and the authentication client.

If FortiToken authentication is failing, try the following:

  • Verify that the token is correctly synchronized.
  • Remove the token from the user authentication configuration and verify authentication works when the token is not present. l Attempt to log into the FortiAuthenticator with the user credentials.

These steps enable the administrator to identify whether the problem is with the FortiGate unit, the credentials or the FortiToken.

FortiGate settings

When checking FortiGate authentication settings, you should ensure that:

l the user has membership in the required user groups and identity-based security policies, l there is a valid entry for the FortiAuthenticator device as a remote RADIUS or LDAP server, l the user is configured either explicitly or as a wildcard user.

CLI commands

The FortiAuthenticator has CLI commands that are accessed using SSH or Telnet. Their purpose is to initially configure the unit, perform a factory reset, or reset the values if the GUI is not accessible.

Command   Description
help   Display list of valid CLI commands. You can also enter ? for help.
exit   Terminate the CLI session.
Command   Description
show   Display bootstrap configuration.

CLI commands

Command Description
set port1-ip

<IP/netmask>

Enter the IPv4 address and netmask for the port1 interface. Netmask is expected in the /xx format, for example 192.168.0.1/24. Once this port is configured, you can use the GUI to configure the remaining ports.
set default-gw <IP> Enter the IPv4 address of the default gateway for this interface. This is the default route for this interface.
set date <YYYY-MM-DD> Enter the current date. Valid format is four digit year, two digit month, and two digit day. For example: set date 2014-08-12 sets the date to August 12th, 2014.
set time <HH:MM:SS> Enter the current time. Valid format is two digits each for hours, minutes, and seconds. 24-hour clock is used. For example 15:10:00 is 3:10pm.
set tz <timezone_ index> Enter the current time zone using the time zone index. To see a list of index numbers and their corresponding time zones, enter set tz ?.
set ha-mode

{enable | disable}

Enable or disable (default) HA mode.
set ha-port

<interface>

Select a network interface to use for communication between the two cluster members. This interface must not already have an IP address assigned and it cannot be used for authentication services.

Both units must use the same interface for HA communication.

set ha-priority

{high | low}

Set to Low on one unit and High on the other. Normally, the unit with High priority is the master unit.
set ha-password <password> Set the HA password.
set ha-mgmt-ip

<IP/netmask>

Enter the IP address, with netmask, that this unit uses for HA related communication with the other FortiAuthenticator unit. Format:

1.2.3.4/24.

The two units must have different addresses. Usually, you should assign addresses on the same private subnet.

set ha-mgmt-access

{ssh | https

| http | telnet}

Select the types of administrative access to allow.
set ha-dbg-level <level> Enter the level for HA service debug logs. Range: -4 (fatal) to 4 (debug high). Default: -2 (warn).
unset <setting> Restore default value. For each set command listed above, there is an unset command, for example unset port1-ip.

CLI commands

Command Description
raid-add-disk <slot> Add a disk to a degraded RAID array.
Command Description
ha-rebuild Rebuild the configuration database from scratch using the HA peer’s configuration.
restore-admin Restore factory reset’s admin access settings to the port1 network interface.
reboot Perform a hard restart of the FortiAuthenticator unit. All sessions will be terminated. The unit will go offline and there will be a delay while it restarts.
factory-reset Enter this command to reset the FortiAuthenticator settings to factory default settings. This includes clearing the user database. This procedure deletes all changes that you have made to the

FortiAuthenticator configuration and reverts the system to its original configuration, including resetting interface addresses.

shutdown Turn off the FortiAuthenticator.
status Display basic system status information including firmware version, build number, serial number of the unit, and system time.
Command Description
hardware-info Display general hardware status information.
disk-attributes Display system disk attributes.
disk-errors Display any system disk errors.
disk-health Display disk health information.
disk-info Display disk hardware status information.
raid-hwinfo Display RAID hardware status information.
Command Description
nslookup Basic tool for DNS debugging.
dig Advanced DNS debugging.
ping Test network connectivity to another network host.

CLI commands

Command Description
tcpdump Examine local network traffic.
tcpdumpfile Same as tcpdump, but the output is written to a downloadable file that can be downloaded in the GUI.
traceroute Examine the route taken to another network host.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.