Description | This article describes an issue that may be seen with FortiAP-U 'universal' Access Points whereby the system event logs may display failed login attempts but without the source IP address. |
Scope | FortiAP-U (Universal) access points running v7.0.4 (or below) |
Solution |
If administrative access is enabled in the Access Point Operation Profile and an attempt is made to access to the HTTP interface of an AP using an invalid user name, the FortiGate acting as a Wireless Controller may not record the source IP address of the device that attempted to access the administrative interface.
Below is an example of the log entry that may be seen in this scenario:
date=2024-09-07 time=05:24:29 eventtime=1725642469337932624 logid="0100032002" type="event" subtype="system" level="alert" vd="root" logdesc="Admin login failed" sn="0" user="FortiAP:PU431FXX12345678" ui="https(0.0.0.0)" method="https" action="login" status="failed" srcip=0.0.0.0 dstip=1.2.3.4 reason="name_invalid" msg="Administrator test login failed from https(0.0.0.0) because of invalid user name"
The behavior seen here has been confirmed as a bug, with the fix available in FortiAP v7.0.5. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.