Description |
This article describes possible issues faced with authentication to the Splunk server after the FortiAuthenticator upgrade and how to resolve them. |
Scope | FortiAuthenticator 6.6.2. |
Solution |
In this scenario is shown an error which refers to unable authentication via Radius to Splunk servers using the FortiAuthenticator. Message:
Remote LDAP user authentication from (null) with FortiToken failed: replay previous token. Authentication failed, use/replay previous token code.
After FortiAuthenticator upgrades to version 6.6.2, connecting to the Splunk server could lead to an error like this:
The first step is checking the FortiAuthenticator logs: FortiAuthenticator -> Logging -> Log Access -> Logs. In this example above there is this error present:
Remote LDAP user authentication from (null) with FortiToken failed: replay previous token. Authentication failed, use/replay previous token code.
The next steps include checking further logs like:
From the Radius authentication logs for this example:
2024-11-06T11:50:39.615999+08:00 lab-prdvfa03 radiusd[19152]: (0) facauth: Authentication OK
From the Kernel logs for this example:
2024-11-06T11:50:39.617860+08:00 lab-prdvfa03 kernel: [508108.602445] radiusd[19170]: segfault at 10 ip 00007f4fb7e9aaac sp 00007f4fa6ffbe90 error 6 in rlm_facauth.so[7f4fb7e91000+20000]
From the logs, it can be seen that after each attempt of login to the Splunk server via Radius authentication with FortiAuthenticator the Radiusd service is crashing. Time in the kernel logs and radius authentication logs match the crash.
Note: This scenario explains when the upgrade is done without modifying users, user groups, policies, etc.
How to avoid this scenario:
Try the connection again. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.