Created on 03-16-2021 12:35 PM Edited on 09-25-2024 09:21 PM By Jean-Philippe_P
Description
This article describes which information to provide to Technical Support when opening a FortiAuthenticator support case for technical issues to expedite troubleshooting.
Scope
All versions of FortiAuthenticator.
Solution
When opening a FortiAuthenticator case for any kind of technical issue, TAC support will usually request some general debug information to start troubleshooting.
Providing the following information when opening a FortiAuthenticator support case can expedite troubleshooting significantly.
A FortiAuthenticator backup can be taken from GUI or CLI.
However, this is not immediately useful to Technical Support.
To ensure Technical Support can restore the backup in a lab and view all configuration items, proceed as follows when generating a backup for a support case:
When uploading the backup, include the username and password of the added local admin as a ticket comment.
If any error messages are observed in log messages, or crashes encountered in GUI, download those logs (from Logs -> Log Access -> Raw Logs) or take screenshots and attach these as well. If possible, include detailed steps on how the error messages were triggered.
A complete debug report (which can be decrypted by Technical Support) can be downloaded from Logs -> Log Access, by selecting the 'Debug Report' button at the top.
The arrow next to it provides a drop-down menu that allows for downloading individual sections of the debug report.
These individual sections can be useful in instances where the error and its source are clearly defined and limited; in all other circumstances, the full debug report is preferable.
FortiAuthenticator provides access to detailed debug logs at the URL https://<Fortiauthenticator>/debug.
If any error messages possibly related to the issue at hand are found here (there is a drop-down menu in the upper left to navigate through sections), then these logs can be downloaded and attached to the support case as well.
As of FortiAuthenticator OS 6.5, debugging is switched off or on an info level.
Before reproducing an issue, debugging needs to be enabled or a level raised where available. Not all debug sections have it.
For instance, Radius debug can be enabled by selecting 'Enter debug mode'.
It can be disabled by toggling the mode before then selecting 'Exit debug mode'.
https://<Fortiauthenticator>/debug/radius
GUI debug, set Log level: to debug
https://<Fortiauthenticator>/debug/gui
Once the issue has been reproduced, change the debug mode/level to the previous state.
Packet capture.
Suppose the issue is suspected to involve FortiAuthenticator communicating with either authentication clients (like a FortiGate), or authentication servers (RADIUS, LDAP etc). In that case, a packet capture can help in determining if there are communication issues and, if so, what form they take.
FortiAuthenticator allows taking a capture in the GUI (under System -> Network -> Packet Capture), but this does not currently (as of March 2021) allow for any filtering, and so will often contain a lot of noise.
More narrow, filtered captures may be taken through the CLI with these commands:
execute tcpdump <-parameters> <filter>
As an example:
execute tcpdump –c100 –nnvvi any host 10.0.0.1 and port 389
This will dump the output in the CLI and decode it if the protocol is well known, such as RADIUS or LDAP.
execute tcpdumpfile <-parameters> <filter>
As an example:
execute tcpdumpfile –c100 –i any host 10.0.0.1 and port 389
This will write the output to a PCAP file which may be downloaded from https://<Fortiauthenticator>/debug/ by scrolling to the bottom of the drop-down menu (or debug/pcap-dump/).
Include any other details that may be useful in illustrating the issue, such as:
Related articles:
Technical Tip: How to run a packet capture with FortiAuthenticator.
Troubleshooting Tip: How to debug FortiAuthenticator Services.
Technical Tip: Extract Summary Debug Report from FortiAuthenticator.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.