FortiDDoS
FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.
kmak
Staff
Staff
Article Id 417845
Description This article describes how to troubleshoot the TACACS+ admin account user forced logged out issue on FortiDDoS-F.
Scope FortiDDoS-F v7.0.X with remote authentication using TACACS+ server.
Solution

Issue Reproduction

  1. The administrator/user accounts authenticated via a remote TACACS+ server would be logged out forcefully 5 minutes after every successful log-in. The issue can be reproduced in FortiDDoS-F firmware v7.0.X. In the example, the FortiDDoS-F is configured with a TACACS+ remote authentication server.

 

kmak_0-1762305154879.jpeg

 

  1. No other user was created in the FortiDDoS-F administrator page. The non-existing user will be authenticated from the TACACS+ server and check the admin-profile from the TACACS+ server.

 

kmak_1-1762305154882.jpeg

 

  1. Test the user login using the TACACS+ user credential. The user would be forcefully logged out 5 minutes after the login. The FortiDDoS-F event log should be showing the login and logout history of the user.

 

kmak_2-1762305154889.jpeg

 

  1. The forceful logout issue remains even after tweaking the idle timeout value.

 

kmak_3-1762305154893.jpeg

 

  1. It is a bug issue on FortiDDoS-F with firmware v7.0.X. The issue is no longer seen in firmware v7.2.X, which is resolved in the version. While a workaround can be referred to as follows.

 

Workaround:

  1. To overcome the issue without upgrading the firmware version, create the administrator/user accounts in the FortiDDoS-F for each of the TACACS+ user accounts.

 

kmak_4-1762305154896.jpeg

 

  1. With the TACACS+ user account created in FortiDDoS-F, the forceful logout issue will no longer be observed.

 

kmak_5-1762305154902.jpeg

 

Related document:

Configuring TACACS+ authentication