Description
Solution
Overview:
The following chart shows an overview of the troubleshooting process:
Note: 'CA' in this article refers to the Collector agent.
Branch Point 1: Check the FortiGate unit is connected to the collector agent.
The first requirement is the connection from the FortiGate unit to the collector agent.
The best way to verify the connectivity is by running the following CLI commands:
Branch Point 2: Check the Collector Agent is running
Opening the collector agent configuration interface displays the status of the collector agent service.
Section 1: Collector agent not running.
Section 2: Collector Agent running but not connected.
The password is set on the main page on the Collector agent and on the FortiGate unit by going to User -> Directory Service -> Edit FSAE connector -> Password.
Another reason for the FortiGate not being able to connect to the collector agent is that a Firewall (host firewall or network firewall) is blocking the FSAE TCP port 8000.
Make sure nothing is blocking the traffic between the FortiGate and the collector agent.
A sniffer trace can be gathered on the FortiGate and the collector agent.
The following command will start capturing traffic on the FortiGate :
diagnose sniff packet any 'host <collector agent IP address> and port 8000'
It is also possible to check the FSAE process debug output on the FortiGate by using the commands:
diagnose debug enable
diagnose debug application authd 8256
Note: Ensure the server where the Agent is running has the latest updates/patches. Failure to run the latest patches could lead to this behavior.
Section 3: Group Check.
Branch Point 3: Check whether logon events are seen on the FortiGate.
The FortiGate will need to see the logon event when the user logs in to this PC.
Section 4: Not seeing logon events.
If there are any problems pushing out the DC agent, it is possible to refer to article 'Troubleshooting FSAE DC agent installation problems' for more info (See related articles).
To confirm that the DC agent is installed, it is possible to refer to article 'Where is DCagent service' in the related articles.
If an LDAP server has been configured on the FSAE connector (on the FortiGate go to User -> Directory Service -> Edit FSAE connector -> LDAP:(
Try to disable it and running the commands from branch point 3 again.
An incorrectly configured LDAP server is a common cause for not seeing the logon events on the FortiGate.
If this does not resolve the issue, open a support ticket.
Branch Point 4: Is the test user show up in the FSAE list ?
Focusing on a single test user will help for further troubleshooting.
Once all information about the test host has been gathered, it is possible to run the following commands on the FortiGate:
Section 5: User in FSAE list.
If the user is on the list but has an incorrect IP, it will be necessary to check the DNS settings on the DNS server.
A common problem is with multi-homed hosts (i.e. hosts with more than one network interface).
A multi-homed host may resolve host name to the IP address of one interface while send traffic out another.
The FortiGate will receive traffic from the IP of the other interface and think the host is not authenticated.
If the user does have the correct IP but not the correct groups, it is necessary to disable group caching on the collector agent. More on group caching, as well as how to disable this feature, can be found in 'New Feature in FSAE build 42 and later (Group caching)' (see related articles below).
If the username, IP and groups are all correct but the user is still not able to access the Internet, the issue may be due to a Firewall Policy setting. See the article 'Only the first authenticated group allowed through policy' (see related articles below).
Section 6: User not in FSAE list.
If the IP is listed with the username of a service account, the service account is generating a logon event and is overriding the user's logon.
A good article on this issue is 'Windows application forces to log-off the current user on FSAE and access through the FortiGate is blocked' (see related articles below).
If the user recently moved to a new group try disabling group caching. More on group caching as well as how to disable this feature can be found on 'New Feature in FSAE build 42 and later (Group caching)' (see related articles below).
Make sure the log level is set to 'information'. Start at the end of the file and search backwards for the IP of the test host. If not found, search for the username of the test host. If still not found, search for the hostname of the test host. If the host is found in any of the searches, proceed to subsection A. Otherwise, proceed to subsection B.
These include the collector agent unable to resolve the host name at all or resolving to an incorrect IP.
Either way, it will be necessary to check the DNS server.
If the collector agent logs show that the host timed out, the collector agent was not able to connect to the host on port 139 and 445 to verify the user.
Additionally, see the related article 'User status Not Verified' on the collector agent ' (See related articles below).
If all of the steps above fail, open a support ticket
Related articles:
Thank you for the input @H_aristizabal
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.