Description | This article describes the intended interface selection logic for remote authentication attempts when the reserved management interface is configured and ha-direct is enabled. |
Scope | FortiGate v7.4.4 and later. |
Solution |
HA-Direct is an optional feature for HA clusters, allowing local management traffic to be restricted to the reserved HA management interface. See Out-of-band management with reserved management interfaces.
Sample ha-direct configuration:
config system ha set mode a-p set ha-mgmt-status enable config ha-mgmt-interfaces edit 1 set interface "wan2" set gateway 10.255.99.1 next end set ha-direct enable end When ha-direct is enabled, authentication attempts will use the configured reserved management interface(s) by default. This is by design, as queries to remote authentication servers are considered management traffic.
diagnose sniffer packet any 'port 1812' 4 1000 interfaces=[any] filters=[port 1812] 3.685623 wan2 out 10.128.202.16.10123 -> 10.250.0.21.1812: udp 129 13.270422 wan2 out 10.128.202.16.14297 -> 10.250.0.21.1812: udp 129 Command:
diag debug application fnbamd -1 diag debug enable
Note: to disable the debug use 'diag debug disable'.
This can cause authentication attempts to fail if the remote authentication server is only reachable over another interface, such as an IPsec tunnel. For RADIUS and TACACS+ servers, this can be overridden by configuring source-ip in the server configuration:
config user radius edit "RADIUS" set server "10.250.0.21" set secret ENC <encrypted psk> set source-ip "10.253.200.1" next end
config user tacacs+ edit "TACACS" set server "10.250.0.21" set source-ip "10.253.200.1" next end
After applying the source IP address, remote authentication traffic to the remote server is sent using an exit interface in the same VDOM as the configured server, similar to if ha-direct is disabled.
diagnose sniffer packet any 'port 1812' 4 1000 interfaces=[any] filters=[port 1812] 5.415861 PRIVATE_CLOUD out 10.253.200.1.3890 -> 10.250.0.21.1812: udp 129
In v7.4.4 and later, this is not true for LDAP servers. In affected firmware versions, queries to LDAP servers always use the reserved management interface if ha-direct is enabled. This matches known internal issue 1134368 and is scheduled for fix in v7.4.9 and v7.6.4.
The interface selection logic is scheduled for enhancement in v7.6.4 and later. After the change, if source-ip or a customer interface-select-method are configured for a RADIUS, LDAP, or TACACS server, interface selection will ignore the ha-direct setting. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.