Created on 
    
	
		
		
		10-03-2019
	
		
		12:46 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
  Edited on 
    
	
		
		
		08-09-2023
	
		
		06:22 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 By  
				
		 Stephen_G
		
			Stephen_G
		
		
		
		
		
		
		
		
	
			 
		
Description
This article provides instruction on how to verify the status of Port-based 802.1X Authentication applied to one of the ports of FortiSwitch. 
This applies to a FortiSwitch managed by FortiGate setup. 
Scope
Fortigate Firmware 6.0.6
Fortiswitch Firmware 3.6.10
Solution
Step 1: 
Login to FortiGate and verify that the connections from the FortiGate to the FortiSwitch units are up.
exec switch-controller get-conn-status
Managed-devices in current vdom root:
STACK-NAME: FortiSwitch-Stack-internal7
SWITCH-ID VERSION STATUS ADDRESS JOIN-TIME NAME
FS108D3W15****** v3.6.10 Authorized/Up 169.254.1.2 Fri Sep 13 12:36:24 2019 -
Step 2:
Check the port  802.1x status.
Access the FortiSwitch from the FortiGate using SSH or Telnet.
Output of successful authentication:
diagnose switch 802-1x status port2
   port2 : Mode: port-based (mac-by-pass disable)
           Link: Link up
           Port State: authorized (  )
           Dynamic Authorized Vlan : 0
           EAP pass-through mode : Enable
           Native Vlan : 32
           Allowed Vlan list: 32
           Untagged Vlan list:
           Guest Vlan : 34        Guest Auth Delay :120
           Auth-Fail Vlan : 34
           Sessions info:
           54:e1:ad:4a:2d:6b     Type=802.1x,PEAP,state=AUTHENTICATED,etime=0,eap_cnt=10 params:reAuth=600
Here reAuth indicates the time required for clients to reauthenticate when connected to FSW port that is configured with 802.1x policy.
Output of failed authentication:
diagnose switch 802-1x status port2
   port2 : Mode: port-based (mac-by-pass disable)
           Link: Link up
           Port State: unauthorized (  )
           Dynamic Authorized Vlan : 0
           EAP pass-through mode : Enable
           Native Vlan : 32
           Allowed Vlan list: 32
           Untagged Vlan list:
           Guest Vlan : 34        Guest Auth Delay :120
           Auth-Fail Vlan : 34
           Sessions info:
           54:e1:ad:4a:2d:6b     Type=802.1x,IDENTITY,state=HELD,etime=0,eap_cnt=5 params:reAuth=600
The same output will show after using the following command in the FortiGate:
diagnose switch-controller dump 802-1X-status FS108D3W15****** port2
Step 3: 
Check the Port vlan assignment from the FortiSwitch.
After a failure (wrong password supplied), port2 is removed from Vlan32('LALanSecure') and its replaced by Vlan34('LAGuest').
diagnose  switch vlan list 32
  VlanId  Ports
  ______  ___________________________________________________
  32      port10
diagnose  switch vlan list 34
  VlanId  Ports
  ______  ___________________________________________________
  34      port1 port2 port10
After a success, port2 is moved to Vlan 32('LALanSecure') and removed from Vlan34('LAGuest').
diagnose  switch vlan list 32
  VlanId  Ports
  ______  ___________________________________________________
  32      port2 port10
diagnose  switch vlan list 34
  VlanId  Ports
  ______  ___________________________________________________
  34      port1 port10
Check the event viewer of the Windows server to further investigate the root cause of the Failed authentication for 802.1x connections.
Under the Server Roles, check the output of the Network Policy and Access Services. 
Below is a successful output of 802.1x connection from the PC:


The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.