Description |
This article describes a situation where a FortiGate is connected to FortiSwitch with an NAC solution configured on the FortiGate.
When a user is connected to a wireless and wired connection (Ethernet), the laptop tries to get a connection via the Ethernet adapter. During this time, the Wi-Fi adapter successfully connects to the network and NAC is performed and allowed.
However, the laptop keeps disrupting the connection by using the LAN connection. But as per logs on FortiGate and FortiSwitch, it successfully appears to be getting authenticated from NAC and should have switched to the real VLAN from the 'onboarding' VLAN.
However, within a very short period or during the port-flap sequence, it all appears to reset and start authenticating back from an onboarding stage to the real network, and back to onboarding. at this time Wi-Fi is still connected to the real Wi-Fi network. This does not take place when the Wi-Fi Adaptor is disabled. Also, it is important to note that NAC policy is been configured with EMS Tags and a sample config is as below,
config user nac-policy next |
Scope | FortiGate (NAC feature), FortiSwitch. |
Solution |
The problem occurs when the device matches the NAC-policy and NAC bounces the port for re-DHCP. This causes the laptop ethernet network adapter to go down and hence FortiClient detects and sends network adapter info changes to EMS through the VLAN subnet.
So EMS removes the ethernet MAC in the EMS tag which again triggers NAC to remove the device from the NAC-policy matching and moves it back to onboarding VLAN. Later the ethernet mac appears in the FGT EMS Tag after tagging and this cycle repeats continuously causing the FortiSwitch port flap.
As a resolution, it is possible to take the 2 below steps.
Example configuration:
config switch-controller fortilink-settings
|