This article explains the basic troubleshooting steps when 'Fortinet Single Sign On (FSSO) for SSL-VPN users' using syslog is not working.
FortiGate, FSSO.
2. If the firewall is not visible forwarding the log on port 514 to FSSO CA server, make sure the log filter is configured correctly:
config log syslogd filter
config free-style
edit 1
set category event
set filter "((logid 0101039947) or (logid 0101039948) or (logid 0101039949))"
next
end
end
3. Once the firewall forwards the logs, make sure to receive the logs on the FSSO CA server, validate using Wireshark.
4. Once the logs are visible on the CA Wireshark, it means the server is receiving the logs, now it is necessary to validate the collector agent debug logs.
From GUI, go to FSSO Agent -> Logging and set the Log level to Debug.
Username field misconfigured:
08/17/2023 10:28:09 [ 5032] Received syslog: <190>date=2023-08-17 time=11:28:18 devname="FortiGate-81E" devid="FGT81E4Q17000242" eventtime=1692251898176400908 tz="+0530" logid="0101039947" type="event" subtype="vpn" level="information" vd="root" logdesc="SSL VPN tunnel up" action="tunnel-up" tunneltype="ssl-tunnel" tunnelid=285300470 remip=10.5.23.138 tunnelip=10.212.134.200 user="test" group="test" dst_host="N/A" reason="tunnel established" msg="SSL tunnel established", from:10.14.4.174 <<<<<< this log explains that CA have received the log from the firewall with IP 10.14.4.174.
08/17/2023 10:28:09 [ 5032] Try to parse log message:
<190>date=2023-08-17 time=11:28:18 devname="FortiGate-81E" devid="FGT81E4Q17000242" eventtime=1692251898176400908 tz="+0530" logid="0101039947" type="event" subtype="vpn" level="information" vd="root" logdesc="SSL VPN tunnel up" action="tunnel-up" tunneltype="ssl-tunnel" tunnelid=285300470 remip=10.5.23.138 tunnelip=10.212.134.200 user="test" group="test" dst_host="N/A" reason="tunnel established" msg="SSL tunnel established"
08/17/2023 10:28:09 [ 5032] Extracted IP based on 'tunnelip={{:client_ip}} ': 10.212.134.200 <<<<< CA have extracted the tunnel IP of the client from the log
08/17/2023 10:28:09 [ 5032] Failed to extract user based on 'user=?{{:username}}?' <<<<< CA is unable to extract the username from the log, this happens when the "Username Field" wrong configuration done in the FSSO syslog rules.
08/17/2023 10:28:09 [ 5032] Cannot parse log message to get username
08/17/2023 10:28:09 [ 5032] Failed to parse log, error:-5
08/17/2023 10:28:09 [ 1808] check the cache to send logon events
08/17/2023 10:28:09 [ 1808] No new LOGON_EVENT to send
08/17/2023 10:28:09 [ 1808] No new LOGON_EVENT to send
In the FSSO, go to Advanced Settings -> Syslog Source List -> Manage Rule -> Edit -> Username Field: should be user="{{:user}}".
LDAP server probe failed from CA to LDAP server for group query:
08/20/2023 12:29:30 [ 5224] Received syslog: <190>date=2023-08-20 time=13:29:39 devname="FortiGate-81E" devid="FGT81E4Q17000242" eventtime=1692518378892203111 tz="+0530" logid="0101039947" type="event" subtype="vpn" level="information" vd="root" logdesc="SSL VPN tunnel up" action="tunnel-up" tunneltype="ssl-tunnel" tunnelid=285300476 remip=10.5.23.138 tunnelip=10.212.134.200 user="test" group="test" dst_host="N/A" reason="tunnel established" msg="SSL tunnel established", from:10.14.4.174 <----- This log explains that CA have received the log from the firewall with IP 10.14.4.174.
08/20/2023 12:29:30 [ 5224] Try to parse log message:
<190>date=2023-08-20 time=13:29:39 devname="FortiGate-81E" devid="FGT81E4Q17000242" eventtime=1692518378892203111 tz="+0530" logid="0101039947" type="event" subtype="vpn" level="information" vd="root" logdesc="SSL VPN tunnel up" action="tunnel-up" tunneltype="ssl-tunnel" tunnelid=285300476 remip=10.5.23.138 tunnelip=10.212.134.200 user="test" group="test" dst_host="N/A" reason="tunnel established" msg="SSL tunnel established"
08/20/2023 12:29:30 [ 5224] Extracted IP based on 'tunnelip={{:client_ip}} ': 10.212.134.200 <----- CA have extracted the tunnel IP of the client from the log.
08/20/2023 12:29:30 [ 5224] Extracted user based on 'user="{{:user}}"': test <<<<< CA have extracted the username of the client from the log
08/20/2023 12:29:30 [ 5224] Login from '10.212.134.200' (IPv6=''), user 'test', group ''
08/20/2023 12:29:30 [ 5224] Bytes received from DC agent(87608): 429 dcagent IP: 10.14.4.174, MT=00400000
08/20/2023 12:29:30 [ 5224] dcagent packet: add to queue, called:87608, current:0
08/20/2023 12:29:30 [ 6308] process_dcagent_events called by worker:112
08/20/2023 12:29:30 [ 6308] dcagent packet: removed from queue, called:87608 remain:0
08/20/2023 12:29:30 [ 6308] get dcagent event from processing queue by worker:112
08/20/2023 12:29:30 [ 6308] [D][Comm]W=112, PDE:HDE(000001B8C06DD430, 10.14.4.174, 429) <-----
08/20/2023 12:29:30 [ 6308] dcagent packet: processed:87608
08/20/2023 12:29:30 [ 6308] logon event(87608): len:69 monitorType:4194304 dc_ip:10.14.4.174 time:1692514770 len:26 data:10.212.134.200/SYSLOG/test ip:0.0.0.0
08/20/2023 12:29:30 [ 6308] resolve_ip_internal: workstation:10.212.134.200 [10.212.134.200:0.0.0.0] time:0
08/20/2023 12:29:30 [ 6308] ldaplib::ldap_bind_s failed, server:10.14.3.113 error code:0x31. <----- LDAP bind failed from CA to the server.
08/20/2023 12:29:30 [ 6308] ldaplib::search_s(), no connection to server, try reconnect... <----- No connection to server, hence CA is retrying to connect to the server.
08/20/2023 12:29:30 [ 6308] ldaplib::ldap_bind_s failed, server:10.14.3.113 error code:0x31.
08/20/2023 12:29:30 [ 6308] user test not found in the directory. <<<<<<< Collector agent could not fetch the groupinfo.
08/20/2023 12:29:30 [ 6308] ad_user_get_groups_str2_s():<NONE>
2. There is reachability and port communication, but still, if the error above appears, it could be because of the password mismatch for the admin used for the bind request. It is possible to validate the above using:
Go to FSSO agent -> Advanced Settings -> Syslog Source List -> Manage LDAP Server, select the LDAP server, and validate that the username is correct, if so, reenter the correct password again and test.
3. Sometimes, it is possible to have called the wrong LDAP server for the FortiGate where the logs have been received from:
From GUI go to FSSO agent -> Advanced Settings -> Syslog Source List, select the firewall -> Edit -> User Type -> Remote User, select the correct LDAP server configured on the CA for this firewall.
Note:
If the above is validated and still seeing the issue, open a ticket with TAC.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.