FortiNAC-F
FortiNAC-F is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks. For legacy FortiNAC articles prior to FortiNAC-F 7.2, see FortiNAC.
pals
Staff
Staff
Article Id 403775
Description This article provides a checklist and the necessary logs to collect in cases where, after adding a FortiGate to FortiNAC, the Virtualized Device tab and VDOM information are not visible in the FortiNAC GUI.
Scope FortiNAC, FortiNAC-F.
Solution

If, after a successful integration of FortiGate into FortiNAC, no information is displayed following the credential section, and there is no VDOM data in the label column:

 

Screenshot 2025-07-17 102631.png


Expected Outcome:
The Virtualized Device section and VDOM data should appear correctly:

 

Screenshot 2025-07-17 102707.png

 

The following troubleshooting steps should be undertaken:

  1. Initial Verification: Ensure that the credentials are validated successfully by selecting the 'Validate Credential' button.

 

Screenshot 2025-07-28 111042.png

 

  • Verify that the FortiNAC profile on the FortiGate is properly configured: Technical Tip: How to configure & use API token to communicate with FortiGate 
  • Ensure that HTTPS service and Device Detection are enabled on the outgoing interface of the FortiGate.
  • Ensure that the REST API is properly configured on the FortiGate and the token is mapped to FortiNAC.
  • After configuring the REST API, resynchronize the FortiGate with FortiNAC and re-validate the credentials.
  • In case of issues, the first troubleshooting step should focus on resolving any REST API-related issues.

 

  1. Log Collection: If no issues are found and the problem persists after all initial checks, proceed to collect the following information:
  • In the FortiNAC Inventory, access the Element tab of the FortiGate -> enable Advanced Options -> select the Enable Device Debug option -> select Save.
  • On the FortiNAC CLI, enable the following debug:


device -ip x.x.x.x -setAttr -name DEBUG -value "ForwardingInterface TelnetServer " <----- x.x.x.x is FortiGate interface IP as per the viewpoint of FortiNAC).


nacdebug -level org.apache.sshd -level TRACE

 

 

  • After enabling the debug options, return to the Credentials tab in the GUI interface and select the 'Validate Credentials' button.
  • Right-click on the FortiGate entry and select Resync Interfaces.

 

  1. Final Steps: