Created on
10-01-2018
04:26 AM
Edited on
10-21-2024
07:11 AM
By
Stephen_G
Description
This article describes how to investigate issues where the device fails CLI credential validation in Administration UI.
SSH access via CLI, however, is successful using the same credentials.
Scope
FortiNAC, FortiNAC-F.
Solution
Enable the TelnetServer plugin using FortiNAC CLI:
FortiNAC (CentOS):
logs
nacdebug -name TelnetServer true
tf output.master
FortiNAC-F (NACOS):
diagnose debug plugin enable TelnetServer
The issue is that FortiNAC must be able to read the sysDescription OID (1.3.6.1.2.1.1.1.0).
To determine if the sysDescription can be read, query the OID via the appliance CLI using the snmpwalk tool:
FortiNAC (CentOS)
snmpwalk -v 3 -u <username> -l <AuthPriv or NoAuthPriv> -a <MD5 or SHA> -A <password> -x <DES or AES> -X <password> <device ip_address> 1.3.6.1.2.1.1.1.0
Example of a normal response:
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2016 by Cisco Systems, Inc.
Compiled Fri 25-Mar-16 16:59 by mcpre
SNMPv2-MIB::sysDescr.0 = No Such Object available on this agent at this OID
When such error is presented, ensure the SNMP v3 permissions on the device allow for access to sysDescription OID (1.3.6.1.2.1.1.1.0).
Related articles:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.