Description
This article describes the case when the device Profiling Rule using DHCP Fingerprint method does not match when a rogue host first connects. However, the rule matches the second time the host is evaluated (either by re-running the rule or deleting the host from Users & Hosts -> Host and reconnecting).
This behavior can occur if the DHCP fingerprint is not received before the host is evaluated by the rule. Once the DHCP fingerprint containing the hostname is received, it is saved in the database. Since the information is now available, the host will match upon re-evaluation.
- Enable ActiveFingerprint debug in the FortiNAC CLI:
CentOS: nacdebug -name ActiveFingerprint true
FortiNACOS: diagnose debug plugin enable ActiveFingerprint - Tail the output.nessus log.
CentOS: tail -F /bsc/logs/output.nessus I grep -i fingerprint
FortiNAC-OS: diagnose tail -F output.nessus - Connect a new host to the network.
Scope
Solution
scanRetryDelay=60000
serviceGracePeriod=120000
Rogue record creation time = RCTIME
If there is no fingerprint data, the rogue is put back in the queue for 1 minute ('scanRetryDelay=60000').
CentOS: Increase 'serviceGracePeriod' to allow more time to receive a fingerprint.
FortiNAC-OS: Wait time cannot be changed.
Related Articles:
Technical Note: View DHCP Fingerprint information received from the production network