FortiNAC
NOTE: FortiNAC is now named FortiNAC-F. For post-9.4 articles, see FortiNAC-F. FortiNAC is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.
lfrancelj
Staff
Staff
Article Id 191164

Description

 

This article describes how to manually install and configure 'Persistent Agent', provided by the FortiNAC, on Windows OS.

Related links.

Fortinet Documentation:

Solution

 

  1. Download the 'Persistent Agent' installer from the GUI:


System -> Settings -> Updates -> Agent Packages to the server or workstation running Windows OS by selecting the installation file that matches the Operating System in use:

  
  1. Run the setup file 'FortiNAC Persistent Agent.msi' in this example and follow the installation wizard.

  2. When the installation is finished the 'Persistent Agent' starts automatically, and it is possible to verify if the status in the 'Services' view (select Start -> Run, type in 'services.msc' and select 'OK').
 
 
  1. To configure a destination server for the 'Persistent Agent', change settings in the registry (select Start -> Run, type in 'regedit' and navigate to 'HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Bradford Networks\Client Security Agent').

  2. Change the 'ServerIP' value to the FortiNAC IP address or host name.
  

 
  1. After changing the 'ServerIP' in the registry, restart the 'FortiNAC Persistent Agent Service' in the 'Services' view (see 3) by selecting 'FortiNAC Persistent Agent Service' and selecting restart.
 
 
  1. Check the logs in 'C:\ProgramData\Bradford Networks\general.txt' where the progress of the connecting 'Persistent Agent' to the previously configured FortiNAC is visible (see step 5).
The authorized application %ProgramFiles%\Bradford Networks\Persistent Agent\bndaemon.exe is enabled in the firewall.
 
2020-04-23 09:51:58 UTC :: ClientState = 1.
2020-04-23 09:51:58 UTC :: ClientStateEnabled = 1.
2020-04-23 09:51:58 UTC :: ServerIP = fnac.forti.lab.
2020-04-23 09:51:58 UTC :: Uninstall = /qn /x {65E4A3F0-A6B3-48DD-B8F8-C340ED03AF71}.
2020-04-23 09:51:58 UTC :: Version = 5.2.1.8.
 
  1. The 'Persistent Agent' has successfully established secure connection with a message. 

 

2020-04-23 09:51:59 UTC :: Success converting RSA pubkeys to internal format!.
2020-04-23 09:51:59 UTC :: Detected Server Version: 8.6.3.1206.
2020-04-23 09:51:59 UTC :: constructFromBufer verb = Set Parameters.
2020-04-23 09:51:59 UTC :: handleReceivedPacket() -- received this packet.

 
 
Troubleshooting.
If there are any SSL certificate related issues/errors reported in the general.txt, ensure that the signing CA certificate, which issues the 'Persistent Agent' certificate on FortiNAC, is added to the 'Trusted Root Certification Authorities' store on all of the client machines. If there are CA certificate hierarchies, such as the Root CA and Intermediate CAs, the whole CA certificate chain must be added to the FortiNAC as well as on all of the client machines in their respective stores. 
 
  • Root CA certificate and any Intermediate CA certificate along with the Persistent Agent certificate to be added in FortiNAC.
  • Root CA certificate and any Intermediate CA certificate to be added on all Windows computers in the 'Trusted Root Certification Authorities and Intermediate Certification Authorities' store. 
 
2024_11_01_10_18_13_certmgr_Certificates_Current_User_Intermediate_Certification_Authorities_.png
 
Verify which certificate is used by FortiNAC under System -> Settings -> Security -> Certificate Management.
 

 

Related article:

Technical Tip: Windows Persistent Agent logs