FortiNAC
NOTE: FortiNAC is now named FortiNAC-F. For post-9.4 articles, see FortiNAC-F. FortiNAC is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.
FortiKoala
Staff
Staff
Article Id 198447

Description

 
This article describes how to solve an issue where FortiSwitch fails to move rogue switches to the registration VLAN.
 
Scope

 

FortiNAC.

 

Solution

 

When a switch fails to move rogues to the registration VLAN, check the following:
 
  1. SNMP v1 link state or Mac Notification traps are being sent by the switch to FortiNAC.
 
In FortiNAC this can be validated by enabling the following debugs in CLI.
 
  1. FortiNAC (CentOS).

    logs
    nacdebug -name SnmpV1 true
    nacdebug -name DeviceInterface true
    nacdebug -name BridgeManager true
    nacdebug -name TrapHandler true
    tf output.master | egrep -i "received\|MAC notification"

  2. FortiNAC-F (NACOS).

    diagnose debug plugin enable SnmpV1
    diagnose debug plugin enable DeviceInterface
    diagnose debug plugin enable BridgeManager 
    diagnose debug plugin enable TrapHandler
    diagnose tail -F output.master | grep -i "received\|MAC notification"
 
The output will filter for the provided strings that are the trap received events.
Example logs in FortiNAC output.master for MAC traps:
 
FortiSwitch MAC Notification received for FortiGateLAB:root:SwitchNAME:port3, operation = ADD, vlanId = 60, mac = 00:0C:29:XX:XX:XX, port ifIndex = 3
yams.DeviceInterface FINER :: 2024-05-02 14:57:21:271 :: #69 :: DeviceServer.processMACNotifcation(): passing 1 MAC Notifications from device IP 192.168.1.254 to BridgeManager
yams.BridgeManager FINER :: 2024-05-02 14:57:21:271 :: #69 :: BridgeManager.handleMACNotifications processing 1 notifications
yams.BridgeManager INFO :: 2024-05-02 14:57:21:271 :: #69 :: MAC Notification:
Port Description = FortiGateLAB:root:SwitchNAME:port3
MAC Address = 00:0C:29:XX:XX:XX
VLAN = 60
Operation = ADD
 
  1. Traps are being sent from the same IP address as is modeled in inventory view (Elements tab).
     
The switch model configuration is set up with the Registration VLAN defined.
 
Figure 1. Registration Logical network has a Network access value defined.Figure 1. Registration Logical network has a Network access value defined.
  1. The VLAN defined in the model configuration is created in the switch.

  2. Topology Port View in FortiNAC shows the host connected to the correct port.

  3. The host is displayed as a rogue in FortiNAC.

 
Figure 2. Rogue connected to port3 in enforced port.Figure 2. Rogue connected to port3 in enforced port.

 

 

  1. Communication is successful (SNMP and SSH) between FortiNAC and the switch (Validate Credentials).
     
    Go to the respective device in Inventory view -> Credentials and select 'Validate Credentials'.
    If there is a failure in CLI credentials, the issue must be resolved before proceeding with any other configuration or change in FortiNAC.
     
    Figure 3. Validation of credentials show success for both SNMP and CLI.Figure 3. Validation of credentials show success for both SNMP and CLI.

     

     
  2. Port is part of the 'Forced Registration' system group.
'Right-click' the port in the Inventory view on respective device and select 'Group Membership'. Select 'Forced Registration'.
 
Figure 4. Port is made member of "Forced Registration" system group.Figure 4. Port is made member of "Forced Registration" system group.
 
Related articles: