This article is a troubleshooting guide for issues related to managed FortiSwitch onboarding, into FortiGate. Three common issues are covered:
FortiSwitch.
If it is possible to see the FortiSwitch on the FortiGate web interface but are unable to Authorize the FortiSwitch, follow the below steps:
One of the possible errors can be observed in the GUI when there is a duplicate VLAN with the VLAN ID number 1: 'Cannot edit managed-switch peer link admin'. Refer to Technical Tip: No authorisation between FortiSwitch and FortiGate because Vlan 1 is used for more information.
If the issue persists after the steps above, contact Technical support with the output of the following commands from FortiSwitch and FortiGate:
FortiSwitch CLI:
show full
diag debug report
FortiGate CLI:
execute switch-controller get-conn-status
execute switch-controller diagnose-connection
execute switch-controller diagnose-connection <FortiSwitch device ID or SN>
config switch-controller managed-switch
edit <switch_serial_number>
set fsw1-wan-admin enable <----- Shows an error with the reason for the authorization issue.
end
If this is a brand new FortiSwitch and it is not coming online on FortiGate, follow the below steps for troubleshooting.
On FortiGate:
On FortiSwitch:
get sys interface<----- Make sure the internal interface is getting the IP Address from FortiLink. If not, check if internal is set to be DHCP.
S224EXXXXXXXX # config system interface
S224EXXXXXXXX (interface) # edit internal
S224EXXXXXXXX internal) # show
config system interface
edit "internal"
set mode dhcp <----- Set to DHCP.
set allowaccess ping https ssh
set type physical
set snmp-index 30
set defaultgw enable
next
end
diagnose switch physical-port summary <----- Uplink port and internal must be on 4094.
S224EXXXXXXXX # diagnose switch physical-ports summary
Portname Status Tpid Vlan Duplex Speed Flags Discard
__________ ______ ____ ____ ______ _____ ____________ _________
port24 up 8100 4094 full 1G QS,TL, none
internal up 8100 4094 full 1G QS, , none
diagnose switch trunk summary <----- Trunk should be auto-configured with FortiGate.
S224E********** # diagnose switch trunk summary
Trunk Name Mode PSC MAC Status Up Time
________________ ________________________________ ___________ _________________ ___________ _________________________________
G100FTK****** lacp-active(isl) src-dst-ip E8:1C:BA:AF:82:03 up(1/1) 0 days,23 hours,48 mins,32 secs
If the above 2 steps fail, check if the below settings are configured on FortiSwitch.
config switch auto-network
set mgmt-vlan 4094
set status enable
end
If the FortiSwitch is below V7.2.0:
config system global
set switch-mgmt-mode fortilink
end
config switch physical-port
(physical-port) # edit port24 <-----Uplink Port.
(port24) # set lldp-profile default-auto-isl
(port24) # end
S224E********* # diagnose sys ntp status
synchronized: yes, ntpsync: enabled, server-mode: disabled
ipv4 server(169.254.1.1) 169.254.1.1 -- reachable(0xfd) S:0 T:14 selected
server-version=4, stratum=3
reference time is e8e68d7f.b82b8507 -- UTC Fri Oct 27 19:26:55 2023
clock offset is -0.012170 sec, root delay is 0.059586 sec
root dispersion is 0.010345 sec, peer dispersion is 431 msec
config sys ntp
set ntpsync enable <----- Needs to be enabled.
config ntpserver
edit 0
set server <fortilink_ip_address>
end
If the date is not accurate, the FortiLink connection to FortiGate could fail, so ensure the date is accurate on the FortiSwitch.
If FortiSwitches are still not up after the above, see below:
diag switch phyiscal-port linerate <port_no><----- check if both tx,rx traffic is visible on the port.
diag switch phyiscal-port linerate up<----- Check If the tx total and rx total is the same. If not, there might be a possible loop or broadcast in the network.
If the FortiSwitch is still showing Authorized/Down in the FortiGate (for the command 'execute switch-controller get-conn-status'), there could be residual configs on the FortiSwitch which could be interfering with the FortiLink connection. If it is feasible to do a factory reset on the FortiSwitch (for example when it is a new switch being added), then do a 'execute factoryreset' and say 'y' when asked to confirm, and then verify if it connects to the FortiGate.
MCLAG setup:
If the FortiSwitch being added is replacing one of the two MCLAG switches in an existing pair, then the 'set mclag-icl enable' needs to be manually configured on the replacement switch in the ICL trunk with the peer switch name for it to be able to connect to the FortiGate over FortiLink. Refer to Step 7 under the section 'To replace a managed FortiSwitch unit of an MCLAG pair' in this article for more details.
If the issue persists after the above steps, contact Technical support with the output of the following commands from FortiSwitch and FortiGate:
FortiSwitch CLI:
show full
diag debug report
diag debug crashlog read
FortiGate CLI:
show system dhcp server | grep -f "<FortiLink interface name>"
show system ntp
show system interface <fortilink interface name>
execute switch-controller get-conn-status
execute switch-controller diagnose-connection
execute switch-controller diagnose-connection <FortiSwitch device SN or name>
execute switch-controller get-physical-conn standard <FortiLink interface name>
execute switch-controller get-physical-conn dot <FortiLink interface name>
execute switch-controller get-sync-status all
config system interface
edit <fortilink-interface-name>
show full
end
On FortiGate.
Make sure the topology is supported and is listed below:
Determining the network topology
If 2 FortiSwitches are directly connected to the FortiLink interface (Aggregate interface), a cable must be connected between the FortiSwitches with 'split-interface' enabled on the FortiLink.
Split interface setting will put one of the interfaces in 'down' status, acting as a backup link to the FortGiate. This will only become active when the other interface fails.
config sys interface
edit Fortilink
set members x1 x2
set fortilink-split-interface enable
end
If the issue persists after the above refer to 2., FortiSwitch is not coming online.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.