Created on
06-01-2020
09:35 AM
Edited on
12-12-2024
12:40 AM
By
Jean-Philippe_P
Description
This article describes troubleshooting steps if FortiSwitch is not moving the client to the dynamic assigned VLAN although the configuration is correct and ClearPass is sending VLAN ID in the RADIUS return attribute.
Fortinet Documentation:
https://docs.fortinet.com/product/fortiswitch/6.4
Page 255 'Dynamic Vlan assignment':
FortiSwitchOS Administration Guide— Standalone Mode
Scope
FortiSwitch.
Solution
Refer to the documentation and configure radius authentication with dynamic assigned VLAN.
diagnose switch 802-1x status
port47: Mode: port-based (mac-by-pass disable)
Link: Link up
Port State: authorized: ( )
Dynamic Authorized Vlan : 0
EAP pass-through mode : Enable
Quarantine VLAN (4093) detection : Enable
Native Vlan : 1
Allowed Vlan list:
Untagged Vlan list: 4093
Guest VLAN :
Auth-Fail Vlan :
Sessions info:
c8:5b:76:ef:65:c7 Type=802.1x,TLS,state=AUTHENTICATED,etime=0,eap_cnt=9 params:reAuth=3600
Client is successfully authenticated but Dynamic Authorized VLAN shows 0 although the ClearPass radius server is sending the dynamic assigned VLAN in a RADIUS accept message.
Resolution:
Tunnel-Private-Group-Id
Tunnel-Type
Tunnel-Medium-Type
For example:
=================================================================================================================
<Attribute profile="in out" type="String" name="Tunnel-Private-Group-Id" id="81" extraData="has_tag"/>
<Attribute profile="in out" type="Unsigned32" name="Tunnel-Type" id="64" extraData="has_tag">
<Attribute profile="in out" type="Unsigned32" name="Tunnel-Medium-Type" id="65" extraData="has_tag">
At the end of the line replace extraData="has_tag" with extraData =" ".
<Attribute profile="in out" type="String" name="Tunnel-Private-Group-Id" id="81" extraData=" "/>
<Attribute profile="in out" type="Unsigned32" name="Tunnel-Type" id="64" extraData=" ">
<Attribute profile="in out" type="Unsigned32" name="Tunnel-Medium-Type" id="65" extraData=" ">
=================================================================================================================
Upload the latest attributes file (RadiusDictionary.xml) on ClearPass and re-test the client.
Now, Dynamic Authorized VLAN has been pushed correctly and the client will be moved to the respective VLAN.
diag switch 802-1x status
port47: Mode: port-based (mac-by-pass disable)
Link: Link up
Port State: authorized: ( )
Dynamic Authorized Vlan : 99
EAP pass-through mode : Enable
Quarantine VLAN (4093) detection : Enable
Native Vlan : 99
Allowed Vlan list:
Untagged Vlan list: 4093
Guest VLAN :
Auth-Fail Vlan :
Sessions info:
c8:5b:76:ef:65:c7 Type=802.1x,TLS,state=AUTHENTICATED,etime=4,eap_cnt=9 params:reAuth=3600
Note: Verify the below settings are configured.
Configure the NAS IP, as the system interface IP on FortiGate that points towards the RADIUS server:
In FortiGate CLI:
config switch-controller security-policy local-access
edit "default"
set mgmt-allowaccess https ping ssh
set internal-allowaccess https ping ssh radius-acct <--- Add radius-acct.
next
end
In FortiSwitch CLI:
config system interface
edit "internal"
set mode dhcp
set allowaccess ping https ssh radius-acct <--- Add radius-acct.
set type physical
end
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.