Hello Community,
Please for your support.
Just a brief explanation of the topology and the case at first. We have a NAC VM Cluster, in which we have enrolled our inventory switches. we want dynamic vlan assignment for the users, based on an the Role attribute that each user has ( attribute 60 = vlan 60). Switches has the respective AAA config and i can see on the NAC that the radius accept is sent when the user is connected to the port. Users have the supplicant configuration for the Radius authentication as well. Thing is that when the user connects on the switch, NAC does not assign any vlan dynamic as it should and it marks the port as down (not connected), on the nac gui even though on the switch side the port is still up and working on the vlan that it was. normal policies work as it should ( for instance vlan assignment on Cisco IP phones).
Below some screenshots that may help
Any ideas will be highly appreciated.
Some tests a couple of weeks ago with the exact same laptop worked fine but now this is the case.
thanks in advance.
Solved! Go to Solution.
If authentication on the port is successful, the switch should be able to learn the MAC addresses of the connected hosts, allowing FNAC to poll this information successfully. Please check the switch MAC address table to verify that the hosts MAC addresses are present.
What are the results when the same host connects directly to the switch port, without being daisy chained through an IP phone? What is the host's status, and how is it initially registered in FNAC?
Additionally, verify the switch configuration to ensure that multiple hosts are allowed to authenticate on a single port.
Hello and sorry for the late repsone. Issue partially resolved by changing the "aaa server radius dynamic-author port" to the default one. Regarding the view issue i did not find any solution yet. Even though the authentication is completed successfully the view from FortiNAC still is "blind". When we enforce a port, everything appears to be functioning correctly with Dot1X (connectivity is fine) and the switch view shows no problems. However, in the FNAC interface, the port appears as not connected.
Can FNAC access the switch via SNMP and CLI? Do the hosts appear on port after a manual L2 poll of the switch?
I confirm SNMP and CLI connectivity. Also nothing changes after a manual L2 Polling.
If authentication on the port is successful, the switch should be able to learn the MAC addresses of the connected hosts, allowing FNAC to poll this information successfully. Please check the switch MAC address table to verify that the hosts MAC addresses are present.
User | Count |
---|---|
2570 | |
1362 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.