- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Persistent agent don't comunicate to FortiNAC
Hi, I'm configuring my first FortiNAC.
I manually installed the Persistent agent on a test PC (OS Windows 11), according to the instructions found in https://community.fortinet.com/t5/FortiNAC/Technical-Tip-Manually-install-and-configure-Persistent-A...
It seems that the agent does not communicate with the Fortinac.
From the PC, telnet to eth1 fortinac on port 4568 is ok.
In the %ProgramData%\Bradford Networks folder I do not find any log files. As suggested I reinstalled the client but without success.
Icon of Persistent agent say: Network access normal. PC is viewed as rogue.
Could you help me?
Thanks in advance.
Solved! Go to Solution.
- Labels:
-
FortiNAC
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
On the client, regedit, go the the following path:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Bradford Networks\Persistent Agent
Does the value homeServer is the same as FortiNAC server FQDN or IP?
And is the certificate that you installed in FortiNAC server for agent communication has CN the same as the value defined in the above homeServer key?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The persistent agent should function properly with all types of antivirus software, as one of its functions is to monitor the antivirus and updates status. But in the end this is considered just like a normal software/service from the OS and antivirus perspective and if there are restriction in place, it can block its normal activity.
If you have found a solution, please like and accept it to make it easily accessible for others.
- « Previous
-
- 1
- 2
- Next »
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The persistent agent should function properly with all types of antivirus software, as one of its functions is to monitor the antivirus and updates status. But in the end this is considered just like a normal software/service from the OS and antivirus perspective and if there are restriction in place, it can block its normal activity.
If you have found a solution, please like and accept it to make it easily accessible for others.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello
You can also check the following.
- On FNAC server using tcpdump, check if you are receiving traffic on port 4568 from the agent
- On FNAC server, check if you installed a certificate (for agent communication) signed from your CA which is trusted from your client
Created on ‎10-02-2024 06:33 AM Edited on ‎10-04-2024 12:53 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
On the FNAC server I gave the command tcpdump -i eth1 port 4568.
On the PC I first restarted the service and then the PC itself without seeing anything.
From the PC I then telnetted to port 4568 and the session was successful.
> tcpdump -i eth1 port 4568
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
15:13:23.299346 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [S], seq 837294100, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
15:13:23.299380 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [S.], seq 2322422253, ack 837294101, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
15:13:23.300158 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [.], ack 1, win 1026, length 0
15:13:43.760751 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 1:2, ack 1, win 1026, length 1
15:13:43.760785 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 2, win 229, length 0
15:13:44.930021 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 2:4, ack 1, win 1026, length 2
15:13:44.930045 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 4, win 229, length 0
15:13:45.117340 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 4:6, ack 1, win 1026, length 2
15:13:45.117362 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 6, win 229, length 0
15:13:45.117832 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [F.], seq 1, ack 6, win 229, length 0
15:13:45.119538 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [.], ack 2, win 1026, length 0
15:13:45.119968 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [F.], seq 6, ack 2, win 1026, length 0
15:13:45.119980 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 7, win 229, length 0
Created on ‎10-02-2024 07:13 AM Edited on ‎10-02-2024 11:52 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello
On the FNAC server I did the tcdump but I didn't see any packets arriving from the agent.
From the PC I telnet to port 4568 and this is what I saw coming:
> tcpdump -i eth1 port 4568
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
15:13:23.299346 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [S], seq 837294100, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
15:13:23.299380 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [S.], seq 2322422253, ack 837294101, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
15:13:23.300158 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [.], ack 1, win 1026, length 0
15:13:43.760751 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 1:2, ack 1, win 1026, length 1
15:13:43.760785 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 2, win 229, length 0
15:13:44.930021 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 2:4, ack 1, win 1026, length 2
15:13:44.930045 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 4, win 229, length 0
15:13:45.117340 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 4:6, ack 1, win 1026, length 2
15:13:45.117362 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 6, win 229, length 0
15:13:45.117832 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [F.], seq 1, ack 6, win 229, length 0
15:13:45.119538 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [.], ack 2, win 1026, length 0
15:13:45.119968 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [F.], seq 6, ack 2, win 1026, length 0
15:13:45.119980 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 7, win 229, length 0
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
On the client, regedit, go the the following path:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Bradford Networks\Persistent Agent
Does the value homeServer is the same as FortiNAC server FQDN or IP?
And is the certificate that you installed in FortiNAC server for agent communication has CN the same as the value defined in the above homeServer key?
Created on ‎10-03-2024 10:55 PM Edited on ‎10-07-2024 03:32 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks, I wil do what you suggest. I update you as possible.
Update
I found homeServer in the path:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Bradford Networks\Client Security Agent
I set fortinac.mydomain.com.
the CN in the certificate on the server is: CN=bradfordnetworks.com
I will have to generate a certificate with correct CN.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
FortiNaC is great but if you're an MSP, be prepared to hire or contract some specifically for the deployment and support. It's very granular and there is no "one size fits all". It's a product I have in my test lab for over a year and still have not fully mastered it's deployment in a streamline fashion.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
Persistent agent Guide should help you is really detailed for diverse scenarios persistent agent deployment
BR

- « Previous
-
- 1
- 2
- Next »