Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
rzanella
New Contributor III

Persistent agent don't comunicate to FortiNAC

Hi, I'm configuring my first FortiNAC.
I manually installed the Persistent agent on a test PC (OS Windows 11), according to the instructions found in https://community.fortinet.com/t5/FortiNAC/Technical-Tip-Manually-install-and-configure-Persistent-A...
It seems that the agent does not communicate with the Fortinac.
From the PC, telnet to eth1 fortinac on port 4568 is ok.
In the %ProgramData%\Bradford Networks folder I do not find any log files. As suggested I reinstalled the client but without success.

 

Icon of Persistent agent say: Network access normal. PC is viewed as rogue.

 

Could you help me?

 

Thanks in advance.

2 Solutions
AEK

On the client, regedit, go the the following path:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Bradford Networks\Persistent Agent

Does the value homeServer is the same as FortiNAC server FQDN or IP?

And is the certificate that you installed in FortiNAC server for agent communication has CN the same as the value defined in the above homeServer key?

AEK

View solution in original post

AEK
ebilcari

The persistent agent should function properly with all types of antivirus software, as one of its functions is to monitor the antivirus and updates status. But in the end this is considered just like a normal software/service from the OS and antivirus perspective and if there are restriction in place, it can block its normal activity.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.

View solution in original post

17 REPLIES 17
ebilcari

The persistent agent should function properly with all types of antivirus software, as one of its functions is to monitor the antivirus and updates status. But in the end this is considered just like a normal software/service from the OS and antivirus perspective and if there are restriction in place, it can block its normal activity.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
AEK
SuperUser
SuperUser

Hello

You can also check the following.

  • On FNAC server using tcpdump, check if you are receiving traffic on port 4568 from the agent
  • On FNAC server, check if you installed a certificate (for agent communication) signed from your CA which is trusted from your client
AEK
AEK
rzanella
New Contributor III

Hi,
On the FNAC server I gave the command tcpdump -i eth1 port 4568.
On the PC I first restarted the service and then the PC itself without seeing anything.
From the PC I then telnetted to port 4568 and the session was successful.

> tcpdump -i eth1 port 4568
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
15:13:23.299346 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [S], seq 837294100, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
15:13:23.299380 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [S.], seq 2322422253, ack 837294101, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
15:13:23.300158 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [.], ack 1, win 1026, length 0
15:13:43.760751 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 1:2, ack 1, win 1026, length 1
15:13:43.760785 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 2, win 229, length 0
15:13:44.930021 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 2:4, ack 1, win 1026, length 2
15:13:44.930045 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 4, win 229, length 0
15:13:45.117340 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 4:6, ack 1, win 1026, length 2
15:13:45.117362 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 6, win 229, length 0
15:13:45.117832 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [F.], seq 1, ack 6, win 229, length 0
15:13:45.119538 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [.], ack 2, win 1026, length 0
15:13:45.119968 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [F.], seq 6, ack 2, win 1026, length 0
15:13:45.119980 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 7, win 229, length 0

rzanella
New Contributor III

Hello

On the FNAC server I did the tcdump but I didn't see any packets arriving from the agent.
From the PC I telnet to port 4568 and this is what I saw coming:

> tcpdump -i eth1 port 4568
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
15:13:23.299346 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [S], seq 837294100, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
15:13:23.299380 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [S.], seq 2322422253, ack 837294101, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
15:13:23.300158 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [.], ack 1, win 1026, length 0
15:13:43.760751 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 1:2, ack 1, win 1026, length 1
15:13:43.760785 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 2, win 229, length 0
15:13:44.930021 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 2:4, ack 1, win 1026, length 2
15:13:44.930045 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 4, win 229, length 0
15:13:45.117340 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 4:6, ack 1, win 1026, length 2
15:13:45.117362 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 6, win 229, length 0
15:13:45.117832 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [F.], seq 1, ack 6, win 229, length 0
15:13:45.119538 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [.], ack 2, win 1026, length 0
15:13:45.119968 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [F.], seq 6, ack 2, win 1026, length 0
15:13:45.119980 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 7, win 229, length 0

 

AEK

On the client, regedit, go the the following path:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Bradford Networks\Persistent Agent

Does the value homeServer is the same as FortiNAC server FQDN or IP?

And is the certificate that you installed in FortiNAC server for agent communication has CN the same as the value defined in the above homeServer key?

AEK
AEK
rzanella
New Contributor III

Thanks, I wil do what you suggest. I update you as possible.

Update

I found homeServer in the path:

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Bradford Networks\Client Security Agent

I set fortinac.mydomain.com.
the CN in the certificate on the server is: CN=bradfordnetworks.com
I will have to generate a certificate with correct CN.

fonilgo2
New Contributor

FortiNaC is great but if you're an MSP, be prepared to hire or contract some specifically for the deployment and support. It's very granular and there is no "one size fits all". It's a product I have in my test lab for over a year and still have not fully mastered it's deployment in a streamline fashion.

https://vlc.onl/
ndumaj
Staff
Staff

Hello,

Persistent agent Guide should help you is really detailed for diverse scenarios persistent agent deployment 

BR

- Happy to help, hit like and accept the solution -
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors