Hi, I'm configuring my first FortiNAC.
I manually installed the Persistent agent on a test PC (OS Windows 11), according to the instructions found in https://community.fortinet.com/t5/FortiNAC/Technical-Tip-Manually-install-and-configure-Persistent-A...
It seems that the agent does not communicate with the Fortinac.
From the PC, telnet to eth1 fortinac on port 4568 is ok.
In the %ProgramData%\Bradford Networks folder I do not find any log files. As suggested I reinstalled the client but without success.
Icon of Persistent agent say: Network access normal. PC is viewed as rogue.
Could you help me?
Thanks in advance.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
On the client, regedit, go the the following path:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Bradford Networks\Persistent Agent
Does the value homeServer is the same as FortiNAC server FQDN or IP?
And is the certificate that you installed in FortiNAC server for agent communication has CN the same as the value defined in the above homeServer key?
The persistent agent should function properly with all types of antivirus software, as one of its functions is to monitor the antivirus and updates status. But in the end this is considered just like a normal software/service from the OS and antivirus perspective and if there are restriction in place, it can block its normal activity.
The persistent agent should function properly with all types of antivirus software, as one of its functions is to monitor the antivirus and updates status. But in the end this is considered just like a normal software/service from the OS and antivirus perspective and if there are restriction in place, it can block its normal activity.
Hello
You can also check the following.
Created on 10-02-2024 06:33 AM Edited on 10-04-2024 12:53 AM
Hi,
On the FNAC server I gave the command tcpdump -i eth1 port 4568.
On the PC I first restarted the service and then the PC itself without seeing anything.
From the PC I then telnetted to port 4568 and the session was successful.
> tcpdump -i eth1 port 4568
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
15:13:23.299346 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [S], seq 837294100, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
15:13:23.299380 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [S.], seq 2322422253, ack 837294101, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
15:13:23.300158 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [.], ack 1, win 1026, length 0
15:13:43.760751 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 1:2, ack 1, win 1026, length 1
15:13:43.760785 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 2, win 229, length 0
15:13:44.930021 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 2:4, ack 1, win 1026, length 2
15:13:44.930045 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 4, win 229, length 0
15:13:45.117340 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [P.], seq 4:6, ack 1, win 1026, length 2
15:13:45.117362 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 6, win 229, length 0
15:13:45.117832 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [F.], seq 1, ack 6, win 229, length 0
15:13:45.119538 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [.], ack 2, win 1026, length 0
15:13:45.119968 IP prcp19-111.mydomain.com.63586 > isolation.mydomain.com.bmc-reporting: Flags [F.], seq 6, ack 2, win 1026, length 0
15:13:45.119980 IP isolation.mydomain.com.bmc-reporting > prcp19-111.mydomain.com.63586: Flags [.], ack 7, win 229, length 0
Created on 10-02-2024 07:13 AM Edited on 10-02-2024 11:52 PM
Hello
On the FNAC server I did the tcdump but I didn't see any packets arriving from the agent.
From the PC I telnet to port 4568 and this is what I saw coming:
> tcpdump -i eth1 port 4568
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
15:13:23.299346 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [S], seq 837294100, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
15:13:23.299380 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [S.], seq 2322422253, ack 837294101, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
15:13:23.300158 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [.], ack 1, win 1026, length 0
15:13:43.760751 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 1:2, ack 1, win 1026, length 1
15:13:43.760785 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 2, win 229, length 0
15:13:44.930021 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 2:4, ack 1, win 1026, length 2
15:13:44.930045 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 4, win 229, length 0
15:13:45.117340 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [P.], seq 4:6, ack 1, win 1026, length 2
15:13:45.117362 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 6, win 229, length 0
15:13:45.117832 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [F.], seq 1, ack 6, win 229, length 0
15:13:45.119538 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [.], ack 2, win 1026, length 0
15:13:45.119968 IP prcp19-111.mydomain.63586 > isolation.mydomain.bmc-reporting: Flags [F.], seq 6, ack 2, win 1026, length 0
15:13:45.119980 IP isolation.mydomain.bmc-reporting > prcp19-111.mydomain.63586: Flags [.], ack 7, win 229, length 0
On the client, regedit, go the the following path:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Bradford Networks\Persistent Agent
Does the value homeServer is the same as FortiNAC server FQDN or IP?
And is the certificate that you installed in FortiNAC server for agent communication has CN the same as the value defined in the above homeServer key?
Created on 10-03-2024 10:55 PM Edited on 10-07-2024 03:32 AM
Thanks, I wil do what you suggest. I update you as possible.
Update
I found homeServer in the path:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Bradford Networks\Client Security Agent
I set fortinac.mydomain.com.
the CN in the certificate on the server is: CN=bradfordnetworks.com
I will have to generate a certificate with correct CN.
FortiNaC is great but if you're an MSP, be prepared to hire or contract some specifically for the deployment and support. It's very granular and there is no "one size fits all". It's a product I have in my test lab for over a year and still have not fully mastered it's deployment in a streamline fashion.
Hello,
Persistent agent Guide should help you is really detailed for diverse scenarios persistent agent deployment
BR
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1733 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.