Hi,
I am facing a strange issue regarding Tacacs setup:
it works well without any problem with a specific server (which is a Cisco ISE PSN), and my login attemps seen in Cisco ISE Live logs.
but when I configure another PSN , I can login to the device, but my attempts is not seen in Cisco ISE Live logs. It's also strange, when I test it by 'diagnose test authserver tacacs+...' then my login test/attempt is seen in ISE Live logs.
I have captured traffic on this firewall to see what happens on packet level and found that when login attempt is not seen in Cisco ISE Live logs then firewall simply resets connection during TCP handshake right after syn+ack packet coming from PSN. So connection is not established at all.
Thanks,
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Is this the only available authentication server?
If there's another one, then perhaps you're getting this quick RST because the FortiGate has already received a valid reply from the other authentication server.
How long does it take, precisely, from the SYN to the RST?
This coudl be a timeout issue, you may want to try tweaking these valuses:
config system global
set remoteauthtimeout x (default is 5, in seconds)
set ldapconntimeout x (default is 500, in milliseconds; don't let the name fool you, it should be relevant :) )
end
thank you for your prompt help.
actually I also thought that it could be a latency problem even if the gap between syn and syn+ack packets is not more than 500 milliseconds.
I set remoteauthtimeout to 10 and ldapconntimeout to 5000 but I am still experiencing this issue :\
739.989542 wan2 out x.x.x.x.11422 -> y.y.y.y.49: syn 3499347805
740.133811 wan2 in y.y.y.y.49 -> x.x.x.x.11422: syn 1233737855 ack 3499347806
740.133897 wan2 out x.x.x.x.11422 -> y.y.y.y.49: rst 3499347806
Is this the only available authentication server?
If there's another one, then perhaps you're getting this quick RST because the FortiGate has already received a valid reply from the other authentication server.
Hi,
I just wanted to share my findings with you but you were faster :)
you're right. I captured TCP + UDP traffic and found there is a Radius communication when I tried to log in. Then I went through the configuration and indeed, it was the problem.
Forti sent out the authentication request to both Radius and Tacacs servers, and Radius was faster, this way Forti reset Tacacs communication because user was already authenticated. So it is just about race, where Radius was the winner in every time :)
Thanks for your time and efforts ;)
Hi,
it's weird, when I type wrong password (making failed login) then no reset seen... but if I use my valid credential, Forti always reset this traffic right after SYN+ACK from PSN. how is it possible?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1531 | |
1028 | |
749 | |
443 | |
209 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.