<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fortigate authorization with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4770566#M579695</link>
    <description>&lt;P&gt;Tacacs?&lt;/P&gt;</description>
    <pubDate>Tue, 07 Feb 2023 17:44:29 GMT</pubDate>
    <dc:creator>stefano.motti</dc:creator>
    <dc:date>2023-02-07T17:44:29Z</dc:date>
    <item>
      <title>Fortigate authorization with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4311369#M566347</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am integrating Fortigate firewall with Cisco ISE (version 2.4, patch 13) using TACACS, authentication is getting successful but authorization fails. Below are the attributes given in TACACS Profile. After logging into the firewall user is not able to view all the VDOMs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE cellspacing="0" cellpadding="7"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P class="lia-align-left"&gt;&lt;FONT face="Verdana" size="2" color="#000000"&gt;&lt;STRONG&gt;Attribute&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2" color="#000000"&gt;&lt;STRONG&gt;Requirement&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2" color="#000000"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2" color="#000000"&gt;&lt;STRONG&gt;Value&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="Verdana" size="2"&gt;service&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;Mandatory&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P align="center"&gt;&lt;FONT face="Verdana" size="2"&gt;Fortinet Service&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;fortigate&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="Verdana" size="2"&gt;memberof&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;Mandatory&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;TACACS+ group&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;RO_admin_group&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="Verdana" size="2"&gt;admin_prof&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;Mandatory&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;ACC Profile&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Verdana" size="2"&gt;RO_Profile&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to make any changes in the attributes given?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Mar 2021 11:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4311369#M566347</guid>
      <dc:creator>ChrisAnk</dc:creator>
      <dc:date>2021-03-22T11:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate authorization with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4311382#M566348</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- FYI :&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/td-p/3545350" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/td-p/3545350&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Mar 2021 11:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4311382#M566348</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2021-03-22T11:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate authorization with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4311386#M566349</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Had the same issue with 2.2 only the other week.&lt;/P&gt;&lt;P&gt;Compare this config, alot of it was trial and error, Fortigate said couldn't be done.&amp;nbsp; But I'm guessing it will be around&amp;nbsp;set vdom "root" "WIN-XP-7" "GENERIC-APP"&lt;/P&gt;&lt;P&gt;Depending on you forti firmware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will need to put in policys to deny access to other groups as anyone with any level in your tacacs will get full admin.&lt;/P&gt;&lt;P&gt;Let me know if this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CLI Commands for Fortigate Tacacs+ Read &amp;amp; ReadWR&lt;BR /&gt;Global&lt;BR /&gt;Config system accprofile&lt;BR /&gt;edit "Tacacs_RO"&lt;BR /&gt;set secfabgrp read&lt;BR /&gt;set ftviewgrp read&lt;BR /&gt;set authgrp read&lt;BR /&gt;set sysgrp read&lt;BR /&gt;set netgrp read&lt;BR /&gt;set loggrp read&lt;BR /&gt;set fwgrp read&lt;BR /&gt;set vpngrp read&lt;BR /&gt;set utmgrp read&lt;BR /&gt;set wifi read&lt;BR /&gt;next&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;BR /&gt;VDOM Root&lt;BR /&gt;config user group&lt;BR /&gt;edit "Tacacs"&lt;BR /&gt;set group-type firewall&lt;BR /&gt;set authtimeout 0&lt;BR /&gt;set auth-concurrent-override disable&lt;BR /&gt;set http-digest-realm ''&lt;BR /&gt;set member "sitise01" "sitise02" "sitise03"&lt;BR /&gt;config match&lt;BR /&gt;edit 1&lt;BR /&gt;set server-name "sitise01"&lt;BR /&gt;set group-name "TACACS_NETWORK_ADMIN"&lt;BR /&gt;next&lt;BR /&gt;edit 2&lt;BR /&gt;set server-name "sitise02"&lt;BR /&gt;set group-name "TACACS_NETWORK_ADMIN"&lt;BR /&gt;next&lt;BR /&gt;edit 3&lt;BR /&gt;set server-name "sitise03"&lt;BR /&gt;set group-name "TACACS_NETWORK_ADMIN"&lt;BR /&gt;next&lt;BR /&gt;end&lt;BR /&gt;next&lt;BR /&gt;edit "Radius"&lt;BR /&gt;set group-type firewall&lt;BR /&gt;set authtimeout 0&lt;BR /&gt;set auth-concurrent-override disable&lt;BR /&gt;set http-digest-realm ''&lt;BR /&gt;set member "sitise03"&lt;BR /&gt;config match&lt;BR /&gt;edit 1&lt;BR /&gt;set server-name "sitise03"&lt;BR /&gt;set group-name "TACACS_NEWORK_ACCESS_R"&lt;BR /&gt;next&lt;BR /&gt;end&lt;BR /&gt;next&lt;BR /&gt;next&lt;BR /&gt;edit "TacacsRO"&lt;BR /&gt;set group-type firewall&lt;BR /&gt;set authtimeout 0&lt;BR /&gt;set auth-concurrent-override disable&lt;BR /&gt;set http-digest-realm ''&lt;BR /&gt;set member "sitise01" "sitise02" "sitise03"&lt;BR /&gt;config match&lt;BR /&gt;edit 1&lt;BR /&gt;set server-name "sitise01"&lt;BR /&gt;set group-name "TACACS_NETWORK_ADMIN_R"&lt;BR /&gt;next&lt;BR /&gt;edit 2&lt;BR /&gt;set server-name "sitise02"&lt;BR /&gt;set group-name "TACACS_NETWORK_ADMIN_R"&lt;BR /&gt;next&lt;BR /&gt;edit 3&lt;BR /&gt;set server-name "sitise03"&lt;BR /&gt;set group-name "TACACS_NETWORK_ADMIN_R"&lt;BR /&gt;next&lt;BR /&gt;end&lt;BR /&gt;next&lt;BR /&gt;end&lt;BR /&gt;config system admin TACACS&lt;BR /&gt;edit "TACACS"&lt;BR /&gt;set remote-auth enable&lt;BR /&gt;set accprofile "super_admin"&lt;BR /&gt;set vdom "root" "WIN-XP-7" "GENERIC-APP"&lt;BR /&gt;set wildcard enable&lt;BR /&gt;set remote-group "Tacacs"&lt;BR /&gt;edit "TACACSRO"&lt;BR /&gt;set remote-auth enable&lt;BR /&gt;set accprofile "Radius_Admins"&lt;BR /&gt;set vdom "root" "WIN-XP-7" "GENERIC-APP"&lt;BR /&gt;set wildcard enable&lt;BR /&gt;set remote-group "TacacsRO"&lt;BR /&gt;next&lt;BR /&gt;end&lt;BR /&gt;next&lt;BR /&gt;config user tacacs+&lt;BR /&gt;edit "siteise01"&lt;BR /&gt;set server "your IP"&lt;BR /&gt;next&lt;BR /&gt;edit "siteise03"&lt;BR /&gt;set server "your IP"&lt;BR /&gt;set authorization enable&lt;BR /&gt;next&lt;BR /&gt;edit "siteise02"&lt;BR /&gt;set server "your IP"&lt;BR /&gt;set authorization enable&lt;BR /&gt;next&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 22 Mar 2021 11:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4311386#M566349</guid>
      <dc:creator>craiglebutt</dc:creator>
      <dc:date>2021-03-22T11:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate authorization with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4770566#M579695</link>
      <description>&lt;P&gt;Tacacs?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 17:44:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/m-p/4770566#M579695</guid>
      <dc:creator>stefano.motti</dc:creator>
      <dc:date>2023-02-07T17:44:29Z</dc:date>
    </item>
  </channel>
</rss>

