cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3564
Views
1
Helpful
10
Replies

Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configuration

RG78874
Level 1
Level 1

Hello,

I am working on some Fortinet's and for anyone that has connected Fortinet's to Cisco ISE using tacacs+ I could really do with some help.

TACACS+ > Active Directory > Separate Read Only group and Read/Write Group

Article that I am using to configure this - https://sharifulhoque.blogspot.com/2019/09/fortigate-using-radius-server-windows_4.html

(Yes it says Radius but it's got Tacacs+ config steps)

Can you see anything in the guide that I would be missing from my configuration.

I've got a successful connection to tacacs+

I have a connection to Active Directory.

I have Read / Write and Read Only AD groups, I'm not sure what else I am missing or if anyone can help.

I'm using version 3.1 and Fortigate version 7.4.x

Fortinet Guide hasn't got much info, but Fortinet side is configured.

 

1 Accepted Solution

Accepted Solutions

All fixed, device policy admin set

View solution in original post

10 Replies 10

what is the behavior you are seeing ? are you able to login ?

have you run the diagnose command as per the example ?

Please attach the relevant config for fortigate and also screenshots of how it is configured in ISE

Screen shots are not available. I can see Tacacs Live Log errors show

Authentication Details section:

Message text Failed-Attempt: Authentication failed

Failure Reason 13036 Selected Shell profile is DenyAccess

The Shell profile is configured as per article in my post.

In this video we'll use ISE 3.1 as radius server for Fortigate 7. Fortinet Vendor Specific Attributes (VSA) https://community.fortinet.com/t5/FortiDDoS/Technical-Tip-Fortinet-s-RADIUS-Dictionary-VSA-vendor-specific/ta-p/193076?externalID=FD30830

@MHM Cisco WorldThanks I checked it, but this is Radius setup. I am using Tacacs+

ISE setup for this is different

All fixed, device policy admin set

Jhonleo02
Level 1
Level 1

Ensure the user roles in Cisco ISE are correctly mapped to your AD groups for both read-only and read/write access. Also, verify that TACACS+ policies are properly assigning these roles. Discover more by reviewing detailed role-mapping configurations for any missing steps.

Thanks @Jhonleo02 one problem... I have read/write access and I cannot get cli or ssh to type any commands for example "config system admin" any ideas what i need to allow on ISE for this?

TACACS+ policies might not be assigning the correct privilege level for CLI access. Double-check the command sets and ensure that the read/write group is permitted to execute CLI commands like "config system admin." Additionally, confirm that your user roles in Cisco ISE are properly configured to provide the necessary administrative access.

gordonmckenna6
Level 1
Level 1

Based on your description, it seems you've configured the essential components: successful TACACS+ connection, Active Directory integration, and defined Read/Write and Read-Only AD groups. However, to ensure proper role assignment on the FortiGate, verify that the attribute-value pairs sent by Cisco ISE match FortiGate's expected values. Specifically, check that the TACACS+ service custom attributes in ISE correspond to the appropriate admin profiles on the FortiGate. If these attributes are misconfigured or missing, FortiGate may not assign the correct permissions.

gordonmckenna6
Level 1
Level 1

@RG78874 wrote:

Hello,

I am working on some Fortinet's and for anyone that has connected Fortinet's to Cisco ISE using tacacs+ I could really do with some help.

TACACS+ > Active Directory > Separate Read Only group and Read/Write Group

Article that I am using to configure this - https://sharifulhoque.blogspot.com/2019/09/fortigate-using-radius-server-windows_4.html

(Yes it says Radius but it's got Tacacs+ config steps) writing seo content vancouver

Can you see anything in the guide that I would be missing from my configuration.

I've got a successful connection to tacacs+

I have a connection to Active Directory.

I have Read / Write and Read Only AD groups, I'm not sure what else I am missing or if anyone can help.

I'm using version 3.1 and Fortigate version 7.4.x

Fortinet Guide hasn't got much info, but Fortinet side is configured.


Based on your description, it seems you've configured the essential components: successful TACACS+ connection, Active Directory integration, and defined Read/Write and Read-Only AD groups. However, to ensure proper role assignment on the FortiGate, verify that the attribute-value pairs sent by Cisco ISE match FortiGate's expected values. Specifically, check that the TACACS+ service custom attributes in ISE correspond to the appropriate admin profiles on the FortiGate. If these attributes are misconfigured or missing, FortiGate may not assign the correct permissions.