07-22-2020 05:55 AM
Hi ,
I have a customer facing issues with authentication to his fortigate firewalls with the use of Cisco ISE as Radius server.
ISE is integrated with RSA Secure ID and authentication policy works for majority of devices. However there are two new Fortigate firewalls that cannot authenticate against RSA. There are old Fortigates in the network that works completely fine with ISE and RSA on the same policy. Only difference between working and not working Fortigates is that new ones are using dedicated management interface for authentication. Old ACS server deployment that exists in the network works correctly with new firewalls and ISE RSA setup.
Authentication requests are reaching ISE and credentials between ISE and fortigates are correct. However requests are failing.
I do not have screenshot of actual ISE error but it states to check RSA logs for authentication issues.
RSA mentions bad token but correct PIN as on the below. It happens for multiple users.
I believe I seen a similar issue in the past so I do not think this is that uncommon. Has anyone got an idea what can be the problem here?
07-22-2020 08:25 PM
07-23-2020 01:05 AM
Hi
Yes thats correct. ACS + RSA works fine ISE + RSA does not work on these devices. However, ISE + RSA works for other devices in the network so I do not suspect there is something incorrect in the integration or radius policies.
Do you mean timeout on Fortigate authentication or on integration between ISE and RSA ?
Regards,
Grzegorz
07-25-2020 05:55 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide