cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
11983
Views
1
Helpful
3
Replies

Fortigate authorization with ISE

ChrisAnk
Level 1
Level 1

Hi All,

 

I am integrating Fortigate firewall with Cisco ISE (version 2.4, patch 13) using TACACS, authentication is getting successful but authorization fails. Below are the attributes given in TACACS Profile. After logging into the firewall user is not able to view all the VDOMs.

 

Attribute

Requirement

Description

Value

service

Mandatory

Fortinet Service

fortigate

memberof

Mandatory

TACACS+ group

RO_admin_group

admin_prof

Mandatory

ACC Profile

RO_Profile

 

Do I need to make any changes in the attributes given?

3 Replies 3

marce1000
VIP
VIP

 

 - FYI : https://community.cisco.com/t5/network-access-control/fortigate-authorization-with-ise/td-p/3545350

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Tacacs?

craiglebutt
Level 4
Level 4

Hi


Had the same issue with 2.2 only the other week.

Compare this config, alot of it was trial and error, Fortigate said couldn't be done.  But I'm guessing it will be around set vdom "root" "WIN-XP-7" "GENERIC-APP"

Depending on you forti firmware.

 

You will need to put in policys to deny access to other groups as anyone with any level in your tacacs will get full admin.

Let me know if this helps

 

 

CLI Commands for Fortigate Tacacs+ Read & ReadWR
Global
Config system accprofile
edit "Tacacs_RO"
set secfabgrp read
set ftviewgrp read
set authgrp read
set sysgrp read
set netgrp read
set loggrp read
set fwgrp read
set vpngrp read
set utmgrp read
set wifi read
next
end



VDOM Root
config user group
edit "Tacacs"
set group-type firewall
set authtimeout 0
set auth-concurrent-override disable
set http-digest-realm ''
set member "sitise01" "sitise02" "sitise03"
config match
edit 1
set server-name "sitise01"
set group-name "TACACS_NETWORK_ADMIN"
next
edit 2
set server-name "sitise02"
set group-name "TACACS_NETWORK_ADMIN"
next
edit 3
set server-name "sitise03"
set group-name "TACACS_NETWORK_ADMIN"
next
end
next
edit "Radius"
set group-type firewall
set authtimeout 0
set auth-concurrent-override disable
set http-digest-realm ''
set member "sitise03"
config match
edit 1
set server-name "sitise03"
set group-name "TACACS_NEWORK_ACCESS_R"
next
end
next
next
edit "TacacsRO"
set group-type firewall
set authtimeout 0
set auth-concurrent-override disable
set http-digest-realm ''
set member "sitise01" "sitise02" "sitise03"
config match
edit 1
set server-name "sitise01"
set group-name "TACACS_NETWORK_ADMIN_R"
next
edit 2
set server-name "sitise02"
set group-name "TACACS_NETWORK_ADMIN_R"
next
edit 3
set server-name "sitise03"
set group-name "TACACS_NETWORK_ADMIN_R"
next
end
next
end
config system admin TACACS
edit "TACACS"
set remote-auth enable
set accprofile "super_admin"
set vdom "root" "WIN-XP-7" "GENERIC-APP"
set wildcard enable
set remote-group "Tacacs"
edit "TACACSRO"
set remote-auth enable
set accprofile "Radius_Admins"
set vdom "root" "WIN-XP-7" "GENERIC-APP"
set wildcard enable
set remote-group "TacacsRO"
next
end
next
config user tacacs+
edit "siteise01"
set server "your IP"
next
edit "siteise03"
set server "your IP"
set authorization enable
next
edit "siteise02"
set server "your IP"
set authorization enable
next
end