FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
mkhabbazi
Staff
Staff
Article Id 196165

Description

 

This article provides a possible solution where users are not  able to login to the FortiGate through TACACS+   
 
Scope
 
FortiGate.


Solution

 

In this example, the  TACACS+ server that responds is 192.168.1.5.  However, the problem here is that it responds too slowly with the round trip time at around 600 ms (more than 500 ms):
 
FGT # exe ping 192.168.1.5
PING 192.168.1.5 (192.168.1.5): 56 data bytes
64 bytes from 192.168.1.5: icmp_seq=0 ttl=123 time=575.2 ms
64 bytes from 192.168.1.5: icmp_seq=1 ttl=123 time=576.8 ms
64 bytes from 192.168.1.5: icmp_seq=2 ttl=123 time=581.3 ms

--- 192.168.1.5 ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max = 575.2/577.7/581.3 ms

The connection timeout is 500 ms. If the server does not make it, it is considered unreachable.

There is a parameter that can be used to adjust this timeout.  It is called 'ldapconntimeout' but it also applies to TACACS+. 
 
The following commands can be used to increase the timeout to 2 seconds:
 
conf sys global
    set ldapconntimeout 2000
end 
 

Related articles: 

Technical Tip : How to configure TACACS+ authentication and authorization in FortiGate

Technical Tip: Access using TACACS+ authentication with admin profile and group matching