FortiNAC
NOTE: FortiNAC is now named FortiNAC-F. For post-9.4 articles, see FortiNAC-F. FortiNAC is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.
FortiKoala
Staff
Staff
Article Id 198367
Description
Excessive CLI Logins to Cisco Wireless Controller

Scope
Version: Network Sentry versions prior to 7.0.4
Solution
Version: Network Sentry versions prior to 7.0.4


Issue: L2/L3 polling causing excessive SSH sessions to controller.

CLI credentials were used by default for L2/L3 polling.  The inconsistencies of various device models using this method caused problems.


Workaround:  Change the Cisco Wireless Controller configuration to use SNMP for communication instead of Telnet or SSH.

1.  From the Network Devices -> Topology View, select the Cisco WLC.
2.  Right-click on it and select Properties.
3.  Check the Advanced box and select the Use SNMP to read L2/L3 data from the device setting.
4.  Click the Credentials tab and click Validate Credentials to ensure the SNMP credentials are correct.


Solution:  Version 7.0.4 changed Network Sentry defaults to read ARP entries from Cisco wireless using SNMP credentials.  Any Cisco WLCs modeled in Topology View prior to version 7.0.4 would need to be configured to use SNMP manually.

Contributors