Description | This article describes how to set up FortiEdge Cloud with Radius authentication using Windows NPS (AD authentication). |
Scope |
|
Solution |
Below are the steps to follow to configure FortiEdge Cloud and Windows NPS for Radius authentication.
Note: If FortiEdge manages multiple APs, configure the AP subnet (for example 192.168.2.0/24) as the Radius client.
Select 'My Radius Server' -> Add Radius Server and enter server details. The primary server name/IP will be the NPS and the secret will be the same as the Radius client.
Reference: RADIUS Server.
If testing the Radius server from FortiEdge, it will fail because the Radius client is FortiAP. To review packet flow, SSH to AP and run the below command:
tcpdump -i br0 'port 1812' <---------- Or configured Radius port.
Related articles: Technical Tip: Configuring FortiGate and Microsoft NPS (Radius with AD authentication) Technical Tip: Microsoft NPS as RADIUS client for active-directory authentication |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.