Created on
02-21-2025
02:08 AM
Edited on
03-24-2025
09:26 AM
By
Stephen_G
Description | This article explains how FortiAuthenticator RADIUS attribute criteria in a RADIUS policy can help in matching the right policy. |
Scope | FortiAuthenticator v6.X. |
Solution |
In the below example, FortiGate is used as a Radius client. With the below set of policies:
Without adding RADIUS attribute criteria, all connections are expected to match the first policy since there is no specific condition to leave the first rule and move on to the second one. The RADIUS Attribute matching criterion can be set to match anything in the first Access-Request, so either the debug logs as below (at https:// fac-ip/debug/ ), or a packet capture on RADIUS can show which attributes are sent by the RADIUS client.
By adding a specific RADIUS attribute admin login can be processed on rule 1 and IPsec VPN can be processed on rule 2.
Note: The following debug log output only shows the key elements that are addressed in the provided example, here the Attribute 'Connect-Info' is used to match the policy, but it can be any other of the listed Attributes. NAS-Identifier could be another common case.
RADIUS Debug logs when an admin login connection is made: RADIUS Debug logs when an IPsec connection is made:
FAC radiusd[3229]: (30) Received Access-Request Id 41 from 192.168.48.1:1140 to 192.168.48.38:1812 length 150 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.