| Description |
This article describes the FortiAuthenticator radius error, Ignoring requests,and unknown client,s and how to resolve it. When a new RADIUS client is configured on FortiAuthenticator, and there is no response to the access-request, the radius authentication debug logs should provide insights into why the access-request was not responded to or was ignored. |
| Scope | FortiAuthenticator v6.X. |
| Solution |
It is assumed there are no connectivity issues and that the access-requests are successfully reaching FortiAuthenticator:
exe tcpdump -i port1 port 1812
This event is logged when the source IP address of a request does not match the client IP address configured on FortiAuthenticator:
2025-01-08T12:04:45.655081+01:00 fortiauth radiusd[3255]: Ignoring request to auth address * port 1812 bound to server default from unknown client 10.191.19.149 port 4825 proto udp
This can occur if the client IP configured on FortiAuthenticator is incorrect and does not match the actual source IP of the request, if there is NATing in between, or if a specific source IP is configured:
config user radius
Ensure that the RADIUS client IP configured on FortiAuthenticator is correct. In this example, the actual source IP of the request is 10.191.19.149, not 10.191.19.150 as configured on FortiAuthenticator. If a certain source IP needs to be used, 'set source-ip', and make sure the correct one is set on both sides, client and FortiAuthenticator. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.