FortiAuthenticator
FortiAuthenticator provides centralized authentication services for the Fortinet Security Fabric including multi-factor authentication, single sign-on services, certificate management, and guest management.
ManpreetSingh
Article Id 360842
Description This article describes a solution to resolve the issue of RADIUS authentication failure, when NTLM v1 is disabled on a Windows Server (LDAP server), RADIUS authentication may fail between FortiGate and FortiAuthenticator and LDAP server.
Scope FortiGate, FortiAuthenticator.
Solution

When NTLM v1 is disabled, and the RADIUS protocol on FortiGate radius settings is set as MSCHAPv2, the authentication will fail because MSCHAPV2 uses NTLM v1. 

 

In the topology below, a FortiClient user connecting to FortiGate and FortiGate is using FortiAuthenticator as a RADIUS server for user authentication and FortiAuthenticator is authenticating the users stored on the LDAP server. 

 

image.png

 

 Following config changes are required on FortiGate:

  • Navigate to User & Authentication -> RADIUS server -> Select the RADIUS Server.
  • Ensure the Authentication Protocol is set to Default.

 

image.png

 

Related document:

VPN connections fail when using MS-CHAPv2