Description | This article describes how to set up FortiEdge Cloud with Radius authentication using Windows NPS (AD authentication). |
Scope |
|
Solution |
Below are the steps to follow to configure FortiEdge Cloud and Windows NPS for Radius authentication.
Note: If FortiEdge manages multiple APs, configure the AP subnet (for example 192.168.2.0/24) as the Radius client.
Select 'My Radius Server' -> Add Radius Server and enter server details. The primary server name/IP will be the NPS and the secret will be the same as the Radius client.
Reference: RADIUS Server.
If testing the Radius server from FortiEdge, it will fail because the Radius client is FortiAP. To review packet flow, SSH to AP and run the below command:
tcpdump -i br0 'port 1812' <---------- Or configured Radius port.
Related articles: Technical Tip: Configuring FortiGate and Microsoft NPS (Radius with AD authentication) Technical Tip: Microsoft NPS as RADIUS client for active-directory authentication |