Description | This article provides a possible root cause for Radius authentication failure when FortiGate authenticates with the Radius server on behalf of remote Radius users. |
Scope | FortiGate |
Solution |
Problem: When FortiGate is authenticates a Radius server on behalf of remote Radius users, the authentication fails, even though the settings are configured properly and the connection between the FortiGate and the Radius server is reachable.
On RADIUS Server logs, the following can be noticed for why the connection was denied:' Reason Code: 96
On FortiGate, on running the fnbamd debug command:
diagnose debug application fnbamd -1 diagnose debug enable
To stop the debug processes in the end, press 'Ctrl+C' and enter 'diagnose debug disable'.
The following debug errors can be noticed: the connection was denied.
[1898] fnbamd_radius_auth_validate_pkt-RADIUS resp code 3
Solution: After confirming the correct configuration and consuming all possible troubleshooting steps, the problem can be related to the MTU value, and it's fixed by adjusting the MTU value on the Radius NPS server to a value of 1200. After this change, radius authentication should start working.
The following document discusses the issue: MTU for NPS radius and radius client
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.