Created on
09-07-2023
07:54 AM
Edited on
10-16-2025
01:51 AM
By
Jean-Philippe_P
Description |
This article describes why RADIUS is configured with PAP but IPsec dial-up authentication is still sent using MS-CHAP v2. |
Scope |
FortiGate. |
Solution |
A RADIUS server is configured using PAP as the authentication type:
show config user radius edit "Duo-RADIUS" set server "172.16.2.1" set radius-port 1812 set auth-type pap next end
However, when running fnbamd debug for IPsec VPN, it is possible to see that the authentication type is sent using MS-CHAPv2 instead:
Debug Commands to collect the logs for external authentication:
diagnose debug enable diagnose debug console timestamp enable
To stop this debug type:
diagnose debug application fnbamd 0 diagnose debug reset
[1906] handle_req-Rcvd auth req 963834393 for henry@test.com in FortiClient IPSEC Users opt=00000000 prot=5 This happens because the xauth type under IPsec configuration is set to 'auto'. It is possible to force the device to use PAP with the following commands:
config vpn ipsec phase1-interface edit <Tunnel_name> set xauthtype pap Note: For the GUI, convert the tunnel to 'custom'. The 'Type' section will then be possible to change in the XAUTH tab.
After that, run the fnbamd debug again. Upon trying to authenticate, PAP will be used accordingly:
diagnose debug enable diagnose debug console timestamp enable
To stop this debug type:
diagnose debug application fnbamd 0 diagnose debug reset
[1802] fnbamd_radius_auth_validate_pkt-RADIUS resp code 3 |
This post is very helpful!!
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.