Description |
This article describes the RADIUS server authentication failure error in a working configuration where RADIUS server connectivity is successful.
In most of the cases where the existing configurations interrupt or got errors with no changes, or issues with the radius server certificate, it is necessary to check the server certificate from RADIUS. |
Scope | FortiGate 6.X and 7.X. |
Solution |
diagnose test authserver radius <radius server_name> <authentication scheme> <username> <password> authenticate ‘<user>’ against 'pap' failed(no response), assigned_rad_session_id=562149323 session_timeout=0 secs idle_timeout=0 secs! <- This output indicates the server is unresponsive.
# diagnose debug application fnbamd 255
Output sample:
51:1812) code=1 id=39 len=135 user="<user>" using PAP
2022-10-18 06:15:44 [378] radius_start-Didn't find radius servers (0) 2022-10-18 06:15:44 [2855] handle_auth_timeout_with_retry-retry failed 2022-10-18 6:15:44 [2912] handle_auth_timeout_without_retry-No more retry
diag debug console timestamp enable
Check the general routing information to confirm whether the interface is correct:
Below is pcap output which shows the following: 10.232.98.1 (FortiGate) is requesting access and 10.71.9.251 (radius server) is sending an access-reject(3), which means the issue is from radius sever. 'Access-Reject: If any value of the received Attributes is not acceptable, then the RADIUS server will transmit an Access-Reject packet as a response'.
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.