Created on
02-17-2025
11:56 PM
Edited on
06-21-2025
12:24 PM
By
Jean-Philippe_P
Description | This article describes how to configure the FSSO CA Radius accounting setting to receive accounting details from a RADIUS server and use that data to authenticate users on the FSSO CA. |
Scope | FortiGate. |
Solution |
IPSec will be used for this use case, but the same can also be achieved with SSL VPN.
IPSec configuration, IKEv2 with peerid defined:
config vpn ipsec phase1-interface config vpn ipsec phase2-interface
RADIUS configuration (the accounting needs to be configured on the CLI):
config user radius
Group configuration:
config user group
Now the configuration on the RADIUS Server (Windows NPS):
What happens behind the scenes when authentication and accounting processes are initiated?
After the successful authorization and authentication (for that check RADIUS messages here: Technical Tip: Explanation of authentication methods of a radius server setting on a FortiGate), the FortiGate sends an Accounting-Request (Start) to the RADIUS Server (NPS), and RADIUS Server will proxy this Accounting-Request (Start) to the FSSO CA. The FSSO CA will reply with an Accounting-Response to the RADIUS Server, and this reply will go to the FortiGate.
In a diagram, it should be something like this:
A capture on the RADIUS Server will show us the Accounting Messages exchanged between the FortiGate and RADIUS Server and between the RADIUS Server and FSSO CA.
Analyzing the fnbamd output, the Accounting-Request (Start) and Accounting-Response should be like this:
FGT # diagnose debug app fnbamd -1 FGT # diagnose debug enable [1075] fnbamd_cfg_get_radius_acct_list-
After a successful authentication and accounting as user 'normal.user', the FSSO CA 'Logon users list' and firewall auth list displays will display the information from the authenticated users.
FGT # diagnose firewall auth list 192.168.10.1, NORMAL.USER ----- 2 listed, 0 filtered ------
An example of accessing the web server (10.191.35.53 with FQDN intranet.contoso.com) with two different users from two different groups (from IPSec VPN) will be used for testing:
After trying to reach intranet.contoso.com with user 'normal.user', this is the output.
date=2025-05-29 time=15:17:51 eventtime=1748528271058134316 tz="+0100" logid="0000000013" type="traffic" subtype="forward" level="notice" vd="root" srcip=192.168.10.1 srcport=61571 srcintf="FCT-VPN" srcintfrole="undefined" dstip=10.191.35.53 dstport=80 dstintf="port1" dstintfrole="undefined" srccountry="Reserved" dstcountry="Reserved" sessionid=55573 proto=6 action="close" policyid=3 policytype="policy" poluuid="5ff5b85c-3bb8-51f0-af81-64a0ccf80d79" policyname="To_Servers_block" user="NORMAL.USER" authserver="FSSO_CA" dstuser="ADMINISTRATOR" service="HTTP" trandisp="snat" transip=10.191.35.40 transport=61571 appcat="unscanned" duration=40 sentbyte=572 rcvdbyte=36642 sentpkt=14 rcvdpkt=30 vpntype="ipsecvpn" utmaction="block" countweb=1 utmref=65528-14
date=2025-05-29 time=15:26:49 eventtime=1748528808853897976 tz="+0100" logid="0000000020" type="traffic" subtype="forward" level="notice" vd="root" srcip=192.168.10.1 srcport=54542 srcintf="FCT-VPN" srcintfrole="undefined" dstip=10.191.35.53 dstport=80 dstintf="port1" dstintfrole="undefined" srccountry="Reserved" dstcountry="Reserved" sessionid=56516 proto=6 action="accept" policyid=2 policytype="policy" poluuid="c6b1a8ea-3bb7-51f0-94f6-241965f45166" policyname="To_Servers" user="ADVANCED.USER" group="CONTOSO/IPSEC-VPN-ADMIN" authserver="FSSO_CA" dstuser="ADMINISTRATOR" service="HTTP" trandisp="snat" transip=10.191.35.40 transport=54542 appcat="unscanned" duration=125 sentbyte=1181 rcvdbyte=4187 sentpkt=8 rcvdpkt=8 vpntype="ipsecvpn" sentdelta=1181 rcvddelta=4187 durationdelta=125 sentpktdelta=8 rcvdpktdelta=8
Related articles: Technical Tip: Explanation of authentication methods of a radius server setting on a FortiGate |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.