Description
This article describes the variables sent by the FortiGate for customization of server-side NPS policy or RADIUS server.
Scope
FortiGate, FortiAuthenticator.
Solution
SSL VPN RADIUS authentication request to NPS server:
NAS-Identifier(32): FortiGate_48
User-Name(1): fortinet
Vendor-Specific(26) v=Microsoft(311)
Vendor-Specific(26) v=Microsoft(311)
NAS-Port(5): 1
NAS-Port-Type(61): Virtual(5)
Calling-Station-Id(31): 192.168.196.97
Acct-Session-Id(44): 522001f9
Connect-Info(77): vpn-ssl
Vendor-Specific(26) v=Fortinet, Inc.(12356)
SSL VPN RADIUS authentication request to FortiAuthenticator as a RADIUS server:
FortiAuthenticator radiusd[6616]: (1) EAP-Message = 0x02e80007031a06
FortiAuthenticator radiusd[6616]: (1) User-Name = "test.user"
FortiAuthenticator radiusd[6616]: (1) State = 0x1804ed2518ecf474bd315e15fb39e09b
FortiAuthenticator radiusd[6616]: (1) NAS-Identifier = "AHLVPNHA"
FortiAuthenticator radiusd[6616]: (1) Framed-IP-Address = 200.100.100.9
FortiAuthenticator radiusd[6616]: (1) NAS-Port = 2
FortiAuthenticator radiusd[6616]: (1) NAS-Port-Type = Virtual
FortiAuthenticator radiusd[6616]: (1) Calling-Station-Id = "200.100.100.9"
FortiAuthenticator radiusd[6616]: (1) Acct-Session-Id = "000006bf0018e00d"
FortiAuthenticator radiusd[6616]: (1) Connect-Info = "vpn-ssl"
802.11 RADIUS authentication request:
User-Name(1): fortinet
NAS-IP-Address(4): 0.0.0.0
NAS-Identifier(32): 10.156.0.57/5246-RADIUS_WiFi
Called-Station-Id(30): 12-09-0F-76-26-18:RADIUS_WiFi
NAS-Port-Type(61): Wireless-802.11(19)
NAS-Port(5): 0
Calling-Station-Id(31): 90-E7-C4-32-D3-D6
Connect-Info(77): CONNECT 0Mbps 802.11b
Acct-Session-Id(44): 5790EF44-00000CBC
Framed-MTU(12): 1400
EAP-Message(79) Last Segment[1]
State(24): 5e8407b40000013700011700fe8000000000000070bea14d...
Message-Authenticator(80): 7e1c5fba1b251ca7dcd9800f5d109eb7
Therefore, when configuring an NPS server or RADIUS server to accept connections from the FortiGate, the following attributes can be used to restrict access:
Calling Station ID.
User Name.
NAS Identifier.
NAS IPv4 Address.
NAS IPv6 Address.
NAS Port Type.
Connect-Info.
To find out the values sent to the server, run a sniffer on RADIUS port 1812 in FortiGate. For example:
diagnose sniffer packet any 'port 1812' 6 0 a
Alternatively, a capture may be taken under Network > Diagnostics on the FortiGate or on the RADIUS server.
To troubleshoot rejected connections by a Windows server, check the event log under 'Network Policy and Access Services'.
For troubleshooting rejected connections on a FortiAuthenticator, review the RADIUS logs from https://<Fortiauthenticator ip or fqdn>/debug -> Radius -> Authentication.