Description | This article describes the utility of the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) deployment in wireless users where the RADIUS server will be reachable over an IPsec VPN, and troubleshooting the delay on the response from the RADIUS server. |
Scope | FortiGate, FortiAP. |
Topology:
The remote wireless user using EAP-TLS against a Radius-server remotely. IPsec VPN in between.
Debug on FortiGate B: to see the authentication process, debug for the remote station mac aa:bb:cc:e6:c2:c9:
diagnose wireless-controller wlac sta_filter clear diagnose wireless-controller wlac sta_filter
It can be observed that the client associates with the FortiAP successfully, then starts its authentication process. After a few minutes, RADIUS stops responding when an Access-Accept or Access-Reject message should be received.
In this example, the RADIUS team performed a capture on the team's side and checked the configurations again, but no issue was found.
A sniffer was performed on FortiGate B to discard RADIUS message interchange issues. Several 'Malformed packets' were observed on the RADIUS communication.
Troubleshoot performed on FortiGate B:
config system global set remoteauthtimeout 60 end
config firewall policy edit ID <- ID of rule. tcp-mss-sender 1400 set auto-asic-offload disable set np-acceleration disable end
Clear old sessions to force the new sessions to take policy modifications:
diag sys session filter policy ID
After these modifications, 'Malformed Packets: Radius' disappeared:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.