Description | This article describes the utility of the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) deployment in wireless users where the RADIUS server will be reachable over an IPsec VPN, and troubleshooting the delay on the response from the RADIUS server. |
Scope | FortiGate, FortiAP. |
Topology:
The remote wireless user using EAP-TLS against a Radius-server remotely. IPsec VPN in between.
Debug on FortiGate B: to see the authentication process, debug for the remote station mac aa:bb:cc:e6:c2:c9:
diagnose wireless-controller wlac sta_filter clear diagnose wireless-controller wlac sta_filter
It can be observed that the client associates with the FortiAP successfully, and then starts its authentication process. After a few minutes, RADIUS stops responding when an Access-Accept or Access-Reject message should be received.
In this example, the RADIUS team performed a capture on the team's side and checked the configurations again, but no issue was found.
A sniffer was performed on FortiGate B to discard RADIUS message interchange issues. Several 'Malformed packets' were observed on the RADIUS communication.
Troubleshoot performed on FortiGate B:
config system global set remoteauthtimeout 60 end
config firewall policy edit ID <- ID of rule. tcp-mss-sender 1400 set auto-asic-offload disable set np-acceleration disable end
Clear old sessions to force the new sessions to take policy modifications:
diag sys session filter policy ID
After these modifications, 'Malformed Packets: Radius' disappeared:
|