Description | This article describes the utility of the Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) deployment in wireless users, where the RADIUS server will be reachable over an IPsec VPN, and troubleshooting the delay on the response from the RADIUS server. |
Scope | FortiGate, FortiAP. |
Topology: The remote wireless user is using EAP-TLS against a Radius server remotely. IPsec VPN in between.
In this example, FortiGate B is acting as wireless controller for the on-site FortiAP.
With that configuration, the EAPOL connection travels on the CAPWAP data channel (UDP 5247) and terminates on FortiGate B. FortiGate B is encapsulates the EAP messages in RADIUS packets and sends them over the IPsec tunnel. FortiGate A sees this as forward (Data) traffic and processes it according to local routing and firewall policies.
Debug on FortiGate B: to see the authentication process, enable debugs for the remote station mac aa:bb:cc:e6:c2:c9:
diagnose wireless-controller wlac sta_filter clear diagnose wireless-controller wlac sta_filter
It can be observed that the client associates with the FortiAP successfully and then starts its authentication process.
FortiGate B Troubleshooting:
FortiGate A Troubleshooting: In this scenario, FortiGate A's initial role is restricted to accurately passing RADIUS traffic between FortiGate B and the server. This is true even if the wireless client's internet access will ultimately pass through FortiGate A after authentication.
config firewall policy edit <index> tcp-mss-sender 1400 set auto-asic-offload disable next end
diagnose sys session filter policy <index>
diagnose sniffer packet any 'port 1812 or 2083' 6 0 l
For example, a packet sniffer on FortiGate B may show large RADIUS Access-Requests, and the FortiGate A packet sniffer may be missing these packets. This indicates a likely IPsec Tunnel fragmentation issue.
Note: If FortiGate A is acting as a wireless controller for the Remote Site B FortiAP, the troubleshooting process is mirrored- packet sniffers and firewall policies should be checked on FortiGate B to ensure there is no issue with the CAPWAP traffic terminating on the FortiAP and on FortiGate A. FortiGate A troubleshooting should focus on the local EAP and RADIUS messages. In both cases, CAPWAP and ESP fragmentation should be prioritized as possible sources of packet loss. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.