FortiManager
FortiManager supports network operations use cases for centralized management, best practices compliance, and workflow automation to provide better protection against breaches.
tnesh
Staff
Staff
Article Id 368050
Description This article describes how to configure Radius over TLS (RADSEC) using FortiAuthenticator as Radius server.
Scope FortiManager/FortiAnalyzer v7.4.6, v7.6.2 and above.
Solution

FortiAuthenticator:

  • Make sure FortiAuthenticator has enabled RADSEC:
    FortiAuthenticator -> System -> Network -> Interfaces -> Enable RADSEC.

 

fac-enable-radsec.png

 

  • Make sure RADSEC certificate -> CN has FortiAuthenticator FQDN:
    • 'radius_cert_fqdn' will be used as the RADSEC server certificate in this example.
    • FortiAuthenticator FQDN: lfac.fortilab.com.

 

radsec-cert-fqdn.png

 

  • Export the CA certificate that is used to sign the RADSEC certificate.

'lfac_root_ca' (FortiAuthenticator Local CA) is used to sign the 'radius_cert_fqdn' certificate.

 

export-ca-cert.gif

 

  • Create new Radius Clients:
    FortiAuthenticator -> Authentication -> RADIUS Service -> Clients -> Create New.

 

fac-client.png

 

  • Create new Radius Policies:
    FortiAuthenticator -> Authentication -> RADIUS Service -> Policies -> Create New.

 

fac-policies.png

 

  • Select RADSEC Server certificate:
    FortiAuthenticator -> Authentication -> RADIUS Service -> Certificates -> Select the correct certificate.

 

fac-certificate.png

 

  • RADSEC port:
    FortiAuthenticator -> Authentication -> RADIUS Service -> Services -> Capture/edit RADSEC port.

 

fac-radsec-port.png

 

  • Allow RADIUS authentication for FortiAuthenticator users:
    FortiAuthenticator -> Authentication -> User Management.

fac-user-allow-radius.png

 

FortiManager:

  • Import RADSEC server certificate:
    FortiManager -> System Settings -> Certificates -> Import -> CA Certificate.

 

fmg-import-ca-cert.gif

 

  • Create and configure Radius remote authentication server:
    FortiManager -> System Settings -> Remote Authentication server -> Create New -> Radius Server.

Server Name/IP

<Radius server FQDN>

Port

2083 (radsec default port)

Server Secret

<radius secret>

Authentication Type

<radius authentication method>

ca-cert

<radsec server certificate>

protocol

tls

 

fmg-radius-server-settings.png

 

  • Create Administrator with RADIUS type:

Wildcard users will be used as an example:
FortiManager -> System Settings -> Administrators -> Create New.

 

fmg-administrator-radius.png

 

Test Scenario:

Go to FortiManager/FortiAnalyzer GUI and log in with the Radius user.

 

Troubleshooting guide:

  • Enable debugging and look for any error message from the debug output:

 

diagnose debug application auth 255

diagnose debug timestamp enable

diagnose debug enable

 

  • Once debug is enabled, log in with the Radius user and verify the debug output log.

Sample output:

 

FMG # diag debug application auth 255
FMG # diag debug timestamp enable
FMG # diag debug enable
2025-01-03 11:26:46 s81: auth request: user=rad-rw from=GUI(10.10.0.21)
2025-01-03 11:26:46 s81: wildcard admin: radius-rw
2025-01-03 11:26:46 s81: start radius: lfac-radius
2025-01-03 11:26:46 s81:lfac-radius: connecting to server 0: lfac.fortilab.com ip=10.10.10.10 port=2083/tcp
2025-01-03 11:26:46 s81:lfac-radius: send request: type=pap id=26
2025-01-03 11:26:46 s81:lfac-radius: TLSv1.3 connected using TLS_AES_256_GCM_SHA384
2025-01-03 11:26:46 s81:lfac-radius: got reply: code=accept(2) id=26
2025-01-03 11:26:46 s81:lfac-radius: Ftnt-Group: write
2025-01-03 11:26:46 s81:lfac-radius: success
2025-01-03 11:26:46 s81: wildcard admin matched: radius-rw
2025-01-03 11:26:46 s81: auth result: success

 

  • To disable debug output:

diagnose debug reset
diagnose debug disable