Created on
08-22-2022
01:40 PM
Edited on
05-06-2025
12:45 AM
By
Jean-Philippe_P
Description |
This article describes some common local Radius failures in FortiNAC and provides accompanying debug logs and examples.
To enable debugging and view logs via the GUI (versions 9.2 and greater), refer to 'Debug & Troubleshooting' in the Administration UI as per Troubleshooting Tip: FortiNAC Local Radius Debug and Troubleshooting via GUI..
To enable debugging and view logs via the CLI:
tail -F /var/log/radius/radius.log
|
Scope | FortiNAC v8.8.x, v9.1.x, v9.2.x, v9.4.x. |
Solution |
Issue 1: Port already in use.
Associated logs that indicate this:
Tue Aug 22 13:06:56 2022 : Error: Failed binding to auth address * port 1812: Address already in use
Cause: The local RADIUS service and proxy RADIUS use the same listening port. This will cause a conflict and therefore cause the local radius service to fail to start up.
Solution: Change the listening port for either the local radius or the proxy radius. For example local radius port 1812, proxy radius port 1645. To use this port for local RADIUS, perform the following steps:
Remember to align the NAS device to send RADIUS traffic to the appropriately designated port.
Issue 2: No mutually acceptable types found. Associated logs that indicate this:
Tue Aug 22 13:06:56 2022 : Auth: (414) Login incorrect (eap: No mutually acceptable types found): [host/edvin.fortinet.lab] (from client 10.x.x.c port 574 cli xx-xx-xx-xx-xx-xx)
Cause: EAP type mismatch between the client and the FortiNAC acting as a radius server.
EAP types have not been checked in the RADIUS configuration. The user can enable all of them, so one can accommodate each type of EAP request coming from different clients, which will avoid causing any compatibility problems.
Figure 1. Radius Configuration tab.
Figure 2. Local Radius configuration.
Issue 3: RADIUS requests are rejected or ignored by the NAS client.
Associated RADIUS logs that indicate this (here, one for each commonly used RADIUS port):
Error: Ignoring request to auth address * port 1645 from unknown client 192.168.48.8 port 4848 proto udp
Cause:
Solution:
FortiNAC-F:
execute enter-shell device -ip X.X.X.X <- Replace with the affected IP.
FortiNAC v9.2/v9.4 (CentOS):
device -ip X.X.X.X
Issue 4: RADIUS Reject events due to Timeout messages.
This could happen in scenarios where RADIUS 802.1x EAP-TLS with Computer certificates is being used for authentication.
Event logs will show the following:
Output RADIUS logs messages:
Fri Jan 26 10:46:25 2024 : Debug: literal --> FNAC Communication Timeout
The output.master shows the following exceptions related to LDAP communication issues:
yams SEVERE :: 2024-01-26 12:28:47:129 :: #948 :: javax.naming.CommunicationException: X.X.X.X:636 [Root exception is java.net.SocketTimeoutException: connect timed out]
Here is how to get to the output.master logs (and others):
FortiNAC in scenarios with host authentication will perform lookups on the LDAP server related to TLS attributes it receives from Radius Access Requests.
Solution: Validate network communication between FortiNAC and LDAP. Remove the secondary LDAP server configuration in FortiNAC or try re-implementing the LDAP integration.
Related documents: Configure Local RADIUS Server settings - FortiNAC administration guide. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.