Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
j0ma
New Contributor II

FAC - Duplicate entries for RADIUS Client

I have a, maybe silly question but maybe someone can answer me..

 

We have FAC setup with RADIUS clients in a 10.10.0.0/16 subnet, mainly used towards switches for MAB.

 

The thing is we want to configure VPN for a firewall with an IP in the same subnet. Is it possible to configure this as a /32 without it being affected in the /16 subnet policy?

- JoMa
- JoMa
2 Solutions
j0ma
New Contributor II

I solved this by alternating shared secrets.

 

But I did not get an answer on my question regarding matched Radius attribute. Is it a limitation to match on exact string/integer or is it possible to use regexp (or similiar)?

- JoMa

View solution in original post

- JoMa
Markus_M
Staff & Editor
Staff & Editor

You can only match to a substring with the given option if present ("Allow substring match").

Regex or wildcards are not possible.

- Markus

View solution in original post

8 REPLIES 8
Anthony_E
Community Manager
Community Manager

Hello,


Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.


Thanks,

Anthony-Fortinet Community Team.
Anthony_E
Community Manager
Community Manager

Hi again,

 

I maybe found something:

 

To handle duplicate entries for a RADIUS client in FortiAuthenticator, you can differentiate between policies using specific RADIUS attribute criteria.

  1. Identify Policies: Ensure you have identified all the policies associated with the RADIUS client.
  2. Use RADIUS Attribute Criteria: Utilize specific RADIUS attribute criteria to distinguish between different policies. This can help in directing the authentication requests to the correct policy.
  3. Set Priorities: If applicable, set priorities for the policies to determine which policy should be matched first.
  4. Test Configuration: After configuring, test to ensure that the correct policy is being matched for the intended users.
Anthony-Fortinet Community Team.
j0ma
New Contributor II

Sounds like you are on to something, thanks for your reply.

 

In the Attribute Criteria, I need to find something synonymous for the RADIUS- clients. I wanted to test with nas-identifier. Seems the string needs to match exactly, I could not find begins-with/ends-with or contains. Is this a limitation or could I use for example regular expressions?

- JoMa
- JoMa
ebilcari

I would suggest to follow the long path to avoid any faults, try to divide the super subnet /16 to smaller ones and leave the FGT subnet out of it. The shared secret matching for all the devices may also be an issue.

If that is not doable, you can specify a different IP from the FGT to source its RADIUS requests. If all of the existing IPs of the FGT still fall under the subnet 10.10.0.0/16 you can also create a loopback as long as it's routed to FAC, more details can be found on this section of the guide.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
j0ma
New Contributor II

Thanks for your response. I will look into how much work it will cause since it's in aew production environment.

 

As for my above question regarding matched Radius attributes, is it a limitation to match on exact string/integer or is it possible to use regexp (or similiar)? 

- JoMa
- JoMa
j0ma
New Contributor II

Anyone?

- JoMa
- JoMa
j0ma
New Contributor II

I solved this by alternating shared secrets.

 

But I did not get an answer on my question regarding matched Radius attribute. Is it a limitation to match on exact string/integer or is it possible to use regexp (or similiar)?

- JoMa
- JoMa
Markus_M
Staff & Editor
Staff & Editor

You can only match to a substring with the given option if present ("Allow substring match").

Regex or wildcards are not possible.

- Markus
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors