I'm running a FortiAuthenticator RADIUS (v_6.6.2) with Trusted CA policy, with the trusted CA being a Windows Server. We have a GPO setup to use either a machine or user cert and confirmed all the settings are consistent with the wireless SSID's auth settings. Clients are taking 60-100secs at times to authenticate.
When viewing the PCAP, the communication is seamless between the FG and FAC, but the client takes several Access-Challenges to finally present its certificate https://19216801.onl/ .
Has anyone else experienced this?
Hello Vincent,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
I have the same issue regardless of FortiAuth, FortiOS, or AP version. Communication is seamless between the windows client and Fortiauth, but on frequent occasions, the client takes several attempts, sometimes 2 or more minutes to finally present the certificate. Windows 11 clients are experience it more than Win10.
Better to open a new topic. For this issue, you'd better check in a packet capture what really is delayed. FortiAuthenticator responding to the client, client responding to the FortiAuthenticator. That'll determine where to look, and where not.
Hi Vincent,
it will be difficult to say more with the given detail.
Network packets seem fine and fast. You experience a delay, so see where the delay occurs.
Important is what the authentication is and then continue with when the delay happens in that method.
Since you have Wi-Fi and Access-Challenges, you would probably refer to some EAP method. As such, you have to find out which. The PCAP will tell you (the EAP type is written in the packet details).
In EAP you'll see certificates sent from FortiAuthenticator to client in the challenges and in EAP-TLS, the client will also return certificate(s) in the Access-Requests.
The delay will then sum-up from what happens in between the packets, such as the client responding slower with Access-Request to the Challenge, or the other way round. If the FortiAuthenticator is slow to respond to the Access-Requests, then check the RADIUS debug logs at https://fac-ip/debug. On the debug menu, enable the details debug mode and reproduce such slow communication alongside with a packet capture. The PCAP will show when the delay happens, which makes it easier to find that in the text-heavy debug log. Check to identify the packets with identifying criterion. The "State" attribute is quite good to identify a Access-Challenge and its single response, Access-Request.
The Access-Challenge as response to the Access-Request will share the same ID. When you found the two packets, see what happens in between on FortiAuthenticator.
Giving a few examples what might go wrong:
Hope this helps for a start.
Best regards,
Markus
User | Count |
---|---|
2559 | |
1356 | |
795 | |
650 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.