Hi to all,
I noticed that on a L7 Radius Application profile one can switch on "Dynamic Auth" option a configure a destination port for COA.
I am wondering if such a configuration option could be useful to handle COA "back requests " from a node of the radius pool towards a radius client. Suppose that a on the network switch or a wireless controller the ip address of the Radius VIP is both configured as AAA server and COA authorized ip address. I was wondering whether the "Dynamic Auth" switch purpose was to apply source nat to COA requests coming from any of the radius servers in the pool . On our current F5 bigip LTM I use a forwarding virtual ip address listening on the COA port to source nat COA requests from the radius servers so that Radius Clinet receives COA packests having the radius VIP as source address.
BR
MM
Hello,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
Hello,
We are still looking for someone to help you.
We will come back to you ASAP.
Thanks,
Hello Marco,
To configure an L7 RADIUS application profile with Change of Authorization (CoA) on FortiADC, follow these steps:
Client Address and Source Port:
Timeout RADIUS Session:
Dynamic Authorization (CoA):
Dynamic Auth Port:
Geo IP Blocklist and Allowlist:
Ensure that the predefined RADIUS profile LB_PROF_RADIUS is configured according to your requirements, with the default settings as mentioned above.
| User | Count |
|---|---|
| 2736 | |
| 1418 | |
| 812 | |
| 739 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.