Hi All,
I am using FortiAuthenticator as a radius server and attempting to utilize it to authenticate for 250 HP Aruba switches. I believe the problem I am having is finding the correct Attribute to use in Fortiauthenticator to send to the HP Aruba switches to allow user the manager or operator privilege. The FortiAuthenticator Debug shows that its sending the info to the HP Aruba switch but the switch logs show invalid user id/password. Has anyone been able to use Fortiauthenticator as RADIUS with HP Aruba switches?
Fortiauthenticator:
Created User Group: Attribute is Aruba-Priv-Admin-user with value 6 and vendor Aruba
Also tried: Attribute is HP-Privilege-Level with value 6 and vendor HP
RADIUS Service > Clients > Correctly configured with the right Group
HP Aruba Switch radius config:
conf t radius-server host xxx.xxx.xxx.xxx key PASSWORD aaa authentication ssh login radius local aaa authentication ssh enable radius local
aaa authentication login privilege-mode (if I remove this command, I can log into the switch successfully with operator privilege but when when I enter command enable, it allows me to use my credentials again to authenticate to manager level. But I need it to authenticate to manager/operator user at first authentication point).
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
this seems to me more like question on Aruba support/web/documentation to figure out which RADIUS attributes they need and what values are expected in those AVPs.
Then set FortiAuthenticator per group or per user with those RADIUS Attributes (bottom of user/group config in 'Authentication / User Management' section).
Then even simple packet capture on FortiAuthenticator should reveal what is requested and what is sent (AVPs) in dialog with those Aruba units.
FortiAuthenticator is in this role nothing more then generic RADIUS server. Nothing Forti* special here.
Tomas Stribrny - NASDAQ:FTNT - Fortinet Inc. - TAC Staff Engineer
AAA, MFA, VoIP and other Fortinet stuff
Thank you for the response and you are correct. I ended up finding the answer in the Aruba forums, link below. I had my managed switch tester configured correctly but needed to find out what attributes the switch needed to receive to authenticate me as manager(full access) or operator(view only). I found that the HP and Aruba switches need to authenticate via value 6 for manager and 7 for operator. On the Fortiauthenticator side the attribute that worked was Vendor: Default > Attribute ID: Service-Type > Value: Administrative-User for 6 and NAS-Prompt-user for 7. With this information I was able to authenticate successfully!! Hope this helps anyone else who had a similar issue as I did.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.