We have problem connecting to FortiAuthenticator (EAP-PEAP) using Active Directory.
All setting is done, status connection to AD is joined and we can Syncronization the user from AD.
But, when we try to join using Access point using MSCHAP v2, the login success and the certificate can see but after login, the dialog is back to login again.
If we tested to login using application 3rd party "ntradping" using the same user and the respons is success / accept
Log information is Remote LDAP user authentication(mschap) with no token failed: invalid password.
In the debug the information is :
facauth: Remote ldap user 'misniru': NULL password is not allowed
When we try to login using user local from FortiAuthenticator is running well. the problem is using Remote user Active Directory.
If anybody here have a experience with this issue please help me.
For the information, we using Mikrotik and TP-LINK as a Access Point
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi Heri,
There is a solution, but it needs to be found.
When you login and the login is successful according to the logs, then why the SSID is asking again for a login?
From what it looks like, the Mikrotik is sending multiple access-requests via RADIUS, should get one answered and apparently gets another of the duplicated answered.
Authentication is usually serial, going one by one. Clients asks to somewhere, response comes back. No magic:
1) Windows asks the AP
2) AP asks to FAC
3) FortiAuthenticator asks to LDAP
4) LDAP sends OK
5) FAC sends OK
6) AP sends OK
7) client receives OK.
Your flow seems distorted such that the AP may not understand the OK or the Mikrotik is asking multiple times for an unknown reason.
2022-10-24T07:34:47.930204+07:00 FACMHP radiusd[1181]: (169) Ignoring duplicate packet from client Mikrotik port 56131 - ID: 181 due to unfinished request in component authenticate module eap_peap
2022-10-24T07:34:48.239477+07:00 FACMHP radiusd[1181]: (169) Ignoring duplicate packet from client Mikrotik port 56131 - ID: 181 due to unfinished request in component authenticate module eap_peap
The time it takes for FAC to authenticate the user, makes it looks like the LDAP server is taking 3 seconds to respond.
Or your FortiAuthenticator is incredibly slow:
2022-10-24T07:34:47.657902+07:00 FACMHP radiusd[1181]: (169) facauth: LDAP user found: misniru
2022-10-24T07:34:50.006677+07:00 FACMHP radiusd[1181]: (169) facauth: Remote Windows AD user authenticated
So check either of these:
- is FAC maybe out of RAM/CPU
- is your LDAP server slow
- why Mikrotik is making multiple duplicate requests
Best regards,
Markus
Dear Markus
Thank you for your suggestion.
The Problems is:
1. The user from AC is not set to "Disable change password" (After check, there is no "Null Password again"
2. The Mikrotik send multiple request (When I try using other product, then we can login to FortiAuthenticator)
Thank you for your help.
Best Regards,
Heri
Hello heriherwanto,
Thanks for posting on the Fortinet Community Forum!
I found this document that can help you:
Can you tell me if it helped you or if you still have the same error following this guide?
Kindest regards,
Dear All
Thank you for your solution, I have follow all instruction on the
but, we still cannot connect using remote AD.
Here is the debug result :
Please let me know, if there are still missing steps
Regards,
Heri
Dear all
Here is the video login using mschap-2
https://www.dropbox.com/s/2ye2uf3jo6bu1mk/TES%20PEAP%20FORTIAUTH.mp4?dl=0
Regards,
Heri
Hi Heri,
the video cannot be viewed without login.
From the debugs:
2022-10-24T07:34:50.022121+07:00 FACMHP radiusd[1181]: (169) facauth: Updated auth log 'misniru': Windows AD user authentication(mschap) with no token successful
It looks good but I don't know this is the same flow as in the beginning. The timestamps divert a bit more (3seconds) that it would be normal.
Best regards,
Markus
Hi Markus
The video to show, when we success login, then back to login form again.
in the log, yes success. but always back to login dialog again.
Is there any solution
Best Regards,
Heri
Hi Heri,
There is a solution, but it needs to be found.
When you login and the login is successful according to the logs, then why the SSID is asking again for a login?
From what it looks like, the Mikrotik is sending multiple access-requests via RADIUS, should get one answered and apparently gets another of the duplicated answered.
Authentication is usually serial, going one by one. Clients asks to somewhere, response comes back. No magic:
1) Windows asks the AP
2) AP asks to FAC
3) FortiAuthenticator asks to LDAP
4) LDAP sends OK
5) FAC sends OK
6) AP sends OK
7) client receives OK.
Your flow seems distorted such that the AP may not understand the OK or the Mikrotik is asking multiple times for an unknown reason.
2022-10-24T07:34:47.930204+07:00 FACMHP radiusd[1181]: (169) Ignoring duplicate packet from client Mikrotik port 56131 - ID: 181 due to unfinished request in component authenticate module eap_peap
2022-10-24T07:34:48.239477+07:00 FACMHP radiusd[1181]: (169) Ignoring duplicate packet from client Mikrotik port 56131 - ID: 181 due to unfinished request in component authenticate module eap_peap
The time it takes for FAC to authenticate the user, makes it looks like the LDAP server is taking 3 seconds to respond.
Or your FortiAuthenticator is incredibly slow:
2022-10-24T07:34:47.657902+07:00 FACMHP radiusd[1181]: (169) facauth: LDAP user found: misniru
2022-10-24T07:34:50.006677+07:00 FACMHP radiusd[1181]: (169) facauth: Remote Windows AD user authenticated
So check either of these:
- is FAC maybe out of RAM/CPU
- is your LDAP server slow
- why Mikrotik is making multiple duplicate requests
Best regards,
Markus
Dear Markus
Thank you for your suggestion.
The Problems is:
1. The user from AC is not set to "Disable change password" (After check, there is no "Null Password again"
2. The Mikrotik send multiple request (When I try using other product, then we can login to FortiAuthenticator)
Thank you for your help.
Best Regards,
Heri
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1641 | |
1069 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.