We currently utilize the Local RADIUS server on FortiNAC-F to perform EAP-PEAP. It works well. However, I'd like to transition to EAP-TLS but can't really wrap my head around what needs to be done to make that happen.
We have a 3rd-party cert from Sectigo uploaded to FortiNAC-F for Local RADIUS Server (RadSec) and Local RADIUS Server (EAP) [radius]. What else is needed?
Hi,
Have you tried configuring TLS under the supported EAP type already? Also, make sure the client cert attribute is configured correctly.
Thanks,
A PKI infrastructure must be in place to issue and manage certificates, which are then distributed to each endpoint. Typically, Microsoft Certificate Authority (CA) is used for this purpose. Some details are also shown in this configuration guide: https://docs.fortinet.com/document/fortinac-f/7.6.0/machine-authentication/730802/tls-certificate
As far as I remember the public certificate will not work with RADIUS. A private cert is required, right?
The RADIUS/EAP server certificate is usually signed by a private CA, but it can also be signed by a public one. However, client certificates (EAP-TLS) are rarely signed by public CAs because they are mainly used inside an organization and it's easier to manage them with your own internal CA.
Hi Emirjon
I see the doc you shared is new and I guess it was expected by many NAC admins.
User | Count |
---|---|
2636 | |
1400 | |
810 | |
677 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.