We have the below assets:
We are trying to setup the Corporate WiFi Access with FortiNAC, using a certificate.
Flow:
Users must Connect to an SSID with WPA2 Enterprise and FortiNAC confirms a user as corporate with certificate checking.
We did all the steps we know and when a test pc try to connect in the Corporate SSID, we take the FortiNAC-RADIUS error below:
What is the issue resolving path?
Bests,
PK
Solved! Go to Solution.
Hi!
We test version 7.2.9 and FortiNAC service is working fine.
Thanks for your replies!
P.S.: I believe Fortinet should have create an analytical Installation Guide with basic use-cases examples.
Bests,
Kindly share the firmware version of FortiNAC.
7.4.1.0451
The issue may be related to fix 1129743 which is going to be included in the next release of 7.4.2 (published next week) and is already included in the latest version of 7.6.3, some details are included in the release notes.
We proceed with firmware upgrade.
Bests,
We took error "RADIUS not running" after upgrade.
Bests,
You need to check the logs for 'Service Status' and 'Systemd Journal' to have more information:
Full Journal Excerpt...]
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Post-Auth-Type REJECT for attr Post-Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Post-Auth-Type Challenge for attr Post-Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Auth-Type REST for attr Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Auth-Type MSCHAP for attr Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Post-Auth-Type REST for attr Post-Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Post-Auth-Type REJECT for attr Post-Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Auth-Type REST for attr Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Post-Proxy-Type Reject for attr Post-Proxy-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Post-Auth-Type REJECT for attr Post-Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: Compiling Post-Auth-Type Challenge for attr Post-Auth-Type
Jul 24 13:14:25 fortinac radiusd[16976]: radiusd: #### Skipping IP addresses and Ports ####
Jul 24 13:14:25 fortinac radiusd[16976]: Unable to check file "/etc/raddb/certs/ca_radsec.pem": No such file or directory
Jul 24 13:14:25 fortinac radiusd[16976]: /etc/raddb/radiusd.conf[439]: Failed parsing configuration item "ca_file"
Jul 24 13:14:25 fortinac systemd[1]: radiusd.service: Control process exited, code=exited, status=1/FAILURE
[0;38;5;245m-- [0;32mAn ExecStartPre= process belonging to unit radiusd.service has exited.
Jul 24 13:14:25 fortinac-gr-01 systemd[1]: radiusd.service: Failed with result 'exit-code'.
[0;38;5;245m-- [0;32mThe unit radiusd.service has entered the 'failed' state with result 'exit-code'.
[0;38;5;245m-- [0;32mSubject: A start job for unit radiusd.service has failed
[0;38;5;245m-- [0;32mA start job for unit radiusd.service has finished with a failure.
Jul 24 13:14:25 fortinac systemd[1]: Started /bin/journalctl -xe -n 100 --no-pager -u radiusd.service.
[End Full Journal Excerpt]
It appears as a problem with the certificates. Kindly check the certificates in System> Certificate Management for 'Local RADIUS Server (RadSec)' and 'Local RADIUS Server (EAP) [radius]'.
If 'RADIUS over TLS (RadSec)' is enabled try to temporarily disable it and start the service again.
Hi!
We test version 7.2.9 and FortiNAC service is working fine.
Thanks for your replies!
P.S.: I believe Fortinet should have create an analytical Installation Guide with basic use-cases examples.
Bests,
User | Count |
---|---|
2571 | |
1364 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.