Currently, I manage small pools of locally configured building engineer accounts on several remote sites (all fortigate) that hub&spoke topology back to our main site. They use forticlient to connect to their local FG network to manage what they need to manage. My boss wants us to move this authentication from me managing local accounts to them authenticating with their AD credentials to our radius server back at the main site. Currently, when clients connect with FC to our main site they use radius auth (MS NPS).
I've configured radius authentication on one of the remote FGs
edit "RADIUS-01"
set server "x.x.x.x" (server IP)
set secret ENC 32HGInwGoQ0aUnuzGS6FrcSgyB8on8I1Ugyfwm/SeNjKfLNQSbePRS29upRikZo3m34eh3qW5o3E8085RlmzYMu45eCCw9KADJoEdvQkpn5iX2sQS8PKze9rOiKPJ5z6RDR61o7Q9WzC7kxKH9CeOwhxTOj3sWwH0kl/JM/hJnoxPF4gHZD0J5TMOX7ZJVQ9IcF/rA==
set timeout 30
set auth-type pap
set source-ip "x.x.x.x" (local interface gw of subnet allowed to talk across the tunnel)
set interface-select-method specify
set interface "CORP" (tunnel interface back to main site)
I've tested ping and traceroute sourcing from the local interface and get positive responses so the traffic is allowed across the tunnel from that interface, but I am still getting "Can't contact RADIUS server"
Looking for any guidance.
Hi @bock_samson ,
It looks like the remote Radius server is not responding to these requests.
You can take a packet capture on the NPS server and see if you receive the Access-Request and what happens with it.
I took the pcaps and tracked the traffic through both firewalls to the NPS server to waiting to hear back from the server admin on what he finds
"set source-ip" is typically enough when dealing with IPsec tunnels without IPs (which I assume is the problem you're trying to solve with this).
Standard troubleshooting should give you some hints: Do debug flow and packet sniffer on the remote FGT. If it looks good, do the same on the next-hop, etc. up until you hit the NPS server, where you can check packets with Wireshark, or NPS logs with Event Viewer.
Is the FortiGate defined as a client on the RADIUS server, also ports UDP/1812 - UDP/1813 are allowed ?
Usually that would be the main reason that it says that i cant contact it if you have L3 connectivity.
they should be but I have the server admin checking the server
I think there is a misunderstanding hiere:
- FortiClient does not communicate with the radius. It just does xauth with the FGT. If the user is a radius user or member of a radius user group that is in the VPNs xauth section the FGt will communicate with the radius. So the the source ip in the radius settings should be the ip the Fortigate uses to talk to it.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1741 | |
1109 | |
755 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.