I' m having problem authenticating my SSL-VPN against radius.
I have a Fortigate 100D, v4.0,build0535,120511 (MR3 Patch 7)
I have a radius server called " duosec" with primary server IP 10.130.1.2 and key " xxxxxxxx" (the key is 8 chars)
Authentication scheme on " use Default.." , but have tried all
VPN login does not work.
In the log I see the following
Action: ssl-login-fail
Reason: no_matching_policy
The strange thing is when I run diag from CLI.
diag test authserver radius-direct 10.130.1.2 -1 xxxxxxxx lohelle password
Result: 0: OK
As you see this is working.
But when I try this:
diag test authserver radius duosec pap lohelle password (also tried chap, mschap and mschap2)
Result: authenticate ' lohelle' against ' pap' failed, assigned_rad_session_id=48824321 session_timeout=0 secs!
Is this a bug? I do not understand why radius-direct works, but not " radius definedserver"