I' m having problem authenticating my SSL-VPN against radius.
 I have a Fortigate 100D, v4.0,build0535,120511 (MR3 Patch 7)
 
 I have a radius server called " duosec"  with primary server IP 10.130.1.2 and key " xxxxxxxx"  (the key is 8 chars)
 Authentication scheme on " use Default.." , but have tried all
 
 VPN login does not work. 
 
 In the log I see the following
 Action: ssl-login-fail
 Reason: no_matching_policy
 
 The strange thing is when I run diag from CLI.
 
 
 diag test authserver radius-direct 10.130.1.2 -1 xxxxxxxx lohelle password
 Result:  0: OK
 
 As you see this is working.
 
 But when I try this:
 diag test authserver radius duosec pap lohelle password (also tried chap, mschap and mschap2)
 Result: authenticate ' lohelle'  against ' pap'  failed, assigned_rad_session_id=48824321 session_timeout=0 secs!
 
 Is this a bug? I do not understand why radius-direct works, but not " radius definedserver"