Hello everyone,
I recently discovered that the FortiAuthenticator supports a proxy authentication mode for remote RADIUS servers:
FortiAuthenticator Documentation
However, the FortiGate does not seem to offer a similar option:
If you want to set up remote Dial-Up IPsec VPN tunnels using EAP-TLS authentication via Microsoft NPS (RADIUS), it seems you would need to purchase a FortiAuthenticator solely to forward the requests to the remote RADIUS server.
Will FortiGate ever introduce a proxy mode for authentication via remote RADIUS servers?
Solved! Go to Solution.
The FortiGate is simply instructed to:
EAP methods are not configured on the FortiGate, this is negotiated between the supplicant (endpoint) and the EAP server through the "EAP tunnel". The correct place to enforce acceptable EAP methods is thus on the EAP/RADIUS server.
Btw, AFAIK FortiClient does not support EAP-TLS. When configured to send a user certificate, cert-based auth is performed (non-EAP).
As for documentation, you can use this as a starting point:
I haven't tested it personally, so I cannot vouch for it to be 100% correct, but it sufficiently demonstrates how the config should look. Notice how there's no step where you configure which EAP method is to be used in the FGT's config.
can you check if this helps you out:-
The question was whether the FortiGate will ever get the proxy mode or if it will remain a feature exclusive to the FortiAuthenticator. Because buying a FortiAuthenticator solely to forward the requests to the remote RADIUS server would be ridiculous.
Why do you want to do this? Why not use SAML? Why not just forward those RADIUS requests directly to another RADIUS server?
The FortiGate currently supports forwarding only MS-CHAPv2, MS-CHAP, CHAP, or PAP requests—not EAP-TLS. Unlike the FortiAuthenticator with proxy mode, the FortiGate cannot directly forward authentication requests to a remote RADIUS server, only the supported authentication protocols. Currently, I only want to set up EAP-TLS authentication for remote dial-up VPN clients, not many (at most 10).
Can EAP-TLS be terminated directly on the firewall though? Is there a need for RADIUS here at all? Can you just authenticate based on TLS trust alone? Sorry I'm not too familiar with the setup for dial-up VPN. Are you talking for FortiClient remote users or firewall to firewall VPN?
Let me clarify the problem:
The issue occurs at this step: the FortiGate fails because it only supports MS-CHAPv2, MS-CHAP, CHAP, or PAP—not EAP-TLS.
This is specifically an IKEv2 IPsec VPN, not an SSL VPN. Simplified, the authentication happens in Phase 1, a tunnel is established, and sessions are created in Phase 2. Various authentication protocols can be used in this process, but the FortiGate doesn’t support EAP-TLS for remote RADIUS server users.
If the FortiGate had a proxy mode like the FortiAuthenticator, it could handle EAP-TLS requests.
FortiGate has no limitation as to which RADIUS server can be used to process EAP authentication for it.
Direct integration with NPS works just fine. FortiAuthenticator is not required for this.
What you see in the RADIUS server settings (auto|PAP|CHAP|MS-CHAP|MS-CHAPv2) is configuration relevant purely for non-EAP authentication.
EAP authentication is used automatically in a feature if that feature supports it and is configured to use it. (802.1x switch auth, WPA-Enterprise on Wifi, EAP auth for IKEv2 IPsec)
But be aware that if you want to do 2FA (username + password + OTP) over EAP, you will likely have issues with third-party servers. There's no established standard for it, so it's bit of a wild west. (FCT+FGT+FAC do it in a custom fashion over modified EAP-MS-CHAPv2, if that interests you).
Created on 12-03-2024 06:24 AM Edited on 12-03-2024 06:27 AM
Is there a knowledgebase article about this scenario? Because I don't see how you could configure such a IPsec Tunnel on the FortiGate. Because the only way would be with signatures. Having to build 10 different tunnels for each user and his certificate.
Scenario:
FortiClient <VPN with EAP-TLS Authentication> FortiGate <User Authentication> Remote-RADIUS-Server
The FortiGate is simply instructed to:
EAP methods are not configured on the FortiGate, this is negotiated between the supplicant (endpoint) and the EAP server through the "EAP tunnel". The correct place to enforce acceptable EAP methods is thus on the EAP/RADIUS server.
Btw, AFAIK FortiClient does not support EAP-TLS. When configured to send a user certificate, cert-based auth is performed (non-EAP).
As for documentation, you can use this as a starting point:
I haven't tested it personally, so I cannot vouch for it to be 100% correct, but it sufficiently demonstrates how the config should look. Notice how there's no step where you configure which EAP method is to be used in the FGT's config.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.