RADIUS Authentication
Using RADIUS authentication, users can use a remote account to log in to FortiExtender. RADIUS authentication uses the default port 1812 and requires configuring a RADIUS server. Once you configure the RADIUS server, apply it to a user group. FortiExtender will refer to the user group to authenticate the remote account.
To configure the FortiExtender to use RADIUS authentication - CLI
-
Configure the FortiExtender to access a RADIUS server.
config user radius edit example_radius set server <IPv4 address>set secret <password> set auth-type auto set timeout 5 set transport-protocol udp set nas-ip <IPv4 address> next end
Parameter
Description
name
Name of the RADIUS server table.
server
Primary RADIUS server IP address.
secret
Pre-shared secret key used to access the primary RADIUS server. Character range is 1-128.
auth-type
Authentication protocols permitted for this RADIUS server. You can select the following options:
-
auto
(default) -
ms_chap_v2
-
ms_chap
-
chap
-
pap
If the authentication type is set to
auto
, FortiExtender uses the following protocols in sequence:PAP → MSCHAP_v2 → CHAP
FortiExtender will only try the next protocol once it receives a RADIUS-reject message
timeout
Time in seconds to retry connecting to the RADIUS server. Default = 5.
transport-protocol
Transport protocol to be used. Default =
udp
.nas-ip
IP address used for the FortiExtender to communicate with the RADIUS server. It is also used as the NAS-IP-Address and Called-Station-ID attributes.
-
-
Apply the RADIUS server table to a user group.
config user group edit group1 set member [RADIUS server name1] [RADIUS server name2] next end
Parameter
Description
name
Name of the FortiExtender user group.
member
Names of users and RADIUS server tables you want to add to the user group. You can apply multiple RADIUS server tables to a user group.
-
Enable remote access on FortiExtender.
config system admin edit remote1 set accprofile super_admin set remote-auth enable set wildcard enable set password ENC * set remote-group group1 set trusthost1 set trusthost2 next end
Parameter
Description
remote-auth
Enable/disable authentication using a remote RADIUS server
wildcard
Enable/disable wildcard RADIUS authentication
remote-group
Enter the FortiExtender user group name you want to use for remote authentication.
Note: If
remote-auth
is enabled,remote-group
becomes mandatory. Otherwiseremote-group
is hidden.If
remote-auth
is enabled butwildcard
is disabled, you must set a localpassword
. If the RADIUS server is unreachable, FortiExtender uses the local password. For other situations, such as if FortiExtender receives a RADIUS reject message, the local password is omitted.password
Admin user password
Note: If
wildcard
is enabled, you cannot set a password.If
wildcard
is enabled, the remote user can share the account and log in without needing to create multiple user accounts. That means, you can use the user and password pair stored in the remote server without needing to match the table name. See the following example:config system admin edit "rs_admin" set remote-auth enable set accprofile "super_admin" set wildcard enableset remote-group "user" next end
Only one wildcard remote account is allowed to exist under
system admin
. -
Verify that the RADIUS server connection is successful.
execute test authserver radius <server_name> <chap | pap | mschap | mschap2> <username> <password> <server_name>: radius server table name <auto | chap | pap | mschap | mschap2>: choose a protocol <username>: enter user name <password>: enter password
execute test authserver radius-direct <IP> <port number (0 default port)> <udp> <secret> <pap | chap | mschap | mschap2> <user> <password> <IP>: RADIUS server IP <port number (0 default port)>: choose default port number <udp>: choose transport protocol <secret>: authserver pre-key <auto | chap | pap | mschap | mschap2>: choose a protocol <username>: enter user name <password>: enter password
To configure the FortiExtender to use RADIUS authentication - GUI
- Configure the FortiExtender to access a RADIUS server.
From the FortiExtender GUI, go to User & Auth and select the RADIUS Servers tab.
Click Create RADIUS Server and enter your RADIUS server configurations.
When you are finished, click Save.
-
Apply the RADIUS server table to a user group.
-
Go to User & Auth and select Create User Group or edit an existing user group.
-
In the RADIUS Servers field, select the RADIUS server you previously configured.
-
When you are finished, click Save.
-
-
Enable remote access on FortiExtender.
-
Go to Settings > Access Control and select Create Admin or edit an existing Admin profile.
-
In the Type field, select from the following options:
- Local User: Disable remote authentication.
- Match a user on a remote server group: Enable remote authentication, wildcard is disabled.
- Match all users in a remote server group: Remote authentication is enabled, wildcard is also enabled.
-
When you are finished, click Save.
-
-
Verify that the RADIUS server connection is successful.
-
Go to User & Auth > RADIUS Servers and edit the RADIUS server you configured.
-
Click Test Connectivity and Test User Credential to verify the connection.
-