Local Servers
Disabled by default.
Authentication:
-
FortiNAC’s Local Server processes RADIUS MAC and 802.1x EAP authentication without the need to proxy to an external RADIUS server.
-
FortiNAC-OS Requirement: "radius-local" option must be included in the "set allowaccess" command. See Open ports for details.
Accounting:
-
The Local Server does not provide accounting. If accounting is required, FortiNAC can be configured to proxy Accounting traffic to an external RADIUS server.
-
FortiNAC-OS Requirement: "radius-acct" option must be included in the "set allowaccess" command. See Open ports for details.
FortiNAC processes both RADIUS MAC and 802.1x EAP authentication locally and does not require an external RADIUS server.
Supported 802.1x EAP modes:
- TTLS/PAP
- TTLS/MSCHAPv2
- PEAP/MSCHAPv2
- TLS
Field |
Description |
---|---|
Name |
Unique name used to identify the configuration. |
TLS Service Configuration |
Select the TLS Service Configuration to use. Allows configuration of TLS Protocol versions and Ciphers for EAP in the Local Server. TLS Details.
|
Supported EAP Types |
Allows configuration of which EAP types are enabled. The field displays the EAP Types currently enabled. Click the drill down menu to view the available types. Click on a specific type to either enable or disable:
|
Winbind Domain(s) | For MSCHAPv2 authentication, specify the winbind instances for the allowed Active Directory server(s) or 'Allow Any' for authentication using any defined servers. Manage winbind instances in the Winbind tab. For more details on configuring winbinds see Winbind . |
Enable OCSP |
If enabled, EAP-TLS client certificates will have OCSP verification performed, using the URL embedded in the client certificate. Important: Certificates must contain the OCSP URL. Otherwise, client authentication will fail. |