Fortinet black logo

FortiSwitch Integration

7.2.0

RADIUS

RADIUS

In the FortiSwitch CLI, enable the processing of RADIUS CoA and disconnect messages by including radius-acct as a permitted management access type and enabling CoA. For FortiSwitch CLI access instructions, see Appendix.

Reference:

https://docs.fortinet.com/document/fortiswitch/7.0.4/fortiswitchos-cli-reference/500379/config-system#config16

https://docs.fortinet.com/document/fortiswitch/7.0.4/fortiswitchos-cli-reference/193187/config-user#config4

https://docs.fortinet.com/document/fortiswitch/6.4.3/fortiswitchos-cli-reference/500379/config-system#config16

https://docs.fortinet.com/document/fortiswitch/6.4.3/fortiswitchos-cli-reference/193187/config-user#config4

CLI Method:

config system interface

edit "internal"

set allowaccess ping https ssh radius-acct

next

config user radius

edit "<name>"

set radius-coa enable

next

end

end

Example:

config system interface

edit "internal"

set allowaccess ping https ssh radius-acct

next

end

config user radius

edit "FortiNAC-Radius"

set radius-coa enable

next

end

end

Proceed to Configure FortiNAC (Link Mode).

RADIUS

In the FortiSwitch CLI, enable the processing of RADIUS CoA and disconnect messages by including radius-acct as a permitted management access type and enabling CoA. For FortiSwitch CLI access instructions, see Appendix.

Reference:

https://docs.fortinet.com/document/fortiswitch/7.0.4/fortiswitchos-cli-reference/500379/config-system#config16

https://docs.fortinet.com/document/fortiswitch/7.0.4/fortiswitchos-cli-reference/193187/config-user#config4

https://docs.fortinet.com/document/fortiswitch/6.4.3/fortiswitchos-cli-reference/500379/config-system#config16

https://docs.fortinet.com/document/fortiswitch/6.4.3/fortiswitchos-cli-reference/193187/config-user#config4

CLI Method:

config system interface

edit "internal"

set allowaccess ping https ssh radius-acct

next

config user radius

edit "<name>"

set radius-coa enable

next

end

end

Example:

config system interface

edit "internal"

set allowaccess ping https ssh radius-acct

next

end

config user radius

edit "FortiNAC-Radius"

set radius-coa enable

next

end

end

Proceed to Configure FortiNAC (Link Mode).