FortiNet

To use the RadSec feature on your FortiGate for WiFi (with FortiAPs), firmware FortiOS 7.6.0 or later is required on the FortiGate.

Prepare Certificates

To establish a valid RadSec connection, your Access Points must trust the RADIUS Server Certificate and your RADIUS server must trust your RadSec client certificate.

  1. Download the root certificate of the CA that has issued your RADIUS server certificate as described here.

  2. Create a RadSec client certificate for your WAPs (centrally managed via FortiGate). If you are using SCEPman Certificate Master, the process is described here. FortiGate accepts the PKCS#12 format for RadSec client certificates.

Ensure to monitor the expiry of your RadSec client certificate and renew it in due time to prevent service interruptions.

  1. Add the root certificate of the CA that has issued the RadSec client certificate to your RADIUS instance as described here and select RadSec under Use for. In case the RadSec client certificate has been issued by SCEPman and you already trust the SCEPman Root CA for client authentication, simply edit the trusted SCEPman Root CA certificate and select Both under Use for.

FortiGate Configuration

Below settings are the necessary settings to establish a functional RadSec connection with our service. Configure any other settings at your discretion.

Via UI

To configure RadSec on your FortiGate UI please follow the steps:

  • Import the RadSec client certificate to your FortiGate under System > Certificates > Import > Certificate.

  • Modify the RADIUS server configuration in your FortiGate to use it as RadSec client certificate.

  • If enabled, please disable the server-identity-check in your FortiGate RADIUS server configuration.

Via Command Line

To configure RadSec on your FortiGate using the command line, please use these below sets of instructions:

RADIUS Server Configuration

config user radius

    edit "radiusaas"

        set server "radsec-CLIENTNAME.radius-as-a-service.com"

        set secret radsec

        set acct-interim-interval 600

        set radius-port 2083

        set transport-protocol tls

        set ca-cert "CA_Cert"

        set client-cert "certificate-fortigate"

        set server-identity-check disable

    next

end

# Name the root CA of your RADIUS server certificate
set ca-cert "CA_Cert"

# Name the RadSec client certificate
set client-cert "certificate-fortigate"

WiFi SSID Configuration

config wireless-controller vap

    edit "client-wireless"

        set ssid "client-wireless"

        set security wpa2-only-enterprise

        set pmf enable

        set 80211k disable

        set 80211v disable

        set auth radius

        set radius-server "radiusaas"

        set local-bridging enable

        set schedule "always"

    next

end

References

Link to FortiGate's documentation for the RadSec configuration: https://docs.fortinet.com/document/fortigate/7.6.0/administration-guide/729374/configuring-a-radsec-client

Last updated