FortiGate - RadSec Configuration
Configure RadSec (RADIUS over TLS) on FortiGate wireless controllers and FortiAP access points for secure OpenRoaming authentication with IronWiFi. This guide covers certificate installation via GUI, CLI-based RadSec configuration, and Hotspot 2.0 profile creation for FortiOS 7.x deployments.
Quick Start
- Enable RadSec and OpenRoaming in IronWiFi Console
- Download certificate bundle
- Import certificates via FortiGate GUI (System > Certificates)
- Configure RADIUS server with RadSec via CLI
- Create Hotspot 2.0 profile with OpenRoaming OIs
- Apply to wireless VAP
Prerequisites
In FortiGate:
- FortiGate with FortiOS 7.0 or later
- FortiAP access points
- CLI access (required for RadSec configuration)
In IronWiFi Console (complete these first):
- Create or select a Network in the IronWiFi Console
- Enable OpenRoaming from the dropdown menu
- Enable RadSec from the dropdown menu
- Download the certificate bundle (ZIP file containing Root CA, Intermediate CA, client certificate, and private key)
Important Note
FortiGate RadSec configuration requires CLI access. The GUI does not support all RadSec settings.
Certificate Installation
Upload Certificates via GUI
-
Log in to FortiGate web interface
-
Go to System > Certificates
-
Import CA certificates:
- Click Import > CA Certificate
- Upload
iw-rsa-root-ca.cert.pem - Name:
IronWiFi-Root-CA - Upload
iw-rsa-radsec-signing-ca.cert.pem - Name:
IronWiFi-RadSec-CA
-
Import client certificate:
- Click Import > Local Certificate
- Upload and
client.cert.pemclient.key.pem - Name:
IronWiFi-RadSec-Client
Verify Certificates
After import, certificates should appear in:
- Remote CA Certificates: IronWiFi-Root-CA, IronWiFi-RadSec-CA
- Local Certificates: IronWiFi-RadSec-Client
CLI Configuration
Configure RADIUS Server with RadSec
Connect to FortiGate CLI and configure:
Key Parameters Explained
| Parameter | Value | Description |
|---|---|---|
| radsec.ironwifi.com | RadSec server address |
| "" | Empty for RadSec (uses certs) |
| 2083 | Standard RadSec port |
| tls | Enable RadSec |
| IronWiFi-Root-CA | CA for server verification |
| IronWiFi-RadSec-Client | Client certificate |
Configure User Group
Wireless Configuration
Create SSID with Passpoint
Configure Hotspot 2.0 Profile
Configure NAI Realm
Link NAI Realm to Profile
Complete Configuration Script
Copy and paste this complete configuration:
Firewall Policy
Create firewall policy for RadSec users:
Verification
Check RADIUS Configuration
diagnose test authserver radius IronWiFi-RadSec
Check RadSec Connection
Check Certificate Status
Monitor Authentication
diagnose wireless-controller wlac -c sta
Troubleshooting
RadSec Connection Failures
-
Certificate Issues
-
Verify Certificates
- Check certificate validity
- Ensure CA chain is complete
- Verify client cert matches key
-
Network Issues
- Verify port 2083 open outbound
- Check DNS resolution
- Test connectivity to RadSec server
Authentication Problems
-
Check RADIUS Events
-
Review FortiAnalyzer (if available)
- Check RADIUS authentication logs
- Look for rejection reasons
Common Errors
| Error | Cause | Solution |
|---|---|---|
| "TLS handshake failed" | Cert issue | Re-import certificates |
| "Connection timeout" | Port blocked | Check firewall rules |
| "Certificate verify failed" | CA not trusted | Import complete CA chain |
| "No matching realm" | NAI config | Verify realm configuration |
Best Practices
- Use FortiOS 7.x: Better RadSec support
- CLI Configuration: Required for full RadSec setup
- Monitor Certificates: Track expiration dates
- Test Connectivity: Verify RadSec before production
- Backup Configuration: Save working config
- Use FortiAnalyzer: For detailed logging
Related Topics
Same vendor
Standards & reference
Was this page helpful?