Fortinet’s official documentation, including the FortiOS Handbook and NSE 7 training materials, provides detailed guidance on troubleshooting RADIUS authentication issues. The three tools listed below are explicitly supported for diagnosing RADIUS-related problems in FortiOS:
B. You can use the diagnose test authserver radius command to verify RADIUS server configuration, user credentials, and user group membership.This command is a well-documented troubleshooting tool in the FortiOS CLI Reference and Technical Documentation. It allows administrators to manually test RADIUS authentication by specifying the RADIUS server, username, and password. The output provides details on whether the authentication succeeds or fails, along with information about group membership and server reachability. For example:
bash
CollapseWrapCopy
diagnose test authserver radius
This is a critical tool for verifying the RADIUS server's configuration and user authentication flow.
D. You can enable debug for the fnbamd process to view RADIUS authentication details.The fnbamd process (FortiNet Authentication Daemon) handles non-local authentication protocols like RADIUS and LDAP in FortiOS. Enabling debug for this process provides real-time logs of the authentication exchange between the FortiGate and the RADIUS server. This is officially recommended in Fortinet’s troubleshooting guides for advanced diagnostics. The command sequence is:
bash
CollapseWrapCopy
diagnose debug application fnbamd -1
diagnose debug enable
After testing, you can disable debugging with diagnose debug disable. This tool is invaluable for identifying issues such as misconfigured shared secrets, timeouts, or attribute mismatches.
E. You can use the diagnose test application radiusd command to verify the RADIUS server configuration, user credentials, and user group membership.The radiusd process relates to the RADIUS daemon on the FortiGate, and this diagnostic command tests the RADIUS server’s operational status and authentication functionality. While less commonly highlighted than diagnose test authserver radius, it is referenced in Fortinet’s CLI documentation for deeper troubleshooting of the RADIUS service itself. It provides detailed output about the server’s response and can help isolate issues specific to the RADIUS protocol implementation.
Why not A and C?
A. You can enable debug for the fssod process to view RADIUS authentication details.The fssod process relates to FortiSSO (Single Sign-On) and is primarily used for FSSO-based authentication, not direct RADIUS troubleshooting. While it may log some authentication-related events in specific SSO scenarios, it is not a standard tool for RADIUS diagnostics according to Fortinet’s official documentation. Thus, it is not a correct choice here.
C. You can check the Firewall Users widget to view the list of active RADIUS users.While the Firewall Users widget (available in the FortiOS GUI underUser & Authentication > Firewall Users) shows a list of authenticated users, it is a monitoring tool, not a troubleshooting tool. It does not provide diagnostic details about RADIUS authentication failures or server issues, making it insufficient for this purpose per Fortinet’s troubleshooting methodology.
Source Verification
The answers are derived from official Fortinet resources, including:
FortiOS 7.0 CLI Reference(diagnose commands section)
FortiOS Handbook: Authentication(RADIUS troubleshooting section)
NSE 7 - LAN Edge 7.0 training materials (authentication diagnostics module)
These tools (B, D, E) align with Fortinet’s recommended practices for diagnosing RADIUS authentication issues effectively.