Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

EAP-MSCHAPv2 is a password-based authentication method that integrates the Microsoft Challenge Handshake Authentication Protocol version 2 into the EAP framework. 

PEAP (Protected EAP) creates a secure TLS tunnel before the MSCHAPv2 exchange happens, protecting your credentials from eavesdropping and offline dictionary attacks.

To enable PEAP, you will need a valid SSL certificate.  You can either register for a new one or you can use an existing one, for example, the one you use to protect your DualShield Service Consoles.

Expand
titlePrepare an SSL certificate for RADIUS server

Include Page
Prepare an SSL certificate for RADIUS server
Prepare an SSL certificate for RADIUS server

Once the certificate has been prepared, you will need to configure the RADIUS server for Fortigate IPSec integration


Section
bordertrue


Column

In the main menu select Radius>Radius Servers


Column
width60%


Panel
borderColor#9EBEE5
bgColor#FFFFFF
borderWidth1px

Image Added




Section
bordertrue


Column

Click on the Image Added corresponding to the  RADIUS Server and select EAP Options



Column
width60%



Panel
borderColor#9EBEE5
bgColor#FFFFFF
borderWidth1px

Image Added




Section
bordertrue


Column

Specify the following values in the EAP Options

OptionsValue
EnabledMake sure this is checked!
Default EAP Type:Tunnel Based(PEAP)
Server CertificateSelect a SSL Certificate to be used as the RADIUS service
Inner EAP TypeMSCHAP2
Max Session:4096
Max Time To Live(seconds):1200
Max Time To Idle:60


Click Save


Column
width60%


Panel
borderColor#9EBEE5
bgColor#FFFFFF
borderWidth1px

Image Added