Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet FCSS_LED_AR-7.6 Exam - Topic 2 Question 2 Discussion

Actual exam question for Fortinet's FCSS_LED_AR-7.6 exam
Question #: 2
Topic #: 2
[All FCSS_LED_AR-7.6 Questions]

Refer to the exhibit.

A RADIUS server has been successfully configured on FortiGate, which sends RADIUS authentication requests to FortiAuthenticator. FortiAuthenticator, in turn, relays the authentication using LDAP to a Windows Active Directory server.

It was reported that wireless users are unable to authenticate successfully.

The FortiGate configuration confirms that it can connect to the RADIUS server without issues.

While testing authentication on FortiGate using the command diagnose test authserver radius, it was observed that authentication succeeds with PAP but fails with MSCHAPv2.

Additionally, the Remote LDAP Server configuration on FortiAuthenticator was reviewed.

Which configuration change might resolve this issue?

Show Suggested Answer Hide Answer
Suggested Answer: B

From the exhibits and text:

FortiGate RADIUS FortiAuthenticator

FortiAuthenticator LDAP Windows AD

diagnose test authserver radius ... papsucceeds

diagnose test authserver radius ... mschap2fails

This behavior matches a classic limitation documented in FortiOS:

When usingLDAPas the back-end, the RADIUS server must usePAP. CHAP/MS-CHAPv2 arenot supportedwith plain LDAP because the server cannot validate the challenge--response without access to password hashes.

In the Remote LDAP server config on FortiAuthenticator, the option''Windows Active Directory Domain Authentication'' is disabled.When this feature isenabled, FortiAuthenticator can talk to AD usingKerberos/NTLMinstead of a simple LDAP bind, whichdoes support MS-CHAPv2for incoming RADIUS authentications.

So to allow MS-CHAPv2 all the way from FortiGate to AD, you must:

Keep FortiGate using RADIUS with MS-CHAPv2 FortiAuthenticator

EnableWindows Active Directory Domain Authenticationso FortiAuthenticator can properly validate MS-CHAPv2 against AD.

Why the other options are wrong:

A . Change to CHAP-- CHAP still cannot be validated over LDAP; docs say LDAP back-ends must usePAP.

C . Manually add users to local DB-- That would allow local-DB auth but does not fix MS-CHAPv2 against AD.

D . Use RADIUS attributes on FortiGate-- Attributes do not influence the EAP inner method; they don't fix MS-CHAPv2 failures.

Therefore the configuration change that can realistically fix the MS-CHAPv2 problem isenabling Windows Active Directory Domain Authentication on FortiAuthenticator (B).


Contribute your Thoughts:

0/2000 characters
Maddie
1 day ago
I think B is the best choice.
upvoted 0 times
...
Brittni
6 days ago
I agree, RADIUS attributes might be the key here.
upvoted 0 times
...
Lizette
12 days ago
Wait, why is MSCHAPv2 failing? That’s surprising!
upvoted 0 times
...
Alethea
17 days ago
I think changing to CHAP could help.
upvoted 0 times
...
Alyce
22 days ago
Definitely need to check the AD settings.
upvoted 0 times
...
Quentin
27 days ago
PAP works, but MSCHAPv2 failing is weird.
upvoted 0 times
...
Golda
2 months ago
I wonder if the FortiGate is just having a bad day and needs a nap. Wireless authentication can be tricky like that.
upvoted 0 times
...
Santos
2 months ago
Using RADIUS attributes under the FortiGate configuration could be the way to go.
upvoted 0 times
...
Cordell
2 months ago
Manually adding user credentials to the FortiAuthenticator local database seems like an unnecessary workaround.
upvoted 0 times
...
Denae
2 months ago
Enabling Windows Active Directory Domain Authentication on FortiAuthenticator might be the solution.
upvoted 0 times
...
Mammie
2 months ago
The RADIUS authentication protocol should be changed to CHAP to resolve this issue.
upvoted 0 times
...
Margot
3 months ago
I feel like manually adding user credentials to the FortiAuthenticator could work, but it seems like a temporary fix rather than a real solution.
upvoted 0 times
...
Aleshia
3 months ago
This reminds me of a practice question where we had to troubleshoot similar authentication issues. I wonder if using RADIUS attributes might be the key here.
upvoted 0 times
...
Jackie
3 months ago
I think enabling Windows Active Directory Domain Authentication could help, but I’m not entirely confident about how that interacts with RADIUS.
upvoted 0 times
...
Odette
3 months ago
I remember something about RADIUS and LDAP, but I'm not sure if changing the protocol to CHAP is the right move.
upvoted 0 times
...
Matthew
3 months ago
I'm pretty confident that the answer is B. The question mentions that the authentication is being relayed from FortiAuthenticator to the Windows Active Directory server. If the Active Directory Domain Authentication is not enabled, that could be the root cause of the issue.
upvoted 0 times
...
Jennifer
3 months ago
Okay, let me think this through. Since the RADIUS authentication is working with PAP, I don't think the issue is with the RADIUS protocol. The problem seems to be with the MSCHAPv2 authentication. Maybe we need to check the Active Directory settings on the FortiAuthenticator?
upvoted 0 times
...
Adela
4 months ago
Hmm, this seems tricky. The question says the FortiGate can connect to the RADIUS server, so I'm not sure if the issue is with the RADIUS setup. Maybe it's something to do with the LDAP configuration on the FortiAuthenticator?
upvoted 0 times
...
Lorriane
4 months ago
I'm a bit confused here. The question mentions that RADIUS authentication is working with PAP, but not with MSCHAPv2. So I think the issue might be with the RADIUS protocol configuration.
upvoted 0 times
...
Darnell
4 months ago
This question is tricky.
upvoted 0 times
...

Save Cancel