Why is it critical to maintain NTP synchronization between FortiGate and FortiSwitch when FortiLink is configured?
FortiGate and FortiSwitchmust share synchronized timewhen operating in FortiLink mode.
Documented reasons in FortiOS:
Accurate time synchronization is required for logs, authentication events, and fabric correlations.
Why it's critical:
802.1X EAP and RADIUS timestamp validation
NAC policy enforcement timestamps
Certificate validation
Log correlation in Security Fabric / FortiAnalyzer
Incorrect options:
A: Firmware synchronization does NOT require NTP.
B: Switch-to-switch communication does not depend on NTP.
D: Standalone mode is unrelated to time sync.
Why is it critical to maintain NTP synchronization between FortiGate and FortiSwitch when FortiLink is configured?
FortiGate and FortiSwitchmust share synchronized timewhen operating in FortiLink mode.
Documented reasons in FortiOS:
Accurate time synchronization is required for logs, authentication events, and fabric correlations.
Why it's critical:
802.1X EAP and RADIUS timestamp validation
NAC policy enforcement timestamps
Certificate validation
Log correlation in Security Fabric / FortiAnalyzer
Incorrect options:
A: Firmware synchronization does NOT require NTP.
B: Switch-to-switch communication does not depend on NTP.
D: Standalone mode is unrelated to time sync.
A conference center wireless network provides guest access through a captive portal, allowing unregistered users to self-register and connect to the network. The IT team has been tasked with updating the existing configuration to enforce captive portal authentication over a secure HTTPS connection. Which two steps should the administrator take to implement this change? (Choose two.)
Goal: enforce captive portal authentication overHTTPSfor guests.
On FortiGate/FortiAuthenticator captive portal setups:
HTTP redirectis used so that when a guest browses to any HTTP site, their request is redirected to theportal URL.
Theportal URLitself must beHTTPSif you want a secure login page.
FortiOS captive portal and firewall authentication guidelines recommend:
EnablingHTTP redirectso unauthenticated HTTP traffic is transparently sent to the portal.
Configuring theportal URL with HTTPS, often referencing a certificate on FortiGate or FortiAuthenticator.
Therefore:
A . Enable HTTP redirect in the user authentication settings.This ensures unauthenticated HTTP requests are redirected to the (now HTTPS) portal.
D . Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator.This makes the login itself secure (TLS-protected).
Incorrect:
B-- You don't need a new SSID; the same SSID can use HTTPS portal.
C-- Disabling HTTP admin access on the SSID doesn't control the captive portal scheme; HTTPS enforcement is done by the portal configuration and redirect, not by admin-access flags.
When troubleshooting a captive portal issue, which POST parameter in the redirected HTTPS request can be used to track the user's session and ensure that the request is valid?
In FortiGate captive portal workflows (local or external):
Client connects to SSID / interface that has captive portal enabled.
Client makes an HTTP/HTTPS request.
FortiGate intercepts and redirects to alogin page(local or external URL).
The portal form is submitted viaPOSTback to FortiGate.
To prevent tampering and to tie the POST back to thecorrect user session, FortiGate includes a special hidden parameter in the redirect and expects it in the POST:
The parameter is namedmagic.
The magic value:
Is aunique tokengenerated per captive-portal session.
Encodes/session-links the user's IP, interface, and session info.
Allows FortiGate to ensure that:
The POST comes from the user who initiated the original request.
The request is not a random or replayed submission.
When troubleshooting:
If the external portal does notpreserve and resendthe magic parameter back to FortiGate exactly as received, authentication fails, and you'll see errors like ''session not found'' or ''invalid magic''.
Why the other fields are not used for this purpose
A . username-- Just the login ID; multiple users can use the same username from different locations, so it can't uniquely track the browser session.
B . redir-- Contains the URL the user originally requested, so they can be sent back there after login. It is not a session integrity token.
D . email-- Optional field used in some guest/registration flows; irrelevant to session validation.
Refer to the exhibit.



A RADIUS server has been successfully configured on FortiGate, which sends RADIUS authentication requests to FortiAuthenticator. FortiAuthenticator, in turn, relays the authentication using LDAP to a Windows Active Directory server.
It was reported that wireless users are unable to authenticate successfully.
The FortiGate configuration confirms that it can connect to the RADIUS server without issues.
While testing authentication on FortiGate using the command diagnose test authserver radius, it was observed that authentication succeeds with PAP but fails with MSCHAPv2.
Additionally, the Remote LDAP Server configuration on FortiAuthenticator was reviewed.
Which configuration change might resolve this issue?
From the exhibits and text:
FortiGate RADIUS FortiAuthenticator
FortiAuthenticator LDAP Windows AD
diagnose test authserver radius ... papsucceeds
diagnose test authserver radius ... mschap2fails
This behavior matches a classic limitation documented in FortiOS:
When usingLDAPas the back-end, the RADIUS server must usePAP. CHAP/MS-CHAPv2 arenot supportedwith plain LDAP because the server cannot validate the challenge--response without access to password hashes.
In the Remote LDAP server config on FortiAuthenticator, the option''Windows Active Directory Domain Authentication'' is disabled.When this feature isenabled, FortiAuthenticator can talk to AD usingKerberos/NTLMinstead of a simple LDAP bind, whichdoes support MS-CHAPv2for incoming RADIUS authentications.
So to allow MS-CHAPv2 all the way from FortiGate to AD, you must:
Keep FortiGate using RADIUS with MS-CHAPv2 FortiAuthenticator
EnableWindows Active Directory Domain Authenticationso FortiAuthenticator can properly validate MS-CHAPv2 against AD.
Why the other options are wrong:
A . Change to CHAP-- CHAP still cannot be validated over LDAP; docs say LDAP back-ends must usePAP.
C . Manually add users to local DB-- That would allow local-DB auth but does not fix MS-CHAPv2 against AD.
D . Use RADIUS attributes on FortiGate-- Attributes do not influence the EAP inner method; they don't fix MS-CHAPv2 failures.
Therefore the configuration change that can realistically fix the MS-CHAPv2 problem isenabling Windows Active Directory Domain Authentication on FortiAuthenticator (B).
Yuriko
4 days agoAlease
11 days agoLashawn
19 days agoAriel
26 days agoEun
1 month agoGlendora
1 month agoWynell
2 months agoKristel
2 months agoVal
2 months agoWhitley
2 months agoAlton
3 months agoErick
3 months agoCammy
3 months ago