Radius authentication setup through the firewall
Originally Published: 2001-01-11
Article Number
Applies To
RADIUS
Steel-Belted Radius Enterprise Edition for NT v 2.25
Check Point Firewall-1
Firewall
Issue
Cause
Resolution
For test authentication and native SecurID authentication:
Destination port: 5500/udp
Source Port: 1024-65535
If the Radius server is configured as the Proxy server, the following ports should be opened (Radius server that does not support native SecurID authentication).
For Radius authentication:
Destination Port: 1645/udp
Source Port: 1024-65535
NOTE: These port numbers are applicable to any third-party Radius server. This solution is applicable to all firewalls except Raptor.
If the Raptor firewall is between the Radius server and ACE/Server, see RSA SecurID authentication throughSymantec Raptor Firewall.
In addition, destination port 1645/udp should be opened on Raptor for Radius authentication.
Related Articles
Troubleshooting RSA Authentication Manager 8.1 native SecurID and RADIUS authentication issues 4.66KNumber of Views FortiGate Firewall - Configure RADIUS Authentication Manager Using SSL VPN - RSA Ready Implementation Guide 102Number of Views Performing RADIUS authentication tests with NTRadPing to RSA Authentication Manager 8.32KNumber of Views RADIUS shared secret limitations of RADIUS clients configured with RSA Authentication Manager 715Number of Views How to setup On-Demand Authentication (ODA) in RSA Authentication Manager 8.x 1.25KNumber of Views
Trending Articles
An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA Authentication Manager 8.9 Release Notes (January 2026) RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager Upgrade Process Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide
Don't see what you're looking for?