Radius authentication setup through the firewall
Originally Published: 2001-01-11
Article Number
Applies To
RADIUS
Steel-Belted Radius Enterprise Edition for NT v 2.25
Check Point Firewall-1
Firewall
Issue
Cause
Resolution
For test authentication and native SecurID authentication:
Destination port: 5500/udp
Source Port: 1024-65535
If the Radius server is configured as the Proxy server, the following ports should be opened (Radius server that does not support native SecurID authentication).
For Radius authentication:
Destination Port: 1645/udp
Source Port: 1024-65535
NOTE: These port numbers are applicable to any third-party Radius server. This solution is applicable to all firewalls except Raptor.
If the Raptor firewall is between the Radius server and ACE/Server, see RSA SecurID authentication throughSymantec Raptor Firewall.
In addition, destination port 1645/udp should be opened on Raptor for Radius authentication.
Related Articles
FortiGate Firewall - SAML IDR SSO Configuration Using SSL VPN - RSA Ready Implementation Guide 47Number of Views RSA RADIUS Overview 219Number of Views Required RSA RADIUS Server Listening Ports 48Number of Views FortiGate Firewall - RADIUS Configuration Using SSL VPN - RSA Ready Implementation Guide 86Number of Views How to setup On-Demand Authentication (ODA) in RSA Authentication Manager 8.x 1.27KNumber of Views
Trending Articles
RSA RADIUS Server service failed to start in the RSA Authentication Manager 8.1 Operations Console RSA Authentication Manager Upgrade Process Reset the token PIN in the RSA Authentication Manager 8.x Self-Service Console when the existing PIN is forgotten RSA-2026-05: RSA Authentication Manager Security Update for Third-Party Component Vulnerabilities RSA Release Notes: Cloud Access Service and RSA Authenticators
Don't see what you're looking for?