The correct answers are A and B.
The LAN Edge 7.6 Architect study guide explains that when LDAP is the back-end server, CHAP, MS-CHAP, and MS-CHAPv2 do not work because the client sends a one-way password hash, while LDAP expects the actual password:
“If FortiGate is configured to authenticate clients using a remote LDAP server, VPN and wireless clients using CHAP schemes are not able to authenticate... The reason is that during CHAP, MS-CHAP, and MS-CHAPv2 authentication, a client sends a one-way hash of the password. However, the LDAP server, which is on the back end, is expecting the password itself.â€
The same study guide then gives the two valid solutions:
“Two possible methods that you can use to solve the CHAP and LDAP problem are:â€
“Use RADIUS: Change your back-end server from LDAP to RADIUS.â€
and
“If you are using Windows AD as your LDAP server, an alternative is to use FortiAuthenticator as an authentication proxy... You must also configure FortiAuthenticator to log in to the Windows domain using the credentials of a Windows administrator. This adds FortiAuthenticator as a trusted device on the Windows AD domain, allowing FortiAuthenticator to proxy the password hash from the client to the Windows server, using NTLM.â€
That directly matches:
A. Enable Windows Active Directory domain authentication on FortiAuthenticator.
B. Configure FortiAuthenticator to use RADIUS instead of LDAP as the back-end authentication server.
The study guide also states this explicitly in the FortiAuthenticator LDAP configuration section:
“If you want FortiAuthenticator to relay CHAP, MS-CHAP, and MS-CHAPv2 authentication to a Windows AD server, you must enable Windows Active Directory Domain Authentication and enter the credentials for a Windows administrator.â€
And it separately confirms RADIUS as another supported back-end proxy model:
“You can configure FortiAuthenticator to connect to existing RADIUS servers... If the local user database is not used, FortiAuthenticator proxies RADIUS authentication requests.â€
Why the other options are incorrect:
C. Incorrect. RADIUS attribute filtering does not solve the CHAP/MS-CHAPv2 versus LDAP hash problem. The issue is the back-end authentication method, not attribute filtering.
D. Incorrect. Changing from MS-CHAPv2 to CHAP does not fix it, because the study guide says the same limitation applies to CHAP, MS-CHAP, and MS-CHAPv2 when LDAP is the back end
Final verified conclusion:
To enable MS-CHAPv2 authentication in this scenario, the two valid solutions are:
A. Enable Windows Active Directory domain authentication on FortiAuthenticator.
B. Configure FortiAuthenticator to use RADIUS instead of LDAP as the back-end authentication server.