Created on
01-19-2026
05:30 AM
Edited on
01-20-2026
12:36 AM
By
Jean-Philippe_P
| Description | This article describes a use case where, after enabling IKEv2, the user authentication fails with the error 'EAP password failure'. |
| Scope | FortiGate, FortiAuthenticator. |
| Solution |
In this use case, the setup works as expected with PAP using IKEv1. However, in IKEv2, MS-CHAP will be used.
Debugs to be checked:
FortiClient debug:
Log Level-->Debug
IPsec debug from FortiGate:
diagnose vpn ike log filter rem-addr4 <remote_side_publicIP>
To disable the debug after testing:
diagnose debug disable
FortiAuthenticator debug:
https://<FAC IP>/debug/radius/
From FortiAuthenticator debug, it is observed challenge message is sent, but no response is received. In the user PC, an EAP password error is received.
2026-01-02T03:47:22.824653-08:00 FortiAuthenticator radiusd[30624]: (4) eap: EAP session adding &reply:State = 0x22a6ecd322a7eaff
Solution:
Ensure EAP is enabled in the RADIUS policy and the EMS server.
In the RADIUS policy, under Advanced Options, enable 'Allow OTP for EAP-MSCHAPv2 Authentication with FortiClient'.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.