Description | This article discusses FortiClient feature support for connecting to IKEv2 tunnels that are located at the same Remote Gateway address on the FortiGate, including background into why this can be an issue, why the feature is useful, and how this multiple tunnel support works. |
Scope | FortiClient 7.2/7.4 and later, FortiGate, IKEv2, IPSec |
Solution |
At the time of this writing (October 2025), FortiClient supports or has supported SSL VPN, IKEv1, and IKEv2 for remote access VPN connectivity to the FortiGate. The first two options in-particular were more commonly utilized in the past, but recent changes show that IKEv2 will become the recommended/more-preferred option going forward:
For guidance on converting from existing SSL VPN configurations over to IKEv2, refer to the following documentation:
During this transition to IKEv2, a problem can occur when multiple dialup VPN tunnels are configured to listen on the same interface/Remote Gateway address. Administrators might need multiple dialup tunnels to separate different user groups (such as contractors vs. employees), and users must be able to consistently match the associated VPN tunnel. Each VPN method solves this problem in a different way:
On FortiClient then, VPN tunnels not using certificate-based authentication must instead specify a network-id value when there are multiple possible IKEv2 dialup tunnels on the FortiGate, otherwise the wrong VPN tunnel may be matched and the IKEv2 tunnel connection will fail.
So far, network-id support has been added to FortiClient 7.2.6 (Windows/macOS), 7.2.7 (Linux), 7.4.1 (all platforms) and all later, and support for configuring network-id via EMS was added as of versions 7.2.6 and 7.4.1 (configurable under Endpoint Profiles -> Remote Access and modifying the Phase1 settings for VPN Tunnels:(
However, take note that GUI support in FortiClient itself is not yet available at this time, so it is not yet possible to set network-id for IKEv2 tunnels configured directly on FortiClient (though it is possible to manually configure the option via the FortiClient XML configuration: FortiClient XML Reference - IKE Settings).
Side Note: IPsec with SAML-based authentication on the FortiGate currently relies on setting a specific ike-saml-server directly on the FortiGate network interface (see also: FortiGate Admin Guide - SAML for dialup IPsec). This means that it is currently not possible to have multiple SAML IdPs supported across multiple IKEv2 tunnels when those tunnels listen on the same network interface (i.e., a single WAN interface). |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.