FortiClient
FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient is compatible with Fabric-Ready partners to further strengthen enterprises’ security posture.
pjang
Staff & Editor
Staff & Editor
Article Id 414713
Description This article discusses FortiClient feature support for connecting to IKEv2 tunnels that are located at the same Remote Gateway address on the FortiGate, including background into why this can be an issue, why the feature is useful, and how this multiple tunnel support works.
Scope FortiClient 7.2/7.4 and later, FortiGate, IKEv2, IPSec
Solution

At the time of this writing (October 2025), FortiClient supports or has supported SSL VPN, IKEv1, and IKEv2 for remote access VPN connectivity to the FortiGate. The first two options in-particular were more commonly utilized in the past, but recent changes show that IKEv2 will become the recommended/more-preferred option going forward:

  • SSL VPN tunnel-mode has been deprecated on all FortiGates as of FortiOS 7.6.3 and later (though web-mode remains and has been renamed to Agentless VPN). Additionally, FortiSASE environments are now only utilizing IKEv2 for the Secure Internet Access (SIA) VPN tunnel between FortiClient and FortiSASE (existing SSL VPN-based environments are being migrated to IKEv2 over time).
  • IKEv1 has been deprecated in FortiClient 7.4.4 and later (see also: FortiClient 7.4.4 Release Notes).

 

For guidance on converting from existing SSL VPN configurations over to IKEv2, refer to the following documentation:

 

During this transition to IKEv2, a problem can occur when multiple dialup VPN tunnels are configured to listen on the same interface/Remote Gateway address. Administrators might need multiple dialup tunnels to separate different user groups (such as contractors vs. employees), and users must be able to consistently match the associated VPN tunnel. Each VPN method solves this problem in a different way:

 

On FortiClient then, VPN tunnels not using certificate-based authentication must instead specify a network-id value when there are multiple possible IKEv2 dialup tunnels on the FortiGate, otherwise the wrong VPN tunnel may be matched and the IKEv2 tunnel connection will fail.

 

So far, network-id support has been added to FortiClient 7.2.6 (Windows/macOS), 7.2.7 (Linux), 7.4.1 (all platforms) and all later, and support for configuring network-id via EMS was added as of versions 7.2.6 and 7.4.1 (configurable under Endpoint Profiles -> Remote Access and modifying the Phase1 settings for VPN Tunnels:(

 

EMS_RemoteAccess_network-id.png

 

However, take note that GUI support in FortiClient itself is not yet available at this time, so it is not yet possible to set network-id for IKEv2 tunnels configured directly on FortiClient (though it is possible to manually configure the option via the FortiClient XML configuration: FortiClient XML Reference - IKE Settings).

 

Side Note: IPsec with SAML-based authentication on the FortiGate currently relies on setting a specific ike-saml-server directly on the FortiGate network interface (see also: FortiGate Admin Guide - SAML for dialup IPsec). This means that it is currently not possible to have multiple SAML IdPs supported across multiple IKEv2 tunnels when those tunnels listen on the same network interface (i.e., a single WAN interface).

 

Contributors