Created on 11-11-2020 11:22 PM Edited on 11-25-2022 08:08 AM By Jean-Philippe_P
Description
This article describes how to authenticate with remote LDAP via site-to-site IPSEV VPN.
Solution
Let's assume that the site-to-site IPSEC VPN tunnel is up and the traffic can pass through just fine.
1) Adding the remote LDAP server:
Go to User & Device -> LDAP server and select 'Create New'.
Test the credentials to verify the same.
Furthermore, there is another solution to fix the problem by assigning an IP address on the IPsec tunnel interface.
Ensure that the IPsec Interface IP prefix must be part of the Phase2 local selectors. If not created, create a new Phase2 selector for this IP or subnet to be used as a local network.
# config system interface
edit "IPSec-VPN"
set vdom "root"
set ip 10.10.10.1 255.255.255.255
set allowaccess ping
set type tunnel
set snmp-index 12
set interface "wan1"
next
end
# config user ldap
edit LDAP-SERVER
set source-ip 10.10.10.1
end
Related Articles:
Technical Tip: How to configure LDAP server
Technical Tip: Configure IP address on an IPSec tunnel interface
Technical Tip: Self-originating traffic over IPSec VPN (For example ping)
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.