Description | This article describes how to configure Auto-connectto IPsec VPN using Entra ID logon session information with multiple user groups in the firewall policies instead of configuring the group on the IPsec tunnel. |
Scope | FortiGate v7.2.9, v7.4.4, and v7.6.0 with FortiClient EMS v7.2.3+. |
Solution |
Support for auto-connecting to IPsec VPN using Microsoft Entra ID was added in v7.2.8 and v7.4.2, with FortiClient EMS v7.2.3: Support for autoconnect to IPsec VPN using Microsoft Entra ID 7.2.8 Support for autoconnect to IPsec VPN using Microsoft Entra ID 7.4.2 Support autoconnect to IPsec VPN using Entra ID logon session information 7.2.3
The ability to use multiple user groups in the firewall policies was added in v7.2.9, v7.4.4, and v7.6.0.
config user external-identity-provider edit "msgraph" set type ms-graph set version v1.0 next end
set type dynamic set interface "port1" set ike-version 2 set peertype any set net-device disable set mode-cfg enable set proposal aes128-sha256 aes256-sha256 aes128gcm-prfsha256 aes256gcm-prfsha384 chacha20poly1305-prfsha256 set dhgrp 21 set childless-ike enable set azure-ad-autoconnect enable set ipv4-start-ip 192.168.100.1 set ipv4-end-ip 192.168.100.255 set dns-mode auto set save-password enable set client-auto-negotiate enable set client-keep-alive enable set psksecret <password> next end
If the tunnel has already been configured and has the 'authusergrp' setting, use the 'unset' command to remove the configured group.
Example:
config vpn ipsec phase1-interface unset authusergrp next
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.