Created on
01-09-2026
12:17 AM
Edited on
01-12-2026
12:37 PM
By
Jean-Philippe_P
| Description |
This article describes an issue where dial-up IPsec VPN users may fail to connect if the authentication server returns large group names or many groups. |
| Scope |
FortiGate IKEv2. FortiOS v7.4.9 and earlier, v7.6.4 and earlier. |
| Solution |
VPN users may fail to connect to a dial-up IPsec VPN when the user belongs to multiple groups. During the issue, the following logs may be seen in fnbamd and eap_proxy debugs.
diagnose debug application fnbamd -1 diagnose debug application eap_proxy -1 diagnose debug enable . . [1175] fnbamd_socket_update_interface-vfid is 0, intf mode is 0, intf name is , server address is 127.0.0.1:1812, source address is null, protocol number is 17, oif id is 0
These timelines for firmware release are estimated and may be subject to change.
diagnose debug console timestamp enable
Reproduce the issue. Disable the debug with:
diagnose debug disable
execute tac report
Or:
diagnose debug report
The following article also shows steps to collect the debug logs & TAC report: Technical Tip: Download Debug Logs and 'execute tac report'.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.