Created on
08-28-2025
10:31 PM
Edited on
08-29-2025
10:25 AM
By
Stephen_G
Description | This article describes the required configuration to allow LDAP users connected to a VPN IPsec Dial-up tunnel to change their password when it expires. |
Scope | FortiGate with VPN IPsec tunnels in IKE version 1. |
Solution |
To allow password renewal from the FortiGate using any connection method (Wired, Wireless, VPN) is required to enable secure LDAP connection (LDAPS), and the password-renewal option must be enabled in the LDAP Server, as explained in the following technical document: Technical Tip: How to enable password renewal of remote LDAP user through FortiGate
VPN SSL is being replaced by VPN IPSec in new FortiOS versions: SSL VPN tunnel mode replaced with IPsec VPN
So VPN SSL should be migrated to VPN IPSec; however, in some cases, these configurations are based on LDAP Authentication, so the VPN SSL should be migrated using the instructions in the following document: Technical Tip: Remote Access IPsec VPN with LDAP authentication
To allow LDAP users to change their password when it expires, the following configuration in Phase1 of the tunnel is required:
config vpn ipsec phase1-interface
The option reauth allows the FortiGate to resend the user credentials when client software requires a password change:
Note: This configuration only works with IKE v1, since IKE v2 uses EAP for authentication, and LDAP Servers are not compatible with EAP for IKE v2. EAP-TTLS is required; more information is available in the following documents:
Note: Due to an ongoing issue with reauth parameter this is not available on 7.4.8. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.