Description | The article describes IPsec dial-up certificate authentication with LDAP integration. |
Scope | FortiGate. |
Solution |
Requirements:
FortiAuthenticator, acting as the local CA, signs the client (user certificate) and server (certificate presented by the FortiGate). The client certificate, along with the CA certificate, will be installed on the dial-up client.
User certificate on the CA referring to the SAN field:
The certificate's SAN should match the logon name on the LDAP server. Server certificate and CA certificate generated on the FortiAuthenticator installed on the FortiGate:
LDAP settings on the FortiGate:
config user ldap xQX+HsYNUogSvN3NFOnG2CPxmWipItA0yCyNsinUeLCIjSNeNY1puAOQVIqAW1vaEwUdVpjBhwgnwBgT/ +H3iuZyHQifgM1HgWT/j9Ods8cWUxiv2OdioMHkQNwV4lojAYtFlmMjY3dkVA
On the FortiGate, configure the peer users and add them to the peer group:
config user peer
config user peergrp edit "ldapgrp"
Configure IPsec dial-up tunnel: For the tunnel configuration, change the accept types to peer certificate group and select the peer group.
Create a firewall policy to allow access from the IPSEC tunnel interface to the local resources.
config firewall policy
On the FortiClient machine, configure the settings:
Debugging:
diagnose debug disable diagnose debug reset diagnose vpn ike log-filter dst-addr4 <ip.of.remote.peer>
Note: If using IKEv2 for dial-up connection, ensure that EAP auth settings is disabled under phase 1 tunnel settings for cert authentication to work.
LDAP-based user authentication is designed to work with XAUTH and IPsec IKEv1.
If the initial gateway lookup (based on SA_INIT_req) matches a phase1 with EAP enabled
If the initial gateway lookup (based on SA_INIT_req) matches a phase1 without EAP
Starting from v7.4.1, the 'diagnose vpn ike log-filter dst-addr4' command has been changed to 'diagnose vpn ike log filter rem-addr4'.
Related articles: Troubleshooting Tip: IPsec Tunnel (debugging IKE) Technical Tip: No bytes are received when connected to IPsec dialup VPN using FortiClient Technical Tip: LDAP user and groups cannot be used in IPSEC VPN Technical Tip: 'gw validation failed' for VPN Ikev2 tunnel with certificates |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.