Created on
07-28-2025
07:55 AM
Edited on
08-04-2025
05:49 AM
By
Jean-Philippe_P
Description | This article explains how to check the group association of an IPsec VPN user when groups are defined in the firewall policy. |
Scope | FortiOS. |
Solution |
A network administrator may need to verify the group association of an IPsec VPN user for various reasons, such as applying access restrictions based on user roles or troubleshooting connectivity and policy-related issues. This is especially helpful when users from different groups are connecting through the same dial-up tunnel.
Note: If the group is set directly in the IPsec settings, no cached session is created, and the user will not appear in the Firewall User Monitor or diagnose firewall auth list. For more information, refer to Technical Tip: A guide to Dial-Up IPsec VPN Authentication and Policy Matching.
For IKEv2 dial-up tunnels, there is no XAUTH configuration. Instead, user groups can be directly referenced in the firewall policy, leaving authusrgrp empty.
When a user is connected to IKEv2:
FGVM4Vxxxx0732 # diagnose firewall auth list
10.212.134.200, localuser
----- 1 listed, 0 filtered ------
FGVM4Vxxxx0732 #
When the user is connected to IKEv1:
FGVM4Vxxxx0732 # diagnose firewall auth list
10.212.134.200, localuser
----- 1 listed, 0 filtered ------
Related article: Technical Tip: A guide to Dial-Up IPsec VPN Authentication and Policy Matching |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.