Description |
This article describes how randomly failing SSL VPN authentication with FortiToken push can be fixed.
|
Scope | FortiToken, FortiGate. |
Solution |
With the default, set auth-session-check-source-ip enabled, the auth fails if the Token arrives from a different IP address than the initial session:
2021-12-04 12:45:20 [177:root:fd]SSL state:SSL negotiation finished successfully (10.255.255.2)
With 'set auth-session-check-source-ip disable', the auth goes thru even if the token comes in from a different IP address:
2021-12-04 12:50:31 [177:root:105]SSL state:SSL negotiation finished successfully (10.255.255.2)
Before v6.2.0, the behavior was to drop an auth attempt with multiple IP addresses, and it cannot be changed. Failing auth attempts are expected.
config vpn ssl settings
config system global remoteauthtimeout : 5 Minimum value: 1 Maximum value: 300
Note:
Related document: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.