Created on
03-17-2025
06:09 AM
Edited on
12-07-2025
07:19 AM
By
Stephen_G
| Description | This article describes how to troubleshoot the 'IKE authentication credentials are unacceptable' error on the Windows Native VPN Client when attempting to connect to an IKEv2 IPsec tunnel on FortiGate |
| Scope | FortiGate, FortiOS, IPsec, Windows Native VPN Client. |
| Solution |
FortiGate supports Windows Native Client IPsec connections using IKEv2. FortiGate can use certificate-based authentication to allow the endpoint to connect successfully.
Solution 1 - IPsec Gateway Certificate signed by a private CA.
Check for the configured IPsec gateway certificate under: FortiGate GUI -> VPN -> VPN Tunnels -> Select the desired tunnel and take note of the configured 'signature' name.
Solution 2 - IPsec gateway certificate signed by a public CA.
In most cases, when buying a certificate from a public CA, it will be signed by an intermediate CA. During the connection, the Windows client will first attempt to validate the certificate presented by the IPsec gateway, and it expects to receive the full certificate trust chain. FortiGates include many root CA certificates from well-known certificate authorities, just as most modern operating systems like Windows and macOS do, however, they do not include intermediate CA certificates. If any certificate in the trust chain is missing, the validation will fail, and the error 'IKE authentication credentials are unacceptable' will appear.
Below is an example using a certificate signed by DigiCert.
Once downloaded, open the certificate and check the Certification Path section to see all intermediate CAs in the trust chain.
Solution 3 - FQDN/IP in VPN configuration on the Windows client is not matching with the certificate.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.