Description |
This article describes an issue when an IPSEC VPN user cannot connect to the VPN if the option 'Inherit from policy' is configured in the XAUTH field in the VPN phase1 configuration, even though the groups are properly configured in the firewall policy.
The user can receive the message 'connection expiring due to XAUTH failure' by checking the debugs. This issue may happen in v7.6.2 and v7.6.3. |
Scope | FortiGate. |
Solution |
This is due to an issue where the IKED daemon is not communicating correctly with the FNBAMD daemon for authentication when the xauthtype is set to chap or pap. It is necessary to validate if chap or pap, and if so, change the configuration to use 'auto' instead.
config vpn ipsec phase1-interface
Change it to auto:
config vpn ipsec phase1-interface
As another workaround, the authentication should work if the user chooses the User Group directly in XAUTH. However, this may not be feasible if the users want to use multiple users/groups in the authentication and control them via a firewall policy.
It will be used only when the users are from Radius or LDAP. For local users, it will be done directly by FortiGate without any challenge request to external authentication servers. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.