Description | This article describes that SSL VPN cannot connect due to a redirect host check issue, but no host check is turned on. |
Scope | FortiGate v6.4, v7.2 and above. |
Solution |
User groups are assigned in the SSL VPN portal and policy. However, in some cases, per user is assigned instead of the user group and defined in the policy, but the user cannot connect to the SSL VPN.
Symptom: When connecting, FortiClient will not show any error and will return to the login prompt.
Setup: FortiGate with SSL VPN portals using tunnel mode with Enabled Based on Policy Destination and Web mode only.
When running the SSL VPN debug, the output behavior is visible as below:
948:root:2c]Auth successful for user ami
However, when checking the SSL VPN setting, the host-check configuration is not enabled in any portal because the All Other Users/Groups portal is using only web mode enabled as below:
The policy only includes the user as a source, so it should be portal 'WEB', but the portal only enabled web mode. When the user connects from FortiClient to SSL VPN, FortiClient does not prompt any error and goes back to the login prompt.
Solution: Ensure that the All Users/Groups portal must enable tunnel mode if the user is connecting via FortiClient. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.