Description
This article describes how to overcome the LDAPS TLS issue that may occur while using SSLVPN, especially after upgrading FortiGate.
Scope
FortiGate.
Solution
diagnose debug reset
diagnose debug disable
From FortiOS V7.2.0, the LDAP server configured on FortiGate can authenticate itself with a client certificate to the LDAP server.
config user ldap
edit <ldap_server>
set client-cert-auth enable
set client-cert <FGT_CERT_NAME>
next
end
Refer to the following document for information:
Configuring client certificate authentication on the LDAP server - FortiGate 7.2.0.
If LDAP authentication is working fine locally from the FGT, but the user is still getting issues connecting to the firewall using SSL VPN. Share the output of the below debug command with TAC by reproducing the issue:
diagnose debug disable
diagnose debug reset
dia debug console timestamp enable
diagnose vpn ssl debug-filter src-addr4 < user PC public IP >
diagnose debug application sslvpn -1
diagnose debug application fnbamd -1
diagnose debug enable
To stop the debug processes:
diagnose debug reset
diagnose debug disable
It is possible to verify the user group and portal mapping with the following command:
get vpn ssl monitor
Note:
Since FortiOS 7.4.4 and above, the CA certificate of the LDAP server must be imported into the FortiGate.
Refer to this article: Technical Tip: LDAPS connections no longer work after update to v7.4.4.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.