| Description | This article describes how to troubleshoot an issue with remote/local authentication by using debug commands. |
| Scope | FortiGate |
| Solution |
Consider an example where the local user name 'gene' was added to the Google LDAPS remote authentication group. IPSec VPN remote authentication with the user name fails.
The authentication settings:
Config user_ldap: GoogleLDAPS: server: "ldap.google.com"
config user_group: LDAPuser:
To get more information regarding the reason for authentication failure, run the following commands in the CLI:
diagnose test authserver ldap <LDAP server_name> <username> <password>
In this case, the remote authentication testing for the user name passed with no issues.
[2707] fnbamd_ldap_result-Result for ldap svr ldap.google.com(GoogleLDAPS) is SUCCESS
Duplicate the authentication failure issue with a dial-up VPN connection:
diagnose vpn ike log-filter src-addr4 <- Client IP (should be public IP if client dialup from the internet).
Note: In v7.4.0, the 'diagnose vpn ike log-filter src-addr4' command has been changed to 'diagnose vpn ike log-filter loc-addr4', and starting v7.4.1 it has been changed to 'diagnose vpn ike log filter loc-addr4'. For more details, check this link IPsec Tunnel (debugging IKE)
In the debug output below, the user name 'gene' failed local authentication.
gene:
The local user name 'sla' was not configured correctly in the group LDAPuser and will therefore be authenticated through Google LDAPS directly.
In this case, the local user name has a different password than the same remote user name in Google LDAPS. Remove the local user name 'gene' from the user group 'LDAPuser' for remote authentication to fix the issue. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.