Created on
11-05-2024
10:43 PM
Edited on
06-11-2025
11:38 AM
By
Stephen_G
Description | This article describes how to fix the IPsec VPN SAML pass authentication but does not generate an IKE log. |
Scope | FortiGate v7.2, FortiClient v7.2. |
Solution |
IPsec VPN SAML-based authentication can be troubleshoot using ike and saml debugs as shown below:
diagnose vpn ike log-filter dst-addr4 x.x.x.x diagnose debug console timestamp enable diagnose debug application authd 60 diagnose debug application ike -1 diagnose debug application samld -1 diagnose debug application eap_proxy -1 diagnose debug enable
For 7.4.0 and above, there is a slight change in the command as shown below:
diagnose vpn ike log filter rem-addr4 x.x.x.x diagnose debug console timestamp enable diagnose debug application authd 60 diagnose debug application ike -1 diagnose debug application samld -1 diagnose debug application eap_proxy -1 diagnose debug enable
To stop debugging:
diagnose debug disable diagnose debug reset
The SAML log will be generated before ike, and group, username, URL and etc. attributes will be shown at the end of the SAML debug log, The Ike debug log begins as shown in the example below:
. . samld_send_common_reply [99]: Attr: 17, 31, magic=00070284969a10d4 samld_send_common_reply [95]: Attr: 10, 23, 'Username' 'XXX'
In case the IKE debug log is not showing right after the SAML debug log:
samld_send_common_reply [99]: Attr: 17, 31, magic=00070284969a10d4 samld_send_common_reply [95]: Attr: 10, 23, 'Username' 'XXX'
Run a packet capture on the outgoing interface and confirm that it is possible to see traffic from the remote peer. If not, make sure that IKE traffic on port 500/4500 is allowed in the network device connected upstream.
Packet capture can be run from the CLI or the GUI: In v7.2 and v7.4, diagnostics are available as an option instead of packet capture under network. Just select diagnostics and then select new packet capture.
CLI:
'Control+c' to stop.
If no traffic is visible on port 500/4500, then check with the upstream device if any of the ISPs on the remote side, as well as the Local ISP.
If the user is using the free version of FortiClient, it is possible to upgrade the FortiClient version from v7.2 to v7.4 to fix the issue.
Dialup IPsec VPN with SAML using an external browser for authentication is supported starting from FortiOS v7.6.1 as well as FortiClient (Windows & macOS) v7.2.5/v7.4.1 and (Linux) v7.4.3. (Related document: SAML-based authentication for FortiClient remote access dialup IPsec VPN clients )
Uncheck (or disable) 'Use external browser as user-agent for SAML user authentication' to resolve this issue. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.