Created on
06-25-2025
07:17 AM
Edited on
06-26-2025
12:36 AM
By
Jean-Philippe_P
| Description | This article describes how to handle a scenario where the user is unable to connect to the SSL VPN/IPsec VPN using 2FA when FortiTokens are assigned. |
| Scope | FortiGate, FortiToken Mobile. |
| Solution |
When checking the SSL VPN/IKE debugs, the logs will show 'Token check failed' even though the user is authenticated successfully using RADIUS/LDAP: 2025-06-24 12:55:03 [2354] handle_req-Token check failed, result -30113 'Token check failed' usually indicates the FortiToken is not activated.
diagnose fortitoken info FORTITOKEN DRIFT STATUS
To deactivate a FortiToken for the user, see Deactivating a FortiToken - FortiToken documentation. To assign FortiToken to a user:
To assign FortiToken to a local user via CLI:
config user local edit test_user -----------------> Set username. set passwd test1243 ---------------> Set a strong user password. set two-factor fortitoken set fortitoken FTKMOBXXXXXXXXXX ----------> Hit tab, the available token will populate. set email-to test_user@test.org ---------------> Enter user email. set status enable end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.