Created on ‎11-13-2022 04:32 AM Edited on ‎09-17-2024 07:47 AM By Stephen_G
Description |
This article describes how to solve some of the error messages that can be encountered when using IKEv2 and a RADIUS server:
|
Scope | FortiGate. |
Solution |
Error - gw validation failed.
Solution:
For example:
Error - EAP response is empty.
Explanation.
This error message appears when there is no user group defined in the IPsec tunnel for authentication.
Solution.
If required, instead of applying the user group in the VPN settings, it's also possible to apply it to a firewall policy.
The firewall policy will look like this:
To unset the group from the IPsec VPN settings: conf vpn ipsec phase1-interface edit <VPN_Name> unset authusrgrp end
Related article: Technical Tip: IKEv2 dialup IPsec tunnel with Radius server authentication and FortiClient
Error:
EAP 94840547 pending EAP 94840547 result 1 EAP failed for user "lovepreet"
If it is authenticated against the radius server, then this error will be encountered.
Troubleshooting.
diag debug console timestamp enable (showing timestamps on the debug output)
Focus on the response code: This one means the RADIUS server denied the request:
0: Success 1: Deny 2: Challenged (password renewal or token is needed) 3: unknown 4: Pending 5: Error 6: Framed IP Conflict 7: Token code is required 8: Need another token due to the previous one is out of sync 9: Response Buffer is too small 10: Authentication time out 11: Max Concurrent authentication sessions are reached 12: Token code is already used.
Related article: Technical Tip: Radius authentication troubleshooting
The reason this is happening is that the credentials used for authenticating against other schemes such as mschap2 on the NPS in window AD are not accepted for this example.
diagnose test authserver radius <radius server_name> <authentication scheme><username> <password>
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.