- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Cisco Duo with Fortigate IPSec VPN problem
I followed the document to set up Duo for Fortigate’s SSL VPN in my client environment.
Everything works as expected but the problem is that the connection still works even before I receive the push notification on my cell. And even if I decline the connection, it still works fine…
So the radius server configuration works fine in the Fortigate, but the VPN connection gets established without me having to approve it beforehand.
I tried to create a LAB environment using Fortigate-VM and followed the same step to integrate DUO, then it works, and no issue. So I think maybe some missing or wrong config on Fortigate
Does anyone know this problem?
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You should test your radius connection against the duo server with a valid user account. You should not get a successful connection status and user credentials status if the duo push is not acknowledged. This would point to a duo configuration error for the duo radius client setup.
You should also check your remoteauthtimeout value in the global configuration.
 
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The RADIUS test was successful, and at the same time, my cell receive the DUO 2FA push.
The parameter of remoteauthtimeout is 60.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
do you get the successful test without using the duo push?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Because the RADIUS is DUO, so if I test RADIUS, my cell will receive the push message.
If I chose reject or did nothing, the test will be invalid.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If your radius auth fails without you doing anything with duo then the radius and duo back end authentication are good.
It could then point to your group or user configuration. It could also point to your ssl vpn portal/realm or settings.
possibly you aren't mapping the radius user/group in ssl vpn settings and you allow all other users to the portal.
You could post some configurations or screen shots of how you have everything configured.
- Radius server
- user/group
- ssl vpn portal
- ssl vpn realm
- ssl vpn settings.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, I agree
But for now, I still have not found the root cause for which config was missing or wrong.
Thank you for your explanation ~
