When FortiToken is used in a third-party IPsec client configuration, each user that has two-factor authentication enabled and configured must use the token password code when only a password is supported to gain access. This authentication using only a password is not supported when the password and token password code are sent in CHAP or MS-CHAP form, and the local user is authenticated using a remote server. This is because FortiOS is unable to extract back both the password and the token password code.Based on the quoted paragraph, I' m not sure if users' passwords+OTP is used in the password field or if the OTP is used exclusively instead of the users' regular passwords. In my case, the users' passwords are verified using LDAP. I' m also potentially interested in using certificates in lieu of passwords but still require the Fortitoken, if that' s possible. Thanks!
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Yes, you have the right format. I' m not sure why it' s not working for you. My setup on 4.3.5 is still working great. You do have an actual hardware token, right? It doesn' t work if you' re trying to send the code via e-mail (although this works fine for the SSL VPN).Hi nothingel, i have the same problem as kogan... Can you confirm that you can build up an IPSec tunnel between a FG and an iPad with the build-in VPN client? If so, can you send us an configuration example? Fortinet Support told me that this is not possible... Many thanks, Sylvia
edit " tun-dialup" set type dynamic set interface " wan1" set dhgrp 2 set keylife 3600 set peertype dialup set xauthtype auto set mode aggressive set mode-cfg enable set proposal aes256-sha1 set negotiate-timeout 15 set authusrgrp " IPsec-Xauth" set usrgrp " IPsec-PSKs" set ipv4-start-ip 10.0.0.1 set ipv4-end-ip 10.0.0.15 set dns-mode auto set domain " domain.com" set banner " This is the optional banner" set keepalive 60 set dpd-retryinterval 30 nextAnd here' s phase2 (yes, the names are the same, but it doesn' t matter)
edit " tun-dialup" set keepalive enable set phase1name " tun-dialup" set proposal aes256-sha1 set route-overlap allow set dhgrp 2 nextWith the config above, you' ll need two sets of users, one in the " IPsec-PSKs" group and another in the " IPsec-Xauth" group. The IPsec-PSKs group contains the individual keys used by each device. You could share a single key among all devices but I don' t recommend it beyond testing. The IPsec-Xauth group is the standard username/password which could be local users/passwords or a server-based backend like LDAP.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.