Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
NowhereMan
New Contributor

PPPoP WAN Adapter not recognized over Windows Server 2012 R2 Datacenter Edition

Hi everyone! I' ve a server with Windows Server 2012 R2 Datacenter Edition. I' ve downloaded the last version of FortiClient. After FortiClient installation, it creates fortissl connection but it has status " Unavailable - device missing" Apparently it is not recognizing the PPPop Wan Adapter properly. I also tried some other versions (4.0 and 4.2) Anyone could help me with this? Thanks in advance.
9 REPLIES 9
Chris_Lin_FTNT

This is a known issue for the current SSL VPN on Windows Server 2012 R2.
NowhereMan
New Contributor

Is there a planned hotfix for this issue?
NowhereMan
New Contributor

Is there any news about this? Sorry, I can' t downgrade my server and I need to start using FortiClient asap. Thanks in advance.
Istvan_Takacs_FTNT

Enable debug-level logging in the client " File -> Properties" I think, and also enable debug level logging on the FGT: # diagnose debug application sslvpn -1 # diagnose debug enable and start another session than when it fails, have a look at both logs from client and server (from client I mean the FortiClient logs, but also the Windows Application and System event logs. You might be able to find an error that you can google for. Alternatively just log a ticket with Fortinet Support to investigate. If you found an error and upload it here, might get more help then just by referring to an issue without any details. Don' t forget to # diagnose debug disable # diagnose debug reset
NowhereMan
New Contributor

Thanks Istvan for helping me. I was googling about the issue and it has to be with Windows Server R2 PPPoP WAN Adapter apparently. These are the logs I' ve collected: Windows 2012 R2 Event Viewer, while dialing: Info: Log Name: Application Source: RasClient Date: 9/2/2014 8:58:00 AM Event ID: 20221 Task Category: None Level: Information Keywords: Classic User: N/A Computer: AAA000XX1 Description: CoId={983E9C24-06DF-40FA-9B15-01D769BED72D}: The user SYSTEM has started dialing a Dial-up connection using a all-user connection profile named fortissl. The connection settings are: Dial-in User = a VpnStrategy =Not Applicable DataEncryption = None PrerequisiteEntry = AutoLogon = No UseRasCredentials = Yes Authentication Type = PAP/CHAP/MS-CHAPv2 Ipv4DefaultGateway = No Ipv4AddressAssignment = By Server Ipv4DNSServerAssignment = By Server Ipv6DefaultGateway = No Ipv6AddressAssignment = By Server Ipv6DNSServerAssignment = By Server IpDnsFlags = Register primary domain suffix IpNBTEnabled = Yes UseFlags = Private Connection ConnectOnWinlogon = No. Event Xml: <Event xmlns=" http://schemas.microsoft.com/win/2004/08/events/event" > <System> <Provider Name=" RasClient" /> <EventID Qualifiers=" 0" >20221</EventID> <Level>4</Level> <Task>0</Task> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime=" 2014-09-02T11:58:00.000000000Z" /> <EventRecordID>21556</EventRecordID> <Channel>Application</Channel> <Computer>AAA000XX1</Computer> <Security /> </System> <EventData> <Data>{983E9C24-06DF-40FA-9B15-01D769BED72D}</Data> <Data>SYSTEM</Data> <Data>Dial-up</Data> <Data>all-user</Data> <Data>fortissl</Data> <Data> Dial-in User = a VpnStrategy =Not Applicable DataEncryption = None PrerequisiteEntry = AutoLogon = No UseRasCredentials = Yes Authentication Type = PAP/CHAP/MS-CHAPv2 Ipv4DefaultGateway = No Ipv4AddressAssignment = By Server Ipv4DNSServerAssignment = By Server Ipv6DefaultGateway = No Ipv6AddressAssignment = By Server Ipv6DNSServerAssignment = By Server IpDnsFlags = Register primary domain suffix IpNBTEnabled = Yes UseFlags = Private Connection ConnectOnWinlogon = No</Data> </EventData> </Event> Error: Log Name: Application Source: RasClient Date: 9/2/2014 8:58:00 AM Event ID: 20227 Task Category: None Level: Error Keywords: Classic User: N/A Computer: AAA000XX1 Description: CoId={983E9C24-06DF-40FA-9B15-01D769BED72D}: The user SYSTEM dialed a connection named fortissl which has failed. The error code returned on failure is 633. Event Xml: <Event xmlns=" http://schemas.microsoft.com/win/2004/08/events/event" > <System> <Provider Name=" RasClient" /> <EventID Qualifiers=" 0" >20227</EventID> <Level>2</Level> <Task>0</Task> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime=" 2014-09-02T11:58:00.000000000Z" /> <EventRecordID>21557</EventRecordID> <Channel>Application</Channel> <Computer>AAA000XX1</Computer> <Security /> </System> <EventData> <Data>{983E9C24-06DF-40FA-9B15-01D769BED72D}</Data> <Data>SYSTEM</Data> <Data>fortissl</Data> <Data>633</Data> </EventData> </Event> FortiClient log: 9/2/2014 8:57:00 AM Notice VPN id=96573 user=Administrator msg=" VPN before logon was disabled" 9/2/2014 8:57:00 AM Notice ESNAC id=96951 user=Administrator msg=" Endpoint control policy synchronization was enabled" 9/2/2014 8:57:00 AM Notice Console id=96880 user=Administrator msg=" User disabled WAN Acceleration" 9/2/2014 8:57:00 AM Warning SSOMA id=96982 user=Administrator msg=" Single Sign-On Mobility Agent was disabled" 9/2/2014 8:57:00 AM Warning Console id=96840 user=Administrator msg=" Fortiproxy is disabled" 9/2/2014 8:57:04 AM Debug Scheduler GUI change event 9/2/2014 8:57:06 AM Debug Scheduler handle_processtermination() called 9/2/2014 8:57:06 AM Debug Scheduler child process terminates normally 9/2/2014 8:57:42 AM Debug Scheduler GUI change event 9/2/2014 8:57:45 AM Debug Scheduler (repeated 2 times in last 4 sec) GUI change event 9/2/2014 8:57:48 AM Debug Scheduler handle_processtermination() called 9/2/2014 8:57:48 AM Debug Scheduler child process terminates normally 9/2/2014 8:57:57 AM Debug VPN FortiSslvpn: proxy flag: 1 proxy:NULL 9/2/2014 8:57:57 AM Debug VPN FortiSslvpn: CSvlauncherDlg::OnConnect(): Before check server TCP port. *********************** 9/2/2014 8:57:57 AM Debug VPN FortiSslvpn: Init:ConnectNamedPipe(): Wait(hEventOverLapped) OK. 9/2/2014 8:57:57 AM Debug VPN FortiSslvpn: before ConnectNamedPipe 9/2/2014 8:57:57 AM Debug VPN FortiSslvpn: Init:ConnectNamedPipe(): rc=0, err=997 9/2/2014 8:57:57 AM Debug VPN FortiSslvpn: _ReceiveMessage: (000002A0) 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: fortissl_connect() called 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: fortissl is not active 9/2/2014 8:57:59 AM Notice VPN date=2014-09-02 time=08:57:58 logver=1 type=traffic level=notice sessionid=33546112 hostname=AAA000XX1 uid=84C53F3BC32841EFAD81C7D1DA34E914 devid=FCT8003730508634 fgtserial=N/A regip=N/A srcname=sslvpn srcip=N/A srcport=N/A direction=outbound remoteip=190.7.60.66 remotename=N/A remoteport=10443 url=N/A user=N/A proto=ssl rcvdbyte=2004538417 sentbyte=0 utmaction=passthrough utmevent=vpn threat=connect vd=N/A 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: Resolve server ' 190.7.60.66(10443)' = 190.7.60.66:10443/[0000:0000:0000:0000:0000:0000:0000:0000]:0. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: Setting route to 190.7.60.66 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: on 192.168.1.1 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: get_interface_metric() called, local index:12 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: metric: 20 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: CreateIpForwardEntry(dest=423c07be mask=ffffffff next=0101a8c0) 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3076: IPv4SetRouteToFgt(005B6210, 005B6250)=0 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: tunnel_thread() called 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: * tunnel opened 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: SSL library init ... 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 4064: ras_thread() called 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: SSL library loaded 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: SSL authentification using files: C:\Program Files (x86)\Fortinet\FortiClient\fortisslcacert.pem C:\Program Files (x86)\Fortinet\FortiClient\fortisslclient.crt C:\Program Files (x86)\Fortinet\FortiClient\fortisslclient.key 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: * SSL OK 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: * tunnel pending ... 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: info: tunnel_start_to_fgt(005B1168) called. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: connecting tunnel (0) ... 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: TunnelStart: Resolve ' 190.7.60.66(10443)' = 190.7.60.66:10443/[0000:0000:0000:0000:0000:0000:0000:0000]:0. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: connecting TCP ... 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: TCP_NODELAY value:1 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: WSAConnect(1,0), r=-1, e=10035. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: Socket event signaled! 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: connecting SSL ... 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: call back called! 9/2/2014 8:57:58 AM Debug VPN (repeated 1 times in last 0 sec) FortiSslvpn: 2280: call back called! 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: SSL connected 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: [DoXmlConfig]... 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: info: SslBlockingWrite(005E01D8, 01976D7C, 236, 10000) called. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: [DoXmlConfig]: GET remote/fortisslvpn_xml ... (send 236 of 236 bytes): GET /remote/fortisslvpn_xml HTTP/1.1 Host: sslvpn Cookie: SVPNCOOKIE=o3ESvgf/dwrPDYDIS+lcUJx3FEZetRZsr/eggNXzBUniBdFhNGit0cVwHszFhfW9%0apYwHjK5Cx07iJfzItgDtAe9qyhPHiXgk1TJxag/dbV1IeSQHqVu/htlXvweCByzT%0aPNJiZCpTo9ayOxxRCGeOYg==%0a ---- . 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: info: SslBlockingRead(005E01D8, 01974B7C, 8191, 10000) called. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: [DoXmlConfig]: GET remote/fortisslvpn_xml ... (received 1518 bytes): HTTP/1.1 404 Not Found Date: Tue, 02 Sep 2014 11:58:15 GMT Transfer-Encoding: chunked Content-Type: text/html <HTML> <HEAD> <META http-equiv=" Content-Type" content=" text/html; charset=iso-8859-1" > <META HTTP-EQUIV=" Pragma" CONTENT=" no-cache" > <link href=" /style.css?q=15732" rel=" stylesheet" type=" text/css" > </head> <body class=" main" > <table class=" container" cellpadding=" 0" cellspacing=" 0" > <tr> <td><table class 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: [DoXmlConfig]: Xml= <HTML> <HEAD> <META http-equiv=" Content-Type" content=" text/html; charset=iso-8859-1" > <META HTTP-EQUIV=" Pragma" CONTENT=" no-cache" > <link href=" /style.css?q=15732" rel=" stylesheet" type=" text/css" > </head> <body class=" main" > <table class=" container" cellpadding=" 0" cellspacing=" 0" > <tr> <td><table class=" dialog" width=300 align=" center" cellpadding=" 0" cellspacing=" 0" > <tr> <td><table class=" header" cellpadding=" 0" cellspacing=" 0" > <tr> <td>Error</td> </tr> </table> 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: [DoLicCheck]... 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: info: SslBlockingWrite(005E01D8, 01976DBC, 710, 10000) called. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: [DoLicCheck]: GET /remote/licensecheck ... (usr=axxon, send 710 of 710 bytes): GET /remote/licensecheck HTTP/1.1 Host: sslvpn Cookie: SVPNCOOKIE=o3ESvgf/dwrPDYDIS+lcUJx3FEZetRZsr/eggNXzBUniBdFhNGit0cVwHszFhfW9%0apYwHjK5Cx07iJfzItgDtAe9qyhPHiXgk1TJxag/dbV1IeSQHqVu/htlXvweCByzT%0aPNJiZCpTo9ayOxxRCGeOYg==%0a FCC_License: 5645523D310A4643545645523D352E322E302E303539310A5549443D38344335334633424333323834314546414438314337443144413334453931340A49503D3136392E3235342E3135332E3132360A4D41433D 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: info: SslBlockingRead(005E01D8, 01973D3C, 8191, 10000) called. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: [DoLicCheck]: GET /remote/licensecheck ... (received 1518 bytes): HTTP/1.1 404 Not Found Date: Tue, 02 Sep 2014 11:58:15 GMT Transfer-Encoding: chunked Content-Type: text/html <HTML> <HEAD> <META http-equiv=" Content-Type" content=" text/html; charset=iso-8859-1" > <META HTTP-EQUIV=" Pragma" CONTENT=" no-cache" > <link href=" /style.css?q=15732" rel=" stylesheet" type=" text/css" > </head> <body class=" main" > <table class=" container" cellpadding=" 0" cellspacing=" 0" > <tr> <td><table class=" d 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: ===>send to login, ret=251 buf=GET /remote/sslvpn-tunnel?dns0=192.168.1.1 HTTP/1.1 Host: sslvpn Cookie: SVPNCOOKIE=o3ESvgf/dwrPDYDIS+lcUJx3FEZetRZsr/eggNXzBUniBdFhNGit0cVwHszFhfW9%0apYwHjK5Cx07iJfzItgDtAe9qyhPHiXgk1TJxag/dbV1IeSQHqVu/htlXvweCByzT%0aPNJiZCpTo9ayOxxRCGeOYg==%0a 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: WdcDisableAndStopDnsCacheService(): Tid=3944 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 2280: info: ssl_connect -> Set XmlConfig OK. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 4064: info: ras_loop(), XmlConfig OK. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3944: WdcConfigDnsCacheServiceEnabled(0) called. 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3944: WdcConfigDnsCacheServiceEnabled(0): WdcsConfig=0 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 3944: DnsCacheServiceStartType = 2 9/2/2014 8:57:59 AM Debug VPN FortiSslvpn: 4064: RasSetEntryProperties disable default remote gateway 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: g_dwKeepRunningFlag = 0. 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2464: monitor_thread() called 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2464: register_route_change_event_ipv4() called 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3076: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3076: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3076: fortissl is not active 9/2/2014 8:58:00 AM Notice VPN date=2014-09-02 time=08:57:59 logver=1 type=traffic level=notice sessionid=33546112 hostname=AAA000XX1 uid=84C53F3BC32841EFAD81C7D1DA34E914 devid=FCT8003730508634 fgtserial=N/A regip=N/A srcname=sslvpn srcip=N/A srcport=N/A direction=outbound remoteip=190.7.60.66 remotename=N/A remoteport=10443 url=N/A user=axxon proto=ssl rcvdbyte=4294967296 sentbyte=0 utmaction=passthrough utmevent=vpn threat=disconnect vd=N/A 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3704: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3704: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3704: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3704: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3704: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 3704: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 4064: Ras : dialing fortissl 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2972: rasfunc error: 0:633 9/2/2014 8:58:00 AM Error VPN FortiSslvpn: 4064: Ras : connection to fortissl failed : 0:0: 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 4064: before calling RasHangUp() 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 4064: after RasHangUp() called 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 4064: RasGetConnectStatus result:6 count:0 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: no active connection 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2820: bytes sent:0 bytes recvd:0 [tunnel] 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 4064: RAS thread terminated 9/2/2014 8:58:00 AM Debug VPN FortiSslvpn: 2464: ras_thread quit 9/2/2014 8:58:02 AM Debug VPN FortiSslvpn: 2464: waiting for tunnel thread ... 9/2/2014 8:58:06 AM Debug VPN FortiSslvpn: 2464: stopping tunnel thread 9/2/2014 8:58:06 AM Debug VPN FortiSslvpn: 2464: tunnel_close() called 9/2/2014 8:58:06 AM Debug VPN FortiSslvpn: 2464: sock_close() called:864 9/2/2014 8:58:06 AM Debug VPN FortiSslvpn: 2464: Monitor thread terminated 9/2/2014 8:58:23 AM Debug VPN FortiSslvpn: 2820: fortissl_getstatus(2129448) called 9/2/2014 8:58:53 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129574) called 9/2/2014 8:59:06 AM Debug VPN FortiSslvpn: 3456: WdcConfigDnsCacheServiceEnabled(1) called. 9/2/2014 8:59:06 AM Debug VPN FortiSslvpn: 3456: WdcConfigDnsCacheServiceEnabled(1): WdcsConfig=1 9/2/2014 8:59:24 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129634) called 9/2/2014 8:59:54 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129694) called 9/2/2014 9:00:04 AM Notice Update id=96823 msg=" Checking for updates." 9/2/2014 9:00:04 AM Debug Update Update task is called with dwSession=-1 9/2/2014 9:00:04 AM Debug Update forticlient.fortinet.net 9/2/2014 9:00:04 AM Debug Update start_update_thread() called 9/2/2014 9:00:04 AM Debug Update Impersonated=0 9/2/2014 9:00:04 AM Debug Update update started... 9/2/2014 9:00:04 AM Debug Update update process sending request: 00000000FSCI00000000000000000000 9/2/2014 9:00:04 AM Debug Update update process sending request: 00000000FDNI00000000000000000000 9/2/2014 9:00:04 AM Debug Update update process sending request: 01000000FECT00000000000000000000 9/2/2014 9:00:04 AM Debug Update update process sending request: 05002000FVEN00800052009999999999 9/2/2014 9:00:04 AM Debug Update update process sending request: 05002000FCBN00000000009999999999 9/2/2014 9:00:04 AM Debug Update updatetask get virus info file failed 9/2/2014 9:00:05 AM Debug Update update process received object(1 of 3): FCPR 9/2/2014 9:00:05 AM Debug Update update process received object(2 of 3): FDNI 9/2/2014 9:00:05 AM Debug Update update process received object(3 of 3): FECT 9/2/2014 9:00:05 AM Debug Update update done 9/2/2014 9:00:05 AM Debug Update update thread exit 9/2/2014 9:00:05 AM Debug Update No update is available. 9/2/2014 9:00:05 AM Debug Scheduler GUI change event 9/2/2014 9:00:05 AM Debug Scheduler FortiTrayApp : Received WM_USER_UPDATE_SUCCESS message, lParam=0x1 9/2/2014 9:00:07 AM Debug Scheduler handle_processtermination() called 9/2/2014 9:00:07 AM Debug Scheduler child process terminates normally 9/2/2014 9:00:24 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129756) called 9/2/2014 9:00:54 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129816) called 9/2/2014 9:01:24 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129876) called 9/2/2014 9:01:55 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129936) called 9/2/2014 9:02:25 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2129996) called 9/2/2014 9:02:55 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130056) called 9/2/2014 9:03:25 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130116) called 9/2/2014 9:03:55 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130176) called 9/2/2014 9:04:26 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130236) called 9/2/2014 9:04:56 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130296) called 9/2/2014 9:05:26 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130356) called 9/2/2014 9:05:56 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130416) called 9/2/2014 9:06:26 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130476) called 9/2/2014 9:06:57 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130536) called 9/2/2014 9:07:27 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130596) called 9/2/2014 9:07:57 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130656) called 9/2/2014 9:08:27 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130716) called 9/2/2014 9:08:49 AM Debug VPN FortiSslvpn: 3076: fortissl_disconnect() called 9/2/2014 9:08:51 AM Debug VPN FortiSslvpn: 3076: tunnel_close() called 9/2/2014 9:08:51 AM Debug VPN FortiSslvpn: 3076: sock_close() called:-1 9/2/2014 9:08:51 AM Debug VPN FortiSslvpn: SSL VPN Tunnel is Disconnected ********* 9/2/2014 9:08:58 AM Debug VPN FortiSslvpn: 3704: fortissl_getstatus(2130780) called Thanks in advance for any clue.
NowhereMan
New Contributor

Reading the Administration guide for 5.2.0 and 5.2.1 I' ve noticed that in the latter they don' t mention FC support for Windows 2012 R2 while it was referenced in the former.
kolawale_FTNT

The FortiClient development team is working on a re-write of the SSL VPN backend implementation. This may take some time, as it competes with other projects. Probably two to six months from now. It is difficult to know at this point. Consider using IPsec VPN until the SSL VPN is working again on Windows Server 2012 R2.
Istvan_Takacs_FTNT

Right, the infamous error 633. If you search for it in Google, you can find many complaining about this issue, not only with Fortinet, but other SSL VPN products on Windows. Even Microsoft has a few KBs published about how to fix the problem. Here' s one for Win 2003. Not the same, but might worth to check the solution. " Error 633 - the modem (or other connecting device) is already in use" error message when you try to establish a VPN connection in Windows Server 2003 http://support.microsoft.com/kb/885959 I' ve seen it happening on Windows 8.1, that is pretty close to 2012. In my case the following solution fixed the issue: http://social.technet.microsoft.com/Forums/windows/en-US/427f8be7-941a-4e78-bf21-f94a257b3549/ras-error-720-when-establishing-modem-connection
NowhereMan
New Contributor

Thanks kolawale and Istvan for your prompt reply. Istvan, I' ve tried the Unistall/Reinstall Wan Miniport before with any luck. And, at this point, I don' t think it has to be with Reserved ports on TCP. All I can see is that the PPPoP adapter is not recognized when you create a connection. From kolawale post, I have no other option than wait. Thank you again for your attention to this matter.
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors