On CLI, when a user tries to assigne the option ‘peer id from dialup group’ in the dial-up IPsec tunnel:
# config vpn ipsec phase1-interface
(phase1-interface) # edit <phase1 name>
(phase1 name) # set peertype dialup
(phase1 name) #set usrgrp <usergroup name>
Error: auth_user not a local user
node_check_object fail! for usrgrp <usergroup name>
value parse error before 'test'
Command fail. Return code -1
On GUI, an error '-1: Invalid length of value’ will be visible when a user tries to assign a user group to the option ‘'peer id from dialup group’'.
Solution: A user group can only be assigned/used in option ‘peer id from dialup group’ if every user in that group is locally created or the user group will have a Group type of ‘Firewall’.
My Problem is that the user group RADIUS I use is from the group type Firewall, and it doesn't work. The user group RADIUS has a remote group being a RADIUS-Server.
Is there no way to authenticate with the FortiGate, Client-to-Site IPsec VPNs with LDAP or RADIUS?
Solved! Go to Solution.
LDAP or RADIUS can be used if you utilize them for XAUTH (IKEv1) or EAP (IKEv2) authentication in IPsec.
peertype=dialup + usrgrp=<local-group> are used to effectively create a dynamic list of valid peer-id + PSK combinations. Since the PSK (taken from the local user's password) isn't sent directly, but is used to generate a hash for authentication, the FortiGate needs to have knowledge of what the PSK should be, and in practice LDAP/RADIUS cannot be used to request such information from the authentication server.
Hello @MG4 ,
According to that solution article, you can't use a remote group on your dial-up vpn configuration. You need to configure with a local user group.
LDAP or RADIUS can be used if you utilize them for XAUTH (IKEv1) or EAP (IKEv2) authentication in IPsec.
peertype=dialup + usrgrp=<local-group> are used to effectively create a dynamic list of valid peer-id + PSK combinations. Since the PSK (taken from the local user's password) isn't sent directly, but is used to generate a hash for authentication, the FortiGate needs to have knowledge of what the PSK should be, and in practice LDAP/RADIUS cannot be used to request such information from the authentication server.
Thank you for the Answer. I looked up the EAP authentication and found the article, 191040 that talks about a way to utilize RADIUS. I'm going to try it out and see if it works.
User | Count |
---|---|
2119 | |
1187 | |
770 | |
451 | |
345 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.