Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Pauta
New Contributor

VPN IPSEC IKE (1 or 2) certificate-based authentication does not work with Forticlient VPN

Hello everyone,

I'm having the following problem: I'm migrating configurations from an ASA with an SSL-based VPN that uses certificates to authenticate users (certificate-based authentication). I've tried to migrate this to a FortiGate 100F running Windows 7.6.4, which uses IPsec with iKE (version 1 or version 2), but I haven't been able to get it to work, even after configuring both the FortiGate and FortiClient VPN (the free version without EMS).

After much trial and error, I concluded that when using FortiClient VPN, the certificate only works for Phase 1 authentication of IPSec, essentially replacing the IPSec secret. However, for EAP or XAUTH (Phase 2), it uses the user's credentials and password, not the certificate provided in Phase 1.

Can anyone tell me if there's a way to perform certificate-based authentication (without the user entering a username or password)? Or is my conclusion (previous paragraph) definitive, and therefore impossible?

THANKS

2 REPLIES 2
funkylicious
SuperUser
SuperUser

hi,

in this (below) previous thread, i posted some working IPsec VPN with machine/client based cert configuration.

see if any of them work for you.

 

https://community.fortinet.com/t5/Support-Forum/IPsec-IKEv2-Dialup-using-LDAP-Machine-Cert-authentic... 

"jack of all trades, master of none"
"jack of all trades, master of none"
Shyy
New Contributor II

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors