Good morning, everyone! I have a FortiGate model 100F, version 7.4.7. I configured an IPsec VPN on it for employees to connect via FortiClient. I created the FSSO connector, which brought the groups, and I created the LDAP connection (tested and validated). What happens is: in the VPN policy I created, when I add the group from AD, when I try to connect, it displays an error and won't connect. Looking at the logs, I saw an error called FNBAM_ERROR. What could this error be? Thank you.
Solved! Go to Solution.
Hey viisanches7,
I think there is some confusion as to how FSSO and VPN authentication work.
In particular:
-> FSSO is primarily a solution that collects login information from AD and shares that with FortiGate
-> there is a specific group type associated with FSSO
-> this may look like LDAP syntax, but is NOT a group that references the LDAP server as member!
LDAP group:
FSSO group:
In addition:
-> Depending on how you configured IPsec VPN (set the related user group in tunnel, or in policy), FortiGate may not be caching the user login from VPN.
-> IPSec VPN only works if you set a user group in EITHER the policy or the tunnel, but not both!
-> if you set the user group in tunnel, FortiGate will verify the credentials during tunnel setup, but not store the login details, and groups cannot be used in policies to enforce which user is allowed access to what resource.
You can find more details here: Technical Tip: A guide to Dial-Up IPSec VPN Authentication and Policy Matching
Also, relating to FSSO:
- as mentioned above, FSSO relies primarily on domain logins
-> FortiGate verifying user credentials for a VPN connection is NOT a domain login, even if it uses domain credentials!
- users connecting to VPN will not, by default, immediately appear in FSSO!
- there are ways around this (FortiGate can share the vpn logins to the Collector Agent via syslog, for example, and the collector Agent can turn them into FSSO sessions and share back to the FortiGate), but these are finicky to configure
-> VPN users will at some point perform some activity that counts as a domain login, and FSSO will pick up on them from that point onward, but not before
- depending on your VPN and policy configuration, your VPN users might not be able to reach domain controllers to actually perform domain logins, meaning FSSO would never pick up on those users
Essentially, there are two main potential issues:
1. Is your VPN authentication configured properly?
2. VPN logins do not immediately turn into FSSO sessions
Usually, VPN and FSSO are kept separate; FSSO for on-net users, and VPN-related rules and authentication for remote users, exactly because FSSO does not handle VPN logins particularly well due to its nature. There IS a FortiClient feature set (FSSO mobility agent) that lets FortiClient report user login and be turned into an FSSO login, but this requires a FortiAuthenticator with a specific additional license.
Cheers,
Deborah
Hey viisanches7,
I think there is some confusion as to how FSSO and VPN authentication work.
In particular:
-> FSSO is primarily a solution that collects login information from AD and shares that with FortiGate
-> there is a specific group type associated with FSSO
-> this may look like LDAP syntax, but is NOT a group that references the LDAP server as member!
LDAP group:
FSSO group:
In addition:
-> Depending on how you configured IPsec VPN (set the related user group in tunnel, or in policy), FortiGate may not be caching the user login from VPN.
-> IPSec VPN only works if you set a user group in EITHER the policy or the tunnel, but not both!
-> if you set the user group in tunnel, FortiGate will verify the credentials during tunnel setup, but not store the login details, and groups cannot be used in policies to enforce which user is allowed access to what resource.
You can find more details here: Technical Tip: A guide to Dial-Up IPSec VPN Authentication and Policy Matching
Also, relating to FSSO:
- as mentioned above, FSSO relies primarily on domain logins
-> FortiGate verifying user credentials for a VPN connection is NOT a domain login, even if it uses domain credentials!
- users connecting to VPN will not, by default, immediately appear in FSSO!
- there are ways around this (FortiGate can share the vpn logins to the Collector Agent via syslog, for example, and the collector Agent can turn them into FSSO sessions and share back to the FortiGate), but these are finicky to configure
-> VPN users will at some point perform some activity that counts as a domain login, and FSSO will pick up on them from that point onward, but not before
- depending on your VPN and policy configuration, your VPN users might not be able to reach domain controllers to actually perform domain logins, meaning FSSO would never pick up on those users
Essentially, there are two main potential issues:
1. Is your VPN authentication configured properly?
2. VPN logins do not immediately turn into FSSO sessions
Usually, VPN and FSSO are kept separate; FSSO for on-net users, and VPN-related rules and authentication for remote users, exactly because FSSO does not handle VPN logins particularly well due to its nature. There IS a FortiClient feature set (FSSO mobility agent) that lets FortiClient report user login and be turned into an FSSO login, but this requires a FortiAuthenticator with a specific additional license.
Cheers,
Deborah
User | Count |
---|---|
2551 | |
1356 | |
795 | |
646 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.