Fortinet white logo
Fortinet white logo

Administration Guide

Troubleshooting common issues

Troubleshooting common issues

To troubleshoot no visible SSL VPN menus or tunnel mode options in the GUI:

Enable the feature visibility in the GUI or CLI.

In the GUI:

  1. Go to System > Feature Visibility.
  2. In the Core Features section, enable SSL-VPN.
  3. Click Apply.

In the CLI:

config system settings
    set gui-sslvpn enable
end
To troubleshoot no visible SSL VPN web mode options in the GUI or CLI:
config system global
    set sslvpn-web-mode enable
end
To troubleshoot getting no response from the SSL VPN URL:
  1. Go to VPN > SSL-VPN Settings.
    1. Confirm that SSL VPN is enabled.
    2. Check the SSL VPN port assignment.
    3. Check the Restrict Access setting to ensure the host you are connecting from is allowed.
  2. Go to Policy > Firewall Policy.
    1. Check that the policy for SSL VPN traffic is configured correctly.
    2. Check the URL you are attempting to connect to. It should follow this pattern:
      https://<FortiGate IP>:<Port>
    3. Check that you are using the correct port number in the URL. Ensure FortiGate is reachable from the computer.
      ping <FortiGate IP>
    4. Check the browser has TLS 1.1, TLS 1.2, and TLS 1.3 enabled.
To troubleshoot FortiGate connection issues:
  1. Check the Release Notes to ensure that the FortiClient version is compatible with your version of FortiOS.
  2. FortiClient uses IE security setting, In IE Internet options > Advanced > Security, check that Use TLS 1.1 and Use TLS 1.2 are enabled.
  3. Check that SSL VPN ip-pools has free IPs to sign out. The default ip-poolsSSLVPN_TUNNEL_ADDR1 has 10 IP addresses.
  4. Export and check FortiClient debug logs.
    1. Go to File > Settings.
    2. In the Logging section, enable Export logs.
    3. Set the Log Level to Debug and select Clear logs.
    4. Try to connect to the VPN.
    5. When you get a connection error, select Export logs.
To troubleshoot SSL VPN hanging or disconnecting at 98%:
  1. A new SSL VPN driver was added to FortiClient 5.6.0 and later to resolve SSL VPN connection issues. If your FortiOS version is compatible, upgrade to use one of these versions.
  2. Latency or poor network connectivity can cause the login timeout on the FortiGate. In FortiOS 5.6.0 and later, use the following commands to allow a user to increase the SSL VPN login timeout setting.
    config vpn ssl settings
      set login-timeout 180 (default is 30)
      set dtls-hello-timeout 60 (default is 10)
    end
To troubleshoot tunnel mode connections shutting down after a few seconds:

This might occur if there are multiple interfaces connected to the Internet, for example, SD-WAN. This can cause the session to become “dirty”. To allow multiple interfaces to connect, use the following CLI commands.

If you are using a FortiOS 6.0.1 or later:

config system interface
  edit <name>
    set preserve-session-route enable
  next
end

If you are using a FortiOS 6.0.0 or earlier:

config vpn ssl settings
   set route-source-interface enable
end
To troubleshoot users being assigned to the wrong IP range:
  1. Go to VPN > SSL-VPN Portals and VPN > SSL-VPN Settings and ensure the same IP Pool is used in both places.

    Using the same IP Pool prevents conflicts. If there is a conflict, the portal settings are used.

To troubleshoot slow SSL VPN throughput:

Many factors can contribute to slow throughput.

This recommendation tries to improve throughput by using the FortiOS Datagram Transport Layer Security (DTLS) tunnel option, available in FortiOS 5.4 and above.

DTLS allows SSL VPN to encrypt traffic using TLS and uses UDP as the transport layer instead of TCP. This avoids retransmission problems that can occur with TCP-in-TCP.

FortiClient 5.4.0 to 5.4.3 uses DTLS by default. FortiClient 5.4.4 and later uses normal TLS, regardless of the DTLS setting on the FortiGate.

To use DTLS with FortiClient:

  1. Go to File > Settings and enable Preferred DTLS Tunnel.

To enable DTLS tunnel on FortiGate, use the following CLI commands:

config vpn ssl settings
  set dtls-tunnel enable
end

Troubleshooting common issues

Troubleshooting common issues

To troubleshoot no visible SSL VPN menus or tunnel mode options in the GUI:

Enable the feature visibility in the GUI or CLI.

In the GUI:

  1. Go to System > Feature Visibility.
  2. In the Core Features section, enable SSL-VPN.
  3. Click Apply.

In the CLI:

config system settings
    set gui-sslvpn enable
end
To troubleshoot no visible SSL VPN web mode options in the GUI or CLI:
config system global
    set sslvpn-web-mode enable
end
To troubleshoot getting no response from the SSL VPN URL:
  1. Go to VPN > SSL-VPN Settings.
    1. Confirm that SSL VPN is enabled.
    2. Check the SSL VPN port assignment.
    3. Check the Restrict Access setting to ensure the host you are connecting from is allowed.
  2. Go to Policy > Firewall Policy.
    1. Check that the policy for SSL VPN traffic is configured correctly.
    2. Check the URL you are attempting to connect to. It should follow this pattern:
      https://<FortiGate IP>:<Port>
    3. Check that you are using the correct port number in the URL. Ensure FortiGate is reachable from the computer.
      ping <FortiGate IP>
    4. Check the browser has TLS 1.1, TLS 1.2, and TLS 1.3 enabled.
To troubleshoot FortiGate connection issues:
  1. Check the Release Notes to ensure that the FortiClient version is compatible with your version of FortiOS.
  2. FortiClient uses IE security setting, In IE Internet options > Advanced > Security, check that Use TLS 1.1 and Use TLS 1.2 are enabled.
  3. Check that SSL VPN ip-pools has free IPs to sign out. The default ip-poolsSSLVPN_TUNNEL_ADDR1 has 10 IP addresses.
  4. Export and check FortiClient debug logs.
    1. Go to File > Settings.
    2. In the Logging section, enable Export logs.
    3. Set the Log Level to Debug and select Clear logs.
    4. Try to connect to the VPN.
    5. When you get a connection error, select Export logs.
To troubleshoot SSL VPN hanging or disconnecting at 98%:
  1. A new SSL VPN driver was added to FortiClient 5.6.0 and later to resolve SSL VPN connection issues. If your FortiOS version is compatible, upgrade to use one of these versions.
  2. Latency or poor network connectivity can cause the login timeout on the FortiGate. In FortiOS 5.6.0 and later, use the following commands to allow a user to increase the SSL VPN login timeout setting.
    config vpn ssl settings
      set login-timeout 180 (default is 30)
      set dtls-hello-timeout 60 (default is 10)
    end
To troubleshoot tunnel mode connections shutting down after a few seconds:

This might occur if there are multiple interfaces connected to the Internet, for example, SD-WAN. This can cause the session to become “dirty”. To allow multiple interfaces to connect, use the following CLI commands.

If you are using a FortiOS 6.0.1 or later:

config system interface
  edit <name>
    set preserve-session-route enable
  next
end

If you are using a FortiOS 6.0.0 or earlier:

config vpn ssl settings
   set route-source-interface enable
end
To troubleshoot users being assigned to the wrong IP range:
  1. Go to VPN > SSL-VPN Portals and VPN > SSL-VPN Settings and ensure the same IP Pool is used in both places.

    Using the same IP Pool prevents conflicts. If there is a conflict, the portal settings are used.

To troubleshoot slow SSL VPN throughput:

Many factors can contribute to slow throughput.

This recommendation tries to improve throughput by using the FortiOS Datagram Transport Layer Security (DTLS) tunnel option, available in FortiOS 5.4 and above.

DTLS allows SSL VPN to encrypt traffic using TLS and uses UDP as the transport layer instead of TCP. This avoids retransmission problems that can occur with TCP-in-TCP.

FortiClient 5.4.0 to 5.4.3 uses DTLS by default. FortiClient 5.4.4 and later uses normal TLS, regardless of the DTLS setting on the FortiGate.

To use DTLS with FortiClient:

  1. Go to File > Settings and enable Preferred DTLS Tunnel.

To enable DTLS tunnel on FortiGate, use the following CLI commands:

config vpn ssl settings
  set dtls-tunnel enable
end