


If you are using a remote server you can troubleshoot this communication with the following KB articles: Radius and LDAP. Please check user/usergroup/portal and firewall policy configuration on the FortiGate. 80% – at this stage the username and password is verified.And this KB article explains how to check the TLS versions on a windows client.

This KB article describes how to check the TLS versions for SSLVPN on the FortiGate. If the client is using CRL or OCSP make sure that the FortiGate certificate can be checked against those protocols.Īdditionally, it is possible that the TLS versions of Client and FortiGate are not matching. Make sure that this popup window is not hidden behind other windows. In this case the user is shown a popup window to confirm the validity of the certificate. If you are using the default FortiGate certificate, the client is probably not trusting this certificate. 40% – there is an issue with the certificates or the TLS negotiation.Check, if the TLS version that’s in use by the FortiGate is enabled on your client. If this message is shown, there is a mismatch in the TLS version. 31% – this percentage is also shown as Error -5029.

Double-check that the FortiClient configuration has set the correct IP and port of the Fortigate. Verify that the client is connected to the internet and can reach the FortiGate. 10% – there is an issue with the network connection to the FortiGate.If the negotiation of SSLVPN stops at a specific percentage: Nevertheless problems may occur while establishing or using the SSLVPN connection. Configuring SSLVPN with FortiGate and FortiClient is pretty easy.
