Get the inside scoop with LoginTC and learn about relevant security news and insights.
December 17, 2025 •

Fortinet has signaled a clear direction: organizations should be transitioning off SSL VPN and onto IPsec-based VPNs, specifically IKEv2. This shift aligns with broader industry recommendations around stronger encryption, standardized negotiation, and reduced attack surface.
For many customers, though, the technical transition raises a tough practical question: How do you enforce MFA for Fortinet IPsec VPN?
A surprising number of MFA products weren’t built with IPsec workflows in mind. Many rely heavily on browser-based redirects, proprietary SAML hooks, or embedded SSL VPN login portals. Customers need an MFA solution that matches the new VPN architecture exactly.
LoginTC MFA for Fortinet is one of the platforms that fully supports this model today, and with Fortinet’s roadmap shifting, that support matters more than ever.
In this post, we’ll explore how to deploy MFA for IPSec VPNs with IKEv2.
A recent FortiOS release officially deprecated Fortinet SSL VPN tunnel mode in favor of more robust, high-throughput options. Some of the key reasons for this include:
As of FortiOS 7.6.3, any existing SSL tunnel-mode configurations will not carry over. Upgrading without a migration plan risks immediate disruption for remote users.
If your organization leverages SSL VPN tunnel mode together with MFA, the removal introduces two main challenges:
1. Configuration Breaks
Migrating to IPsec means replacing your Phase 1/Phase 2 SSL profiles. Any existing MFA triggers tied to SSL tunnel logins will need to be reconfigured or rebuilt.
2. User Experience Shift
SSL tunnel-mode clients often handle authentication and tunnel setup in one flow. Switching to IPsec can introduce complexity for end users if MFA is not tightly integrated into the new connection workflow.
Ensuring continuity of MFA prompts and a seamless user experience is critical. Without it, you risk weakening user adoption, increasing help-desk tickets, and potentially exposing your network to unauthorized access.
Yes, some MFA solutions enable second factor authentication with IPSec VPNs, including LoginTC. LoginTC’s approach is intentionally different as it enforces MFA at the RADIUS layer, where Fortinet IPsec actually performs user authentication. That means:
If your environment uses any of the following Fortinet configurations, LoginTC works cleanly with them:
config vpn ipsec phase1-interface
This makes LoginTC a strong fit for deployments where SSL VPN is being deprecated and the organization wants to preserve MFA without rearchitecting everything else.
Once you’ve committed to moving off SSL VPN, the next step is building a deployment plan that preserves reliability, minimizes user disruption, and ensures your MFA layer is fully compatible with IPsec (IKEv1/IKEv2). Because IPsec doesn’t expose a browser page or inline MFA prompt, all enforcement must occur at the RADIUS layer. That means your plan needs to cover authentication flow, network path, timeout behavior, and policy logic with precision.
Below is a framework you can use when designing an MFA deployment for Fortinet IPsec VPN with LoginTC.
Start by documenting exactly how your FortiGate is performing authentication after the IKE handshake. Fortinet typically uses:
Your goal is to place MFA at the RADIUS authentication step. LoginTC inserts cleanly here.

Because LoginTC enforces MFA during the RADIUS transaction, the design doesn’t require modifying IPsec client configurations or prompting users with a web redirect.
Both LoginTC Cloud and LoginTC Managed (on-prem) can support IPsec VPN authentication. Your deployment architecture depends on:
Typical locations for the LoginTC Connector include:
For cloud deployments, ensure outbound connectivity to LoginTC Cloud is permitted. For on-prem deployments, ensure internal communication with your directory (AD/LDAP) is available and stable.
Within FortiOS, your configuration will focus on three areas:
A. RADIUS Server Definition
Create a primary RADIUS server entry pointing to your LoginTC Connector. Confirm:

B. User Groups
Even if your directory uses AD or LDAP, Fortinet allows RADIUS-based groups. This is where your VPN users inherit their access policies.
C. IPsec Phase1-Interface Integration
Under your Phase1-Interface, tie your user group to the RADIUS server for XAuth.
The Mode Config block determines what your VPN users receive after authentication:
If you use RADIUS attributes for Framed-IP or DNS assignment, integrate these cleanly with LoginTC’s policies or your directory backend.
This is especially important for deployments that rely on per-user or per-group IP assignment.
IPsec authentication is strict about timing. If MFA takes too long, the handshake fails and the client retries repeatedly.
Your testing checklist should include:
LoginTC is optimized for these flows, but your environment, including WAN latency, DNS resolution, directory speed, has an impact.
IPsec MFA is predictable once deployed, but because there’s no browser fallback, make sure to document:

Fortinet VPN with Push authentication
To address these challenges, LoginTC offers an out-of-the-box MFA solution designed specifically for the FortiGate IPsec VPN. With LoginTC MFA you get:

Fortinet VPN with Phone Call authentication
As Fortinet phases out SSL VPN tunnel mode, organizations don’t have much room for delay. The shift to IPsec means authentication behavior changes, timing becomes stricter, and MFA vendors that only work through browser redirects or custom prompts won’t survive the transition. A successful rollout depends on choosing an MFA platform that fits how IPsec actually works, not how SSL VPN used to work.
LoginTC was designed for environments exactly like this: RADIUS-driven, timing-sensitive, infrastructure-heavy. Whether you’re migrating configurations from legacy SSL VPN deployments or designing a fresh IPsec VPN setup with Mode Config, RADIUS groups, and directory integration, the platform gives you the flexibility and stability these tunnels demand.
Book a call with our integration experts to add MFA to your IPSec VPN today.