I am trying to get an IPSEC Tunnel up and running and phase1 says it negotiate success according to the logs, then Phase2 never attempts. The phase1 gets torn down and starts all over again.
I am on fortios 7.0.5 fg60poe.
Anyone have any ideas as to what might be happening?
EDIT
Sorry for the lack of details.
Source is a Fortigate 60E with a Frontier DSL connection using PPPoE on WAN1 with a static IP (note, I am not using the unnumbered IP to set the static, that would not work for some reason)
Destination is a Cisco ASA on a Static IP. We have 10 locations deployed with Fortigates, all came up fine on the VPN tunnel but this location. The only real difference here is the PPPoE piece. Configs should be identical across all of them. I checked the ASA, it has the same IPSEC policies applied as other locations.
In the Phase1 setup, I have NAT Traversal set to Enable (This is how all of our sites are set up)
Authentication and Phase1 Proposal matches my other sites and settings exactly
Phase2:
Subnets and Named Address objects failed for local and remote addresses
Enabled Replay Detection - Unchecked
Enabled PFS - Checked
Local Port - Checked
Remote Port - Checked
Protocol - Checked
Auto-Negotiated - Checked
Autokey Keep Alive - Checked
EDIT 2
It looks like this is resolved. I deleted out the entries on the ASA and recreated them and the tunnel came right up. I am not sure why that would have made a difference, but something was stuck some where. Thanks for all of the suggestions!
I had a similar issue. Try giving the gate a reboot and see if the phase 2 come up after that.
I spent countless hours troubleshooting and more with TAC. Eventually we gaveup figuring out the root problem. Something with the firmware possibly. This was on 6.4.7 in a HA pair.
1.) what is the device on the other Side
If no Fortigate may read recommendations from other Vendor. Maybe you have to fallback to ikev1
2.) Negotiation success do not meen that initiated an SPI. May the Fortigate and the other device have talkt to another and the Fortigate has get a matching ISAKMP but not put together because of Routing or Firewall policy problems, DNS Match, Password or Certificates, DPD or AutoNegotiation and so on. Only the Proposal (AES128/SHA512/DH21) matched…
3.) is there a NAT-T or not?
Did you get traffic on IP50 oder TCP 4500/500
4.) Tunnel Mode or Interface Mode
And not often but I’m some constellations seen that a Problem with Phase2 kicks Phase1
I did this and was trying to scan through it. I see no failures or errors (nothing obvious). I see a message about received nat-d payload mat not detected.
Thanks for this. I will be digging into it more this weekend to get it figured out. I have a few hours of driving to get home, but I do have remote access to it
Make sure you hey the outputs of these debug commands while RESPONDING to VPN requests. Meaning : ask your peer to initiate the tunnel rather than sending traffic yourself.
I had two sites that I had to do this at, I had to delete everything out and rebuild the VPN tunnels, routes and polices, but that is not working at this site.