| Description | This article describes how to troubleshoot IPSec VPN IKEv2 with certificate authentication. |
| Scope | FortiClient, FortiClient EMS. |
| Solution |
Error:
[915] fnbamd_cfg_get_radius_acct_servers-Error finding rad server bburgess [915] fnbamd_cfg_get_radius_acct_servers-Error finding rad server bburgess
If any NAT/ISP/firewall along the path does not reassemble/allow fragments, the peer never receives the complete response, and the session times out. FG60F # diagnose sniffer packet any "host 177.173.X.X and (port 500 or port 4500)" 4 0 l This error could be caused by fragmented IKE packets. Kindly enable the tag <enable_ike_fragmentation> = 1 in the FortiClient EMS IPSec VPN profile, as shown in the screenshot below.
This is because when using cert auth, then makes the IKE_AUTH response bigger than the MTU of the link, and when IKE is fragmented at the IP layer, a lot of firewalls block it. IKE Fragmentation forces the fragmentation to occur in the IKE layer rather than the IP layer.
To enable IKE fragmentation, go to FortiClient EMS -> Endpoint Profiles -> Remote Access -> Select the assigned VPN profile, then phase 1, toggle on the option.
This option can also be enabled via XML, as shown below.
On the FortiGate side, to configure IKEv2 fragmentation:
config vpn ipsec phase1-interface |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.