Created on
‎06-05-2025
05:06 PM
Edited on
‎09-16-2025
10:40 PM
By
Jean-Philippe_P
Description | This article describes an issue where ADVPN shortcut tunnels may fail to establish, or the parent tunnel may terminate after a few IKE message retransmissions, caused by either a misconfigured Virtual IP entry or a DENY local-in-policy for IKE/NAT-T ports on Spoke firewalls. |
Scope | FortiGate. |
Solution |
The absence of port forwarding in an existing VIP entry on an ADVPN spoke FortiGate, as shown below, may prevent shortcut tunnels from establishing, particularly when the ADVPN tunnel on the spoke uses the same WAN interface and IP as the VIP in the VPN local gateway configuration.
config system interface
config firewall vip
config vpn ipsec phase1-interface
As a result of the above configuration, after the spoke establishes a tunnel with the hub, and when interesting traffic from one spoke to another triggers IKE shortcut negotiation on the hub, the following behavior may occur:
As a result, after a specific retransmission timeout for the IKE shortcut messages on the hub, the hub may drop the tunnel to the spoke, assuming there is one-way traffic over the tunnel. This is because DPD (Dead Peer Detection) on the Hub Firewall may interpret the lack of response as a failure and bring the tunnel down. See below.
IKE Debugs on Hub FortiGate: 18256319074504739019 61321f2c8c588c01/0000000000000000 63.141.218.82 10.217.128.120->10.217.30.14 0 psk 6 enc 000000F40000F0FCCB080BDE78795BFD1F2000000008001061321F2C8C588C010000000000000000001B 002400000000000000000000000000000000000000 AD91E0E000500043F8DDA52000D00043F8DDA52000F00020000000000160002D660000000170002 EED10000000700400940BFAA8F6E9125C4DDD7EB 13941C86FAC846C50D8EF603C0FA369B1E7AFC4BF2E000B0001025F 7361000C000100703D3700100001002E31330011000102206C6F0012000100 out 6068C29F87C7D664DD581A878CF5E6B42E20250000000014000001482900012C8B28BE 100E0B1BBF5213895075AE2E1BC92FD34943C456CF8F1B9C209C2A1C EC09C2D2B5E9331877B60D040D77AB01D410CCAC5FD88FEFE9E57AB163BA0DB85C559D9C74 C9285AC11212FF620F9C35B3164D3F4ACD7D57A84 C1A61A35155814177F032144CA2B0CE8E392E10BDF8C1174958C54FC95F48451D817592F522CBB516385A0D78316A9FD42ED D7C2004CEEDEACE504D240132B52D4310C9E0510B1FFC08FDE37DA19DA6AC1914BA10645E8EC927BE5A3384B87AC840FFD325 sent IKE msg (INFORMATIONAL): 69.31.97.147:500->74.199.168.54:500, len=328, vrf=0, id=6068c29f87c7d664/dd581a878cf5e6b4:000 out 6068C29F87C7D664DD581A878CF5E6B42E20250000000014000001482900012C8B28 BE100E0B1BBF5213895075AE2E1BC92FD34943C456CF8F1B9C209C2A1C EC09C2D2B5E9331877B60D040D77AB01D410CCAC5FD88FEFE9E57AB163 BA0DB85C559D9C74C9285AC11212FF620F9C35B3164D3F4ACD7D57A84 A4F14036D2637111529C1A61A35155814177F032144CA2B0CE8E392E10 BDF8C1174958C54FC95F48451D817592F522CBB516385A0D78316A9FD42ED AAB9FF887824D7C2004CEEDEACE504D240132B52D4310C9E0510B1FFC08FDE37 DA19DA6AC1914BA10645E8EC927BE5A3384B87AC840FFD325 sent IKE msg (RETRANSMIT_INFORMATIONAL): 69.31.97.147:500->74.199.168.54:500, len=328, vrf=0, id=6068c29f87c7d664/dd581a878 2025-09-10 20:18:10.553301 ike 0:t-cdw1_9:1689: out 6068C29F87C7D664DD581A878CF5E6B42E20250000000014000001482900012C8 B28BE100E0B1BBF5213895075AE2E1BC92FD34943C456CF8F1B9C209C2A1C D2B5E9331877B60D040D77AB01D410CCAC5FD88FEFE9E57AB163BA0DB85C559 D9C74C9285AC11212FF620F9C35B3164D3F4ACD7D57A84 F14036D2637111529C1A61A35155814177F032144CA2B0CE8E392E10BDF8C1174958C54 FC95F48451D817592F522CBB516385A0D78316A9FD42ED FF887824D7C2004CEEDEACE504D240132B52D4310C9E0510B1FFC08FDE37DA19DA6AC1914 BA10645E8EC927BE5A3384B87AC840FFD325 sent IKE msg (RETRANSMIT_INFORMATIONAL): 69.31.97.147:500->74.199.168.54:500, len=328, vrf=0, id=6068c29f87c7d664/dd581a878 2025-09-10 20:18:22.551153 ike 0:t-cdw1_9:1689: out 6068C29F87C7D664DD581A878CF5E6B42 E20250000000014000001482900012C8B28BE100E0B1BBF5213895075AE2E1BC92FD34943C456CF8F1B9C209C2A1C B60D040D77AB01D410CCAC5FD88FEFE9E57AB163BA0DB85C559D9C74C9285AC11212FF620F9C35B3164D3F4ACD7D57A84 C1A61A35155814177F032144CA2B0CE8E392E10BDF8C1174958C54FC95F48451D817592F522CBB516385A0D78316A9FD42ED FF887824D7C2004CEEDEACE504D240132B52D4310C9E0510B1FFC08FDE37DA19 DA6AC1914BA10645E8EC927BE5A3384B87AC840FFD325 sent IKE msg (RETRANSMIT_INFORMATIONAL): 69.31.97.147:500->74.199.168.54:500, len=328, vrf=0, id=6068c29f87c7d664/dd581a878 2025-09-10 20:18:46.556466 ike 0:t-cdw1_9:1689: out 6068C29F87C7D664DD581A878CF5E6B42 E20250000000014000001482900012C8B28BE100E0B1BBF5213895075AE2E1BC92FD34943C456CF8F1B9C209C2A1C E9331877B60D040D77AB01D410CCAC5FD88FEFE9E57AB163BA0DB85C559D9C74C9285AC11212FF620F9C35B3164D3F4ACD7D57A84 D2637111529C1A61A35155814177F032144CA2B0CE8E392E10BDF8C1174958C54FC95 F48451D817592F522CBB516385A0D78316A9FD42ED C2004CEEDEACE504D240132B52D4310C9E0510B1FFC08FDE37DA19DA6AC1914BA10645E8EC927BE5A3384B87AC840FFD325 2025-09-10 20:19:34.551740 ike V=root:0:t-cdw1_9:1689: 6068c29f87c7d664/dd581a878cf5e6b4 retransmission timeout
Note: The initial IPsec tunnel is successfully established because the spoke actively initiates the connection to the hub. This is treated as local-out traffic, creating a temporary UDP session that is not affected by the incorrect VIP configuration. However, once that session times out, subsequent IKE messages from the hub to the spoke are subject to VIP-based firewall policy matching, especially when the VIP is configured with an 'any-to-any' port range.
To resolve this issue, configure the VIPs with port forwarding instead of using an 'any-to-any port' VIP configuration. This prevents IKE shortcut messages from being misrouted or dropped due to VIP-based firewall policy interference on the spokes. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.