Created on
02-08-2022
07:53 AM
Edited on
02-06-2025
03:43 AM
By
Jean-Philippe_P
| Description | This article describes that Certificate validation may fail after upgrading FortiGate from v6.0 to v6.2. |
| Scope |
FortiGate v6.0 and v6.2. |
| Solution |
Hub config:
config vpn ipsec phase1-interface
Spoke Config:
config vpn ipsec phase1-interface
config user peer
When trying to set up the VPN, it does not come up. The following debugs must be collected on both Spoke and Hub:
diag debug reset diag debug console timestamp en diag vpn ike log-filter name xxx diag debug application ike -1 diag debug application fnbamd -1 diag debug en
The debug shows the following output on Spoke:
[246] fnbamd_chain_build-Chain discovery, opt 0x7, cur total 2
The certificate validation is failing because Spoke FortiGate is not able to build up the certificate chain to the Root CA. Only the Sub-CA was imported to the Spoke FortiGate.
Note: Sometimes, when multiple CA certificates are used make sure that only the correct CA certificate is pushed by FortiManager in all the spokes which can validate the certificate used by FortiGate while connecting with the peer devices.
Import the Root CA also to the Spoke FortiGate to fix the issue.
Related documents: IPsec VPN authenticating a remote FortiGate peer with a certificate v6.2.0 Technical Tip: IPsec Tunnel with certificate authentication fails after upgrade to FortiOS v7.0.x |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.