Description | This article describes an issue where dial-up users using TCP encapsulation fail to connect to the IPsec VPN, or administrators are unable to login to FortiGate web GUI. This issue is a port conflict that arises only when admin-sport is configured with custom port 11443, and a non-default IKE TCP port is used. |
Scope | FortiGate v7.4.8+, 7.6.1+. |
Solution |
When a non-default IKE TCP port is configured (i.e., any port other than the default port 4500), and admin-sport is set to 11443, dial-up users may be unable to connect to the IPsec VPN using TCP encapsulation. See FortiClient 7.4.0 New Features Guide | IPsec VPN over TCP on Windows, macOS, and Linux for more information on TCP encapsulation. Example configuration:
config system global
config vpn ipsec phase1-interface config vpn ipsec phase2-interface No output is seen in the ike debugs when attempting to connect to the IPSec VPN using FortiClient, or in the tcpsock output for the IKE daemon. diagnose debug application ike -1 When a FortiGate configured with a non-default IKE TCP port is rebooted, GUI access may be lost. However, VPN TCP connectivity may be successful. Cause: Starting from v7.4.8 and v7.6.1, ike creates a TCP socket on port 11443 when a non-default IKE TCP port is configured. When traffic arrives on the non-default IKE TCP port on an IPsec-enabled interface, it will be redirected internally to 11443.
FGT# diagnose sys tcpsock | grep ike If both the IKE daemon and administrative web GUI are using this port, a conflict occurs. The service that binds to the port first will operate normally, while the other will be unable to use the port.
Resolution: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.