Created on
‎10-27-2025
08:45 AM
Edited on
‎11-17-2025
01:06 PM
By
Jean-Philippe_P
| Description | This article describes an issue where FortiClient does not forward traffic to the FortiGate over an IKEv2 IPsec tunnel when both Phase 1 and Phase 2 are configured with the AES256-SHA512 proposal. The behavior has been observed following an upgrade to FortiClient version 7.4.4. |
| Scope | FortiClient v7.4.4. |
| Solution |
After upgrading to FortiClient v7.4.4, a dial-up IKEv2 IPsec tunnel configured to use the AES256-SHA512 proposal for both Phase 1 and Phase 2 is established successfully, but no return traffic is received from the FortiClient.
Traffic flows only in the outbound direction (from FortiGate to FortiClient). Packet capture on FortiGate shows outgoing packets, but no incoming replies.
FG181F-4 # diagnose sniffer packet any 'host 172.10.10.100' 4 0 l
IPsec tunnel configuration:
config vpn ipsec phase1-interface AVGOKUqTbPgt8xZ+1mjHnn6GIwVhoH30vDcw7zioDC+/J0ePeWgUBuzNOY7mmPugZPfJp6G/m8dVmZZkxpYVa +1lB5cZ5PG3khY8hq2NVqJK2KjvpJyhZtDM1lmMjY3dkVA
config vpn ipsec phase2-interface
In previous versions (v7.4.3 and older), the same configuration worked as expected.
Workaround: Phase 1 and Phase 2 proposals need to be configured with a different integrity algorithm (for example, sha256 or sha1). Once changed, traffic begins to flow normally in both directions.
config vpn ipsec phase1-interface
config vpn ipsec phase2-interface
FG181F-4 # diagnose sniffer packet any 'host 172.10.10.100' 4 0 l
Note: This issue is reproducible when using IPsec over both TCP and UDP.
This issue has been resolved in:
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.