Created on
06-01-2022
11:28 AM
Edited on
04-11-2025
06:51 AM
By
Stephen_G
Description |
This article describes how to decrypt IPSEC Phase-2 (ISAKMP) packets using the Phase1 key. |
Scope | FortiGate. |
Solution |
diagnose debug console timestamp enable diagnose vpn ike log-filter dst-addr4 <Remote Gateway IP> <----- Change <Remote Gateway IP>. diagnose debug application ike -1
For v7.4.0 and above:
diagnose debug console timestamp enable diagnose vpn ike log filter rem-addr4 <Remote Gateway IP> <----- Change <Remote Gateway IP>.
Responder:
ike V=root:0:Test:150: sent IKE msg (SA_INIT_RESPONSE): x.x.x.x:500->x.x.x.x:500, len=240, vrf=0, id=4de3c0f28601422e/a46da21febd5e243, oif=6
Initiator:
ike 0:Test:227884: initiator received SA_INIT response
Make sure that SPI in CLI output and Wireshark capture are the same. The screenshot below shows encrypted data.
Add a new row by selecting+ sign, select the field to fill the values from FortiGate Cli (SPI, SK_ei, SK_er, SK_ai, SK_ar).
Note: remove the '–' before entering the values.
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.