Created on 
    
	
		
		
		06-01-2022
	
		
		11:28 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
  Edited on 
    
	
		
		
		04-11-2025
	
		
		06:51 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 By  
				
		
		
			Stephen_G
		
		
		
		
		
		
		
		
	
			 
		
| Description | 
 This article describes how to decrypt IPSEC Phase-2 (ISAKMP) packets using the Phase1 key.  | 
| Scope | FortiGate. | 
| Solution | 
 
 
 
 
 
 
 
 diagnose debug console timestamp enable diagnose vpn ike log-filter dst-addr4 <Remote Gateway IP> <----- Change <Remote Gateway IP>. diagnose debug application ike -1 
 For v7.4.0 and above: 
 diagnose debug console timestamp enable diagnose vpn ike log filter rem-addr4 <Remote Gateway IP> <----- Change <Remote Gateway IP>. 
 Responder: 
 ike V=root:0:Test:150: sent IKE msg (SA_INIT_RESPONSE): x.x.x.x:500->x.x.x.x:500, len=240, vrf=0, id=4de3c0f28601422e/a46da21febd5e243, oif=6 
 Initiator: 
 ike 0:Test:227884: initiator received SA_INIT response 
 
 Make sure that SPI in CLI output and Wireshark capture are the same. The screenshot below shows encrypted data. 
 
 
 
 
 
 Add a new row by selecting+ sign, select the field to fill the values from FortiGate Cli (SPI, SK_ei, SK_er, SK_ai, SK_ar). 
 Note: remove the '–' before entering the values. 
 
 
 
 
 
 
 
 
 Related articles:  | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.