Created on
‎10-18-2004
12:00 AM
Edited on
‎01-12-2025
11:04 PM
By
Anthony_E
Description
This article describes how to use Peer IDs to select an IPsec dial-up tunnel on a FortiGate configured with multiple dial-up tunnels.
Scope
FortiGate.
Solution
Dialup VPN tunnels are used when the remote VPN gateway or remote VPN client IP address is dynamic and therefore unknown.
Many customers use a single dialup tunnel (Phase 1 and Phase 2) for all remote dialup VPN gateways and clients.
Note: Multiple Peer IDs are used when only one wan interface is used for multiple IPsec connection
In some cases, multiple dial-up tunnels are required.
For example:
To grant different remote VPN client users access to different networks and services.
To grant remote VPN gateways access to different networks and services
FortiGates uses Peer IDs as the unique identifier to select a dialup tunnel. When multiple dialup tunnels are added, give each tunnel a different Peer ID.
Assign corresponding Peer IDs to remote VPN gateways and remote VPN clients.
To be able to add a Peer ID on an IPsec tunnel created by the wizard there are 2 options:
- Using the CLI
- Using the GUI: Aggressive mode configuration in the first dialup tunnel:
Note:
When the IPsec tunnel is created by the wizard, there is no GUI option to add a peer ID until convert the IPsec Tunnel to a custom tunnel.


the below commands enables IKE to debug logs:
diag debug reset
diag debug application ike -1
diag debug enable
tau-kvm68 # ike 0: comes 10.5.22.160:1011->10.5.22.168:500,ifindex=3....
ike 0: IKEv1 exchange=Aggressive id=df23d7be2de17010/0000000000000000 len=511ike 0:df23d7be2de17010/0000000000000000:0: responder: aggressive mode get 1st message...
......
ike 0::0: received peer identifier FQDN 'dialup1'
From the FortiGate IPSec Monitor tab:
ike 0: IKEv1 exchange=Aggressive id=d74d09b92f8f1cbd/0000000000000000 len=511
......
ike 0::1: received peer identifier FQDN 'dialup2'

Technical Tip: How to configure a FortiGate as IPsec VPN Dial-Up client when FortiGate is not behind...
Technical Tip: IPSec dial-up full tunnel with FortiClient
Technical Tip: FortiGate Hub with multiple IPSec Dial-up phase1 using IKEv2 and PSK authentication