This article describes the case when there is TS_UNACCEPTABLE coming up during IKE debugs.
IKEv2 IPSec tunnel on FortiGate.
When troubleshooting IKEv2 IPSec tunnels, the following error in IKE debugs can be observed:
ike V=root:0:L2L_LESA:4: received create-child response
ike V=root:0:L2L_LESA:4: initiator received CREATE_CHILD msg
ike V=root:0:L2L_LESA:4:L2L_LESA:4719: found child SA SPI 5913fda9 state=3
ike V=root:0:L2L_LESA:4: processing notify type TS_UNACCEPTABLE
Also, in the VPN event logs, the following errors are observed:
status="failure" init="local" exch="CREATE_CHILD" dir="inbound" role="initiator" result="ERROR"
While the error event logs for CREATE_CHILD can be due to many reasons such as Authentication/Encryption algorithms not matching on the two ends, or PFS mismatch, etc. The debugs indicate that the remote end did not find FortiGate's proposed traffic selectors (TS) acceptable due to a possible mismatch in the traffic selectors on the FortiGate and the remote end.
Ensure that the Traffic selectors are an exact mirror image of each other on the two devices (match the network as well as the subnet mask).
A common scenario where this happens is when the other device, where the VPN tunnel terminates, does not support multiple traffic selectors in the same SA.
For example, as of the date of writing this article, Cisco has a feature request open to support multiple traffic selectors under a single Child SA, which is not currently fixed.
Whereas, when creating an IPSec tunnel on the FortiGate using the wizard and specifying all the remote traffic selectors, will result in a configuration requiring a single SA with all of the specified traffic selectors (allowed per the IKEv2 RFC), an example is included below:
This is how it would appear on the CLI:
The fix in this situation would be to either:
Option 1: Use individual TS pairs such that one SA is negotiated for each pair of Traffic Selectors.
In the example shown above, this would look like the following:
Option 2: If the remote device supports, use 0.0.0.0/0.0.0.0 to 0.0.0.0/0.0.0.0 as the Traffic Selectors. This simplifies the configuration especially when there are a large number of TS pairs. Routes and policies can be used to restrict and control exactly what networks are accessible along with controlling what services are open on those networks.
Notes:
Related articles:
IPsec VPN: Cannot access multiple remote subnets behind a Cisco PiX firewall
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.