FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
nevan
Staff
Staff
Article Id 380380
Description This article describes why multiple proposal IDs can be the same in the IKE debug for incoming proposals.
Scope FortiGate.
Solution

In the FortiGate IPSec VPN logs, the Proposal ID can remain the same for all incoming proposals. While troubleshooting with IKE debug the following output can be observed.


2025-02-28 10:28:08.260710 ike 5:d1ae31d584881057/0000000000000000:2086423: incoming proposal:
2025-02-28 10:28:08.260716 ike 5:d1ae31d584881057/0000000000000000:2086423: proposal id = 0:
2025-02-28 10:28:08.260721 ike 5:d1ae31d584881057/0000000000000000:2086423: protocol id = ISAKMP:
2025-02-28 10:28:08.260727 ike 5:d1ae31d584881057/0000000000000000:2086423: trans_id = KEY_IKE.
2025-02-28 10:28:08.260731 ike 5:d1ae31d584881057/0000000000000000:2086423: encapsulation = IKE/none
2025-02-28 10:28:08.260736 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
2025-02-28 10:28:08.260742 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_HASH_ALG, val=SHA.
2025-02-28 10:28:08.260747 ike 5:d1ae31d584881057/0000000000000000:2086423: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
2025-02-28 10:28:08.260751 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_GROUP, val=MODP1024.
2025-02-28 10:28:08.260756 ike 5:d1ae31d584881057/0000000000000000:2086423: ISAKMP SA lifetime=86400
2025-02-28 10:28:08.260760 ike 5:d1ae31d584881057/0000000000000000:2086423: proposal id = 0:
2025-02-28 10:28:08.260765 ike 5:d1ae31d584881057/0000000000000000:2086423: protocol id = ISAKMP:
2025-02-28 10:28:08.260769 ike 5:d1ae31d584881057/0000000000000000:2086423: trans_id = KEY_IKE.
2025-02-28 10:28:08.260773 ike 5:d1ae31d584881057/0000000000000000:2086423: encapsulation = IKE/none
2025-02-28 10:28:08.260779 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
2025-02-28 10:28:08.260783 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_HASH_ALG, val=SHA.
2025-02-28 10:28:08.260788 ike 5:d1ae31d584881057/0000000000000000:2086423: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
2025-02-28 10:28:08.260793 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_GROUP, val=MODP1536.
2025-02-28 10:28:08.260798 ike 5:d1ae31d584881057/0000000000000000:2086423: ISAKMP SA lifetime=86400
2025-02-28 10:28:08.260804 ike 5:d1ae31d584881057/0000000000000000:2086423: proposal id = 0:
2025-02-28 10:28:08.260808 ike 5:d1ae31d584881057/0000000000000000:2086423: protocol id = ISAKMP:
2025-02-28 10:28:08.260812 ike 5:d1ae31d584881057/0000000000000000:2086423: trans_id = KEY_IKE.
2025-02-28 10:28:08.260816 ike 5:d1ae31d584881057/0000000000000000:2086423: encapsulation = IKE/none
2025-02-28 10:28:08.260821 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
2025-02-28 10:28:08.260828 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_HASH_ALG, val=SHA2_256.
2025-02-28 10:28:08.260832 ike 5:d1ae31d584881057/0000000000000000:2086423: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
2025-02-28 10:28:08.260839 ike 5:d1ae31d584881057/0000000000000000:2086423: type=OAKLEY_GROUP, val=MODP1024.
2025-02-28 10:28:08.260843 ike 5:d1ae31d584881057/0000000000000000:2086423: ISAKMP SA lifetime=86400
...

 

This output is expected and can only be observed for the IKEv1 aggressive or quick mode. This occurs because aggressive mode consolidates multiple transform sets within a single proposal message, rather than sending separate proposals with different IDs. 

In the main mode, proposals are individually numbered and evaluated, aggressive mode is designed for faster negotiation. The initiating peer sends multiple encryption, authentication, and key exchange options within a single packet, and the FortiGate selects a compatible set. Since all transform sets are part of the same proposal structure, the Proposal ID does not change.

Related articles:
Technical Tip: How to check the assigned IP address for the IPSec dial up client
Technical Tip: IPsec Tunnel ID expected behavior

Contributors