Source IP: 1.1.1.1 , Source port: 5002nd client session info in the FortiGate:
Destination IP: 2.2.2.2 , Destination port: 500
Protocol: UDP
Source IP: 1.1.1.1 , Source port: 500As both the source IP and source port are same, the FortiGate gives an error twin connections detected in IKE debug logs and deletes old connection (SA) & negotiation tunnel with new connection(SA) which will cause tunnel flapping issue between client A and B.
Destination IP: 2.2.2.2 , Destination port: 500
Protocol: UDP
ike 1:YARD: adding new dynamic tunnel for 1.1.1.1:4500About NAT Traversal:
ike 1:YARD_1: added new dynamic tunnel for 1.1.1.1:4500
ike 1:YARD_1:966: established IKE SA b8856983d6799880/c0a7742f2eb1f993
ike 1:YARD_1: twin connections detected <----- Error.
ike 1:YARD_0: deleting
ike 1:YARD_0: flushing
ike 1:YARD_0:965: send IPsec SA delete, spi 95d5b0d1
[src: 171.16.1.2 :4500 dst: 2.2.2.2:4500] <----- (router ) (PTable Sport:4500 mapped with 1000, Source NAT IP :1.1.1.1).If Client B sends a packet, the packet have this form:
[src: 1.1.1.1 :1000 dst: 2.2.2.2:4500] <----- router forward that packet towards FortiGate firewall.
[src: 171.16.1.3 :4500 dst: 2.2.2.2:4500] <----- (router ) (PTable Sport:4500 mapped with 1001, Source NAT IP :1.1.1.1).As source ports are different in the IKE packet, the FortiGate maintains two different sessions and connections(SA) for the same public IP which resolves the twin connections error.
[src: 1.1.1.1 :1002 dst: 2.2.2.2:4500] <----- router forward that packet towards FortiGate firewall.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.