Description
This article describes an issue that occurs where, when using Aggressive Mode for establishing a VPN connection, any mismatch in the IKE parameters will cause an immediate negotiation failure. This example illustrates a failure due to the 'OAKLEY_GROUP' parameters, which is also known as the MODP Diffie-Hellman group:
ike 0:224b50f8ebe84df6/0000000000000000:33007: incoming proposal:
ike 0:224b50f8ebe84df6/0000000000000000:33007: proposal id = 0:
ike 0:224b50f8ebe84df6/0000000000000000:33007: protocol id = ISAKMP:
ike 0:224b50f8ebe84df6/0000000000000000:33007: trans_id = KEY_IKE.
ike 0:224b50f8ebe84df6/0000000000000000:33007: encapsulation = IKE/none
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC.
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=OAKLEY_HASH_ALG, val=SHA.
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=AUTH_METHOD, val=PRESHARED_KEY.
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=OAKLEY_GROUP, val=1536.
ike 0:224b50f8ebe84df6/0000000000000000:33007: ISAKMP SA lifetime=28800
ike 0:224b50f8ebe84df6/0000000000000000:33007: my proposal, gw RemoteGWname:
ike 0:224b50f8ebe84df6/0000000000000000:33007: proposal id = 1:
ike 0:224b50f8ebe84df6/0000000000000000:33007: protocol id = ISAKMP:
ike 0:224b50f8ebe84df6/0000000000000000:33007: trans_id = KEY_IKE.
ike 0:224b50f8ebe84df6/0000000000000000:33007: encapsulation = IKE/none
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC.
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=OAKLEY_HASH_ALG, val=SHA.
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=AUTH_METHOD, val=PRESHARED_KEY.
ike 0:224b50f8ebe84df6/0000000000000000:33007: type=OAKLEY_GROUP, val=2048.
ike 0:224b50f8ebe84df6/0000000000000000:33007: ISAKMP SA lifetime=28800
ike 0:224b50f8ebe84df6/0000000000000000:33007: negotiation failure
ike Negotiate ISAKMP SA Error: ike 0:224b50f8ebe84df6/0000000000000000:33007: no SA proposal chosen
Additionally, while connecting to the VPN from the FortiClient, the following error is seen:

Scope
FortiGate.
Solution
Ensure the corresponding configured Phase1 IKE Diffie-Hellman group is matched on both sides. From RFC3526, RFC5903, and RFC7296 follows a mapping of supported Diffie-Hellman Group to their respective OAKLEY_GROUP value:
- DH Group 1: 768-bit MODP Group
- DH Group 2: 1024-bit MODP Group
- DH Group 5: 1536-bit MODP Group
- DH Group 14: 2048-bit MODP Group
- DH Group 15: 3072-bit MODP Group
- DH Group 16: 4096-bit MODP Group
- DH Group 17: 6144-bit MODP Group
- DH Group 18: 8192-bit MODP Group
- DH Group 19: 256-bit random ECP Group
- DH Group 20: 384-bit random ECP Group
- DH Group 21: 521-bit random ECP Group
Verify the DH group of phase 1 and phase 2 selectors defined in FortiGate is matching with the VPN settings of the connection in the FortiClient.