FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Ade_23
Staff
Staff
Article Id 385932
Description This article describes possible issues that result in 'Negotiate SA Error: [11895]'.
Scope FortiGate.
Solution

When troubleshooting IPSec VPN issues on the FortiGate, it is possible to receive 'Negotiate SA Error: [11895]'. This is likely due to a gateway address mismatch. 

The sample configuration below shows some details of an IPSec tunnel configured between two FortiGates: A and B

 

FortiGate A:

 

config vpn ipsec phase1-interface
   edit "testvpn"
     set interface "port1"
     set ike-version 2
     set peertype any
     set net-device disable
     set proposal aes128-sha256 aes256-sha256
     set comments "VPN: testvpn (Created by VPN wizard)"
     set remote-gw 10.9.10.43
     set psksecret ENC uDAhksiMdnllHdJjSg0zP7VKWy808PQmk+kpWQ4898rPtnTUzaEI/ee5g+TMrN2EIpMFBl0R/L12rD+yM5zDNx8udDBXcjZUDP7EyuPcYD8tDvPQ5DH5+wyvkXHbvR6uNiA7rGE/Eci4AL8OY3SZyjGwLXNP+E1+OL4Y+g7/VlXsJrVhwVB4wpgWvrf5/4dWYhDxc1lmMjY3dkVA
     next
   end

 

get sys int
   == [ port1 ]
   name: port1 mode: static ip: 10.9.11.1 255.255.240.0 status: up netbios-forward: disable type: physical ring-rx: 0 ring-tx: 0 netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable mtu-override: disable
   == [ port3 ]
   name: port3 mode: dhcp ip: 10.9.32.4 255.255.240.0 status: up netbios-forward: disable type: physical ring-rx: 0 ring-tx: 0 netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable mtu-override: disable
   == [ testvpn ]
   name: testvpn ip: 0.0.0.0 0.0.0.0 status: down netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable mtu-override: disable

 

FortiGate B

 

config vpn ipsec phase1-interface
   edit "test_dup2"
     set interface "port3"
     set ike-version 2
     set peertype any
     set net-device disable
     set proposal aes128-sha256 aes256-sha256
     set comments "VPN: test_dup2 (Created by VPN wizard)"
     set remote-gw 10.9.32.4
     set psksecret ENC SgTLn666ej+BskqxrEQh15UNglbbIIaifeXMNx5rnslfif0/ba+LSKyW0oZoLR/LzTekLODvz8q+u0wB7UqhJ+2RRqMNOVmtUYmgMoh7goQFAt3XhMNOYFzcxvVzw7ePcDNfxEYB2/CE/WxQtLa5FI7wHBlHHk8bvmX0EDcddMnjgNiAoIfs8KKj2JcT5a+9TuHacllmMjY3dkVA
   next
end

 

get sys int
   == [ port1 ]
   name: port1 mode: static ip: 10.9.10.43 255.255.240.0 status: up netbios-forward: disable type: physical ring-rx: 0 ring-tx: 0 netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable mtu-override: disable
   == [ port3 ]
   name: port3 mode: dhcp ip: 10.9.32.11 255.255.240.0 status: up netbios-forward: disable type: physical ring-rx: 0 ring-tx: 0 netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable drop-overlapped-fragment: disable drop-fragment: disable mtu-override: disable
   == [ test_dup2 ]
   name: test_dup2 ip: 0.0.0.0 0.0.0.0 status: up netbios-forward: disable type: tunnel netflow-sampler: disable sflow-sampler: disable src-check: enable explicit-web-proxy: disable explicit-ftp-proxy: disable proxy-captive-portal: disable wccp: disable mtu-override: disable

 

The 'remote-gateway' values on both sides do not match the interface addresses used for the VPN. FortiGate A is configured to match interface port1 on FortiGate B while B is doing the reverse.

 

Debug Outputs.

 

FortiGate B:

 

ike V=root:0:test_dup2:test_dup2: IPsec SA connect 5 10.9.32.11->10.9.32.4:0
ike V=root:0:test_dup2:test_dup2: using existing connection
ike V=root:0:test_dup2:test_dup2: config found
ike V=root:0:test_dup2: request is on the queue
ike 0:test_dup2:56: out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
ike V=root:0:test_dup2:56: sent IKE msg (P1_RETRANSMIT): 10.9.32.11:500->10.9.32.4:500, len=722, vrf=0, id=ca2c786a2244f30e/0000000000000000
ike :shrank heap by 135168 bytes
ike V=root:0:test_dup2:test_dup2: IPsec SA connect 5 10.9.32.11->10.9.32.4:0
ike V=root:0:test_dup2:test_dup2: using existing connection
ike V=root:0:test_dup2:test_dup2: config found
ike V=root:0:test_dup2: request is on the queue

 

FortiGate A:

 

2025-04-02 06:19:36.879931 ike V=root:0: comes 10.9.32.11:500->10.9.32.4:500,ifindex=5,vrf=0,len=500....
2025-04-02 06:19:36.880623 ike V=root:0: IKEv2 exchange=SA_INIT id=9089714b849fe991/0000000000000000 len=500
2025-04-02 06:19:36.881253 ike 0: in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
2025-04-02 06:19:36.886291 ike V=root:0:9089714b849fe991/0000000000000000:260: responder received SA_INIT msg
2025-04-02 06:19:36.886896 ike V=root:0:9089714b849fe991/0000000000000000:260: received notify type NAT_DETECTION_SOURCE_IP
2025-04-02 06:19:36.887552 ike V=root:0:9089714b849fe991/0000000000000000:260: received notify type NAT_DETECTION_DESTINATION_IP
2025-04-02 06:19:36.888229 ike V=root:0:9089714b849fe991/0000000000000000:260: received notify type FRAGMENTATION_SUPPORTED
2025-04-02 06:19:36.888905 ike V=root:0:9089714b849fe991/0000000000000000:260: incoming proposal:
2025-04-02 06:19:36.889449 ike V=root:0:9089714b849fe991/0000000000000000:260: proposal id = 1:
2025-04-02 06:19:36.889971 ike V=root:0:9089714b849fe991/0000000000000000:260: protocol = IKEv2:
2025-04-02 06:19:36.890522 ike V=root:0:9089714b849fe991/0000000000000000:260: encapsulation = IKEv2/none
2025-04-02 06:19:36.891125 ike V=root:0:9089714b849fe991/0000000000000000:260: type=ENCR, val=AES_CBC (key_len = 128)
2025-04-02 06:19:36.891799 ike V=root:0:9089714b849fe991/0000000000000000:260: type=INTEGR, val=AUTH_HMAC_SHA2_256_128
2025-04-02 06:19:36.892483 ike V=root:0:9089714b849fe991/0000000000000000:260: type=PRF, val=PRF_HMAC_SHA2_256
2025-04-02 06:19:36.893120 ike V=root:0:9089714b849fe991/0000000000000000:260: type=DH_GROUP, val=MODP2048.
2025-04-02 06:19:36.893754 ike V=root:0:9089714b849fe991/0000000000000000:260: type=DH_GROUP, val=MODP1536.
2025-04-02 06:19:36.894382 ike V=root:0:9089714b849fe991/0000000000000000:260: proposal id = 2:
2025-04-02 06:19:36.894905 ike V=root:0:9089714b849fe991/0000000000000000:260: protocol = IKEv2:
2025-04-02 06:19:36.895449 ike V=root:0:9089714b849fe991/0000000000000000:260: encapsulation = IKEv2/none
2025-04-02 06:19:36.896045 ike V=root:0:9089714b849fe991/0000000000000000:260: type=ENCR, val=AES_CBC (key_len = 256)
2025-04-02 06:19:36.896726 ike V=root:0:9089714b849fe991/0000000000000000:260: type=INTEGR, val=AUTH_HMAC_SHA2_256_128
2025-04-02 06:19:36.897394 ike V=root:0:9089714b849fe991/0000000000000000:260: type=PRF, val=PRF_HMAC_SHA2_256
2025-04-02 06:19:36.898035 ike V=root:0:9089714b849fe991/0000000000000000:260: type=DH_GROUP, val=MODP2048.
2025-04-02 06:19:36.898705 ike V=root:0:9089714b849fe991/0000000000000000:260: type=DH_GROUP, val=MODP1536.
2025-04-02 06:19:36.899472 ike V=root:0:9089714b849fe991/0000000000000000:260: no proposal chosen
2025-04-02 06:19:36.900083 ike V=root:Negotiate SA Error: [11895]

 

FortiGate A is the receiver in this case, does not accept the proposals but responds with the error: 'no proposal chosen...Negotiate SA Error: [11895]'.

 

After correcting this by selecting the right remote gateway on one of the FortiGates, the tunnel comes up as expected, provided all

other configs are done correctly.