| Description | This article describes an issue where traffic fails to pass correctly through an IKEv2 IPsec tunnel when both Phase 1 and Phase 2 proposals are configured as aes256-sha512. The problem has been observed after upgrading FortiClient to version 7.4.4. |
| Scope | FortiGate, FortiClient. |
| Solution |
After upgrading to FortiClient v7.4.4, a dial-up IKEv2 IPsec tunnel configured to use the AES256-SHA512 proposal for both Phase 1 and Phase 2 is established successfully, but no return traffic is received from the FortiClient.
Traffic flows only in the outbound direction (from FortiGate to FortiClient). Packet capture on FortiGate shows outgoing packets, but no incoming replies.
FG181F-4 # diagnose sniffer packet any 'host 172.10.10.100' 4 0 l
IPsec tunnel configuration:
config vpn ipsec phase1-interface AVGOKUqTbPgt8xZ+1mjHnn6GIwVhoH30vDcw7zioDC+/J0ePeWgUBuzNOY7mmPugZPfJp6G/m8dVmZZkxpYVa +1lB5cZ5PG3khY8hq2NVqJK2KjvpJyhZtDM1lmMjY3dkVA
config vpn ipsec phase2-interface
In previous versions (v7.4.3 and older), the same configuration worked as expected.
Workaround: Phase 1 and Phase 2 proposals need to be configured with a different integrity algorithm (for example, sha256 or sha1). Once changed, traffic begins to flow normally in both directions.
config vpn ipsec phase1-interface
config vpn ipsec phase2-interface
FG181F-4 # diagnose sniffer packet any 'host 172.10.10.100' 4 0 l
Note: This issue is reproducible when using IPsec over both TCP and UDP.
This issue is currently under investigation, and a permanent fix will be included in the upcoming FortiClient releases. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.