Created on
06-21-2025
12:58 PM
Edited on
01-06-2026
11:07 PM
By
Jean-Philippe_P
| Description |
This article describes the common causes of IPSec VPN disconnection issues and provides a systematic approach to troubleshooting intermittent disconnections in FortiGate IPSec VPN deployments. |
| Scope | FortiGate, IPSec VPN. |
| Solution |
IPSec Protocol Basics. IPSec VPN tunnels maintain their connection through several underlying mechanisms. Understanding these mechanisms is essential for accurately diagnosing disconnection issues.
IPSec VPN consists of two main phases:
Both phases have lifetimes, after which renegotiation is required. Improper handling of this renegotiation process can result in disconnections from the tunnel.
Common Causes of IPSec VPN Disconnections.
DPD is a mechanism that detects when a VPN peer is no longer responsive. When a tunnel becomes idle (no traffic passing through), DPD begins sending "Are You There?" probes to verify if the peer is still active.
How DPD works:
Impact on Disconnections:
For more information on DPD configuration and troubleshooting, review the following KB article: Technical Tip: Configuring DPD (dead peer detection) on IPsec VPN .
Keepalive messages maintain the tunnel's active state by generating periodic traffic. Unlike DPD, which checks if a peer is alive, keepalives prevent the tunnel from going idle. Without keepalives, a tunnel that experiences no user traffic may be susceptible to disconnection due to DPD or other timeout mechanisms. The following is a snapshot of the configuration relevant to the keepalive.
config vpn ipsec phase2-interface edit "phase2-name" set keepalive enable next end
A common but often overlooked cause of disconnection is the presence of dual IP protocol stacks. When a client has both IPv4 and IPv6 enabled, but the VPN is configured primarily for IPv4, protocol conflicts can occur.
This can manifest as:
To verify if this is causing issues, the following article can help. Technical Tip: FortiClient IPsec dialup tunnel keep disconnecting
Network path problems are often the root cause of intermittent disconnections, especially when they only affect specific users or locations.
Common network path issues include:
These issues need to be reviewed with the ISP, as they fall outside the IPsec peers.
Many network devices maintain connection state tables and will remove entries for connections that remain idle for too long. When this happens, the tunnel may appear to be up but cannot pass traffic, leading to a disconnect when traffic resumes.
Idle timeout issues can be mitigated by:
IPSec tunnels rely on security associations (SAs) with defined lifetimes, which must be rekeyed upon expiration.
Two primary rekey methods exist:
Several software issues or design challenges throughout the years have been seen on different vendors, including FortiClient, and were later fixed, which prevented the correct rekey, such as:
To troubleshoot these issues, the network administrator can capture and decrypt UDP network traffic using a sniffer to observe the IKE exchanges. For more details on this technique, the following article provides additional information: Technical Tip: How to decrypt IPSec Phase-2 (ISAKMP) packets IKEv2
Modern FortiGate devices use specialized hardware (NPU - Network Processing Units) to accelerate IPSec traffic processing. While this generally improves performance, it can sometimes cause issues with specific traffic patterns or when combined with other features.
To determine if NPU offloading is causing disconnection issues, temporarily disable it for the problematic tunnel:
config vpn ipsec phase1-interface edit "tunnel-name" set npu-offload disable next end
If the DDoS policy on the WAN interface used by the IPsec VPN tunnel has aggressive threshold values, then the FortiGate clears the VPN connection. The same can be verified from the logs. under: Log & Report -> Security Events -> Logs, select Anomaly in the drop-down) and filter for the user's public IP address.
Systematic Troubleshooting Methodology. Troubleshooting intermittent disconnections requires a methodical approach:
If a VPN tunnel encounters packets larger than the path MTU, fragmentation may fail. This is common when NAT devices, firewalls, or intermediate routers drop oversized packets or fragments. The DF (Don’t Fragment) bit in IP headers can prevent fragmentation, and default FortiGate behavior (set honor-df enable) respects this bit.
Impact:
Mitigation:
config vpn ipsec phase1-interface
Note:
To learn more about MTU/fragmentation issues, please check this link: Technical Tip: IP Packet fragmentation over IPSec tunnel interface explained
IPsec tunnels using certificates or PSKs can fail due to:
Impact:
Mitigation:
Technical Tip: How to troubleshoot Intermittent IPsec Dial up VPN disconnection Troubleshooting Tip: How to Troubleshoot the issue of Intermittent packet drops over SSL VPN Troubleshooting Tip: Site-to-Site IPsec VPN Intermittent Connection due to phase 2 mismatch |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.