| Description | This article demonstrates an uncommon ISP issue that can affect a previously working IPsec tunnel, preventing the tunnel from passing traffic until a manual workaround is applied. |
| Scope | VPN gateways not using NAT traversal, especially site-to-site tunnels. |
| Solution |
This issue is likely to occur in environments with the following attributes:
This issue does not affect new deployments. If issues are encountered when configuring a new IPsec tunnel, configure a basic site-to-site tunnel and modify as needed. See this document: Basic site-to-site VPN with pre-shared key.
Example: In the example deployment below, IKE traffic and ESP traffic typically take the same path between the two VPN gateways, allowing tunnel data traffic to pass between the sites.
During a link flap, IKE traffic and ESP traffic is briefly misdirected to an unintended gateway. IKE traffic recovers automatically after the interface flap, but constant data traffic may preserve an incorrect routing or forwarding decision indefinitely for session-less ESP traffic.
Workaround: Disable the IPsec tunnel on both sides and wait for five (5) minutes. This is a common caching default value and allows the invalid routing/forwarding decision to time out on the ISP device(s).
GUI:
CLI:
config system interface edit "Tunnel" set status down next end
If the administrator only has access to one side of the tunnel, disable the IPsec tunnel and wait seven (7) minutes to allow sufficient time for DPD to bring down the tunnel on the remote side. This interval is sufficient assuming the remote side has the default settings for either IKEv1 or IKEv2, see this article: Technical Tip: IKEv2 retransmission and DPD.
After the interval has elapsed, enable the IPsec tunnel again.
GUI:
CLI:
config system interface edit "Tunnel" set status up next end
Verify the issue is resolved by triggering some tunnel traffic and observing bidirectional communication.
BRANCH-FGT # diagnose sniffer packet Tunnel '' 4 4 l
Note: Forcing NAT traversal can also work around this issue in some deployments, since this forces IKE and data traffic to be encapsulated in the same UDP port 4500 session.
config vpn ipsec phase1-interface edit "Tunnel" set nattraversal forced next end
config vpn ipsec phase1-interface edit "Tunnel" set npu-offload disable next end
If the workaround does not resolve the issue, collect IPsec troubleshooting steps to verify it is not a firewall issue and reach out to both sites' ISPs to verify. If the workaround temporarily resolves the issue, but it reoccurs later, reach out to the relevant ISPs.
Expected Symptoms: Typically, the VPN gateway administrator has no access to ISP devices to confirm the issue directly. It can only be suspected once other likely possibilities are eliminated. When the issue occurs, troubleshooting on FortiGates acting as VPN gateways will show the following:
BRANCH-FGT # execute ping 10.17.56.2 --- 10.17.56.2 ping statistics ---
Note: In this case, the ping failure is expected because HQ-FGT is configured not to respond to ICMP echo requests.
HQ-FGT # diagnose sniffer packet any 'port 500 and host 10.17.120.1 and 10.17.56.2' 4 1000 l
HQ-FGT # diagnose sniffer packet any 'proto 50 and host 10.17.120.1 and 10.17.56.2' 4 1000 l Note: To capture incoming ESP traffic in a packet sniffer, npu-offload must be disabled in the VPN tunnel phase1-interface configuration. Modifying this setting will cause a tunnel flap.
config vpn ipsec phase1-interface edit "Tunnel" set npu-offload disable next end
HQ-FGT # diagnose vpn ike gateway list name <phase1-interface name> | grep DPD
diagnose vpn ike gateway flush name <phase1-interface name>
If the observed symptoms do not match expected symptoms, it is likely a different issue with the VPN gateway or ISP. Refer to general IPsec troubleshooting steps.
Resolution: Since this is an ISP issue, it is not possible to prevent it from the VPN gateway configuration; it is only possible to recover manually once the issue occurs. If the issue occurs on a transit router, it is possible to prevent the issue by correctly configuring summary blackhole routes to stop traffic leaking on unintended routes when there is no more specific valid route. For a FortiOS example, see this document: Routing Concepts.
Related articles: Troubleshooting Tip: Troubleshooting IPsec site-to-site tunnel connectivity Technical Tip: FortiGate IPsec VPN resource list Troubleshooting Tip: IPsec VPN tunnels |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.