Description |
This article describes how to resolve an issue where FortiGate is unable to establish an IPSEC tunnel to the remote VPN gateway. |
Scope | FortiGate IPSEC. |
Solution |
Symptoms and Cause: Check on the FortiGate IPSEC tunnel status. In this example, it will show 2 tunnels: VPN_to_WQD and VPN_WQD
get ipsec tunnel list NAME=VPN_to_WQD REMOTE-GW=60.50.220.14:0 NAME=VPN_WQD REMOTE-GW=60.50.220.14:0
Check on FortiGate IKE debug logs and it will show this error: could not locate phase1 configuration.
ike V=root:0:VPN_to_WQD:VPN_to_WQD: IPsec SA connect 62 180.74.240.29->60.50.220.14:0
ike V=root:0:VPN_WQD:VPN_WQD: IPsec SA connect 62 180.74.240.29->60.50.220.14:0
This is due to that FortiGate's 2 IPSEC tunnels are reaching the same remote destination gateway IP (in this example: 60.50.220.14).
In this example, the FortiGate has 2 IPSEC tunnels configured.
config vpn ipsec phase1-interface end
config vpn ipsec phase1-interface edit "VPN_to_WQD" end
Available solutions to address this issue:
config vpn ipsec phase1-interface edit "VPN_WQD" set network-overlay enable <----- set network-id 100 <----- next config vpn ipsec phase1-interface edit "VPN_to_WQD" set network-overlay enable <----- set network-id 200 <----- next end
This issue or the log can also be observed in a scenario in which the interface that is being used under the IPsec is not configured with any IP address.
No IP address is assigned to that interface:
Similar IKE debugs can be seen:
FG5H1E-1 # ike V=root:0:500E-GURUGRAM:IPSEC: IPsec SA connect 10 10.5.52.80->10.5.205.176:0
Assign the IP address on the interface to fix this issue.
Related articles : Troubleshooting Tip: IPSEC Tunnel (debugging IKE) Technical Tip: How to establish more than one IPsec tunnel with same pair of IP |