FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
arahman
Staff
Staff
Article Id 417461
Description This article describes the troubleshooting steps when an IPsec tunnel does not connect with the error 'peer has not completed configuration method' seen in the FortiGate IKE debugs.
Scope FortiGate.
Solution

In this example, an IPsec tunnel is unable to fully come up. The status shows phase-1 as up, but phase-2 as down.

 

kb 32.1.PNG

 

When performing the FortiGate IKE debug on the impacted tunnel with the following commands :

 

Before FortiOS v7.4.0 :

 

diagnose debug disable
diagnose debug reset
diagnose vpn ike log-filter dst-addr4 <remote wan ip-address>
diagnose debug application ike -1
diagnose debug console timestamp enable
diagnose debug enable

 

For v7.4.0 and above :

 

diagnose debug disable
diagnose debug reset
diagnose vpn ike log filter rem-addr4 <remote wan ip-address>
diagnose debug application ike -1
diagnose debug console timestamp enable
diagnose debug enable

 

The debug output shows the error  'peer has not completed Configuration Method':  

 

kb 32.2.PNG

 

To disable the debugs, use the commands below:

 

diagnose debug disable
diagnose debug reset


The error signifies that the local peer (the peer where the IKE debug was run) is expecting a mode-configuration message exchange, and the remote peer has not responded to those messages.

 

This message exchange is done through an established IKE Security Association, but is done before negotiating an IPSEC Security Association, which results in the status seen previously.

 

Mode Config in an IPsec tunnel is used as an alternative to DHCP over IPsec, allowing dial-up VPN clients and others to obtain IP addresses, network, and DNS configurations from the VPN server. It can be configured on a FortiGate as either a server or a client.

 

kb 32.3.PNG

 

The solution to the error is to ensure that the 'Mode Config' configuration is the same on both peers for negotiation to succeed. If one side has the setting disabled and another has it enabled, it will prevent the IPSEC Security Association from establishing.

 

One possible reason could be third-party VPN clients, which may not support or properly send the necessary Configuration Payload information while connecting to a server expecting Mode Config, leading to incomplete negotiations.

 

Another possible reason for the Mode-Config exchange not completing is address exhaustion in the configured address pool that the mode-config server hands out to the connecting client. See related articles below for more information. 

 

Related documents :

Technical Tip: IPv4 address exhaustion in ike mode-cfg

IKE Mode Config clients