Description |
This article provides information on possible causes of an unexpected payload type in IKE debug log. |
Scope | FortiOS. |
Solution |
When troubleshooting IPsec VPN tunnel issues, one of the most useful and reliable tools is the logs collected with 'diag debug app ike -1'. The log collected when having this issue usually looks like the following:
ike 0:test-VPN:168871: response message_id 0, expected 1 ike 0:test-VPN:168871: unexpected payload type 42 <- Type could be 11, 41 or other number. ike 0:test-VPN:168871: schedule delete of IKE SA b5574a3dfa846971/077ffcce98411264 ike 0:test-VPN:168871: scheduled delete of IKE SA b5574a3dfa846971/077ffcce98411264 ike 0:test-VPN: connection expiring due to phase1 down ike 0:test-VPN: deleting ike 0:test-VPN: deleted
It is clear from the IKE log that the two VPN peers are not able to complete phase1 negotiation (phase1 is down).
Possible causes and fixes are:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.