Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
RJ1
New Contributor III

ADVPN DYNAMIC tunnels are not getting established | failed to add dynamc IPsec SA due to route clash

Hello,

 

ADVPN DYNAMIC tunnel (spoke to spoke)  is not getting established, getting below logs :

 

 ike 0:SPOKE1_0:426016: route configuration mismatch with SPOKE1
 ike 0:SPOKE1_0:1658729:SPOKE1:426016: failed to add dynamc IPsec SA due to route clash
ike Failed to add selectors

SJ
SJ
2 REPLIES 2
Anthony_E
Community Manager
Community Manager

Hello SJ,


Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.


Thanks

Anthony-Fortinet Community Team.
Anthony_E
Community Manager
Community Manager

Hi SJ,

 

To troubleshoot the issue where ADVPN dynamic tunnels are not getting established due to a failed addition of dynamic IPsec SA caused by a route clash:

  1. Check Routing Configuration: Verify the routing table on the FortiGate to ensure no conflicting routes are causing the clash. Check for any overlapping subnets or conflicting static routes that might be causing the route clash.
  2. Verify Phase 1 and Phase 2 Settings: Ensure that the Phase 1 and Phase 2 settings for the ADVPN tunnels are correctly configured on all devices.  Check for any misconfigurations in the IPsec settings that could be preventing the establishment of dynamic tunnels.
  3. Analyze IPsec SA Status: - Use the command 'diag vpn ike status' to check the IKE and IPsec SA status for the ADVPN tunnels. - Look for any errors or inconsistencies in the SA establishment process that could indicate the cause of the failure.
  4. Troubleshoot Route Reflection: If using BGP in the ADVPN setup, ensure that the route reflector configuration is correctly set up on the hub FortiGate. Check the BGP neighbor settings and verify that the route reflector client is enabled on the hub device.
  5. Clear Existing IPsec SAs: If there are existing IPsec SAs causing conflicts, you may need to clear them using the command 'clear vpn ipsec-sa' to remove any stale or conflicting SAs.
  6. Monitor Logs and Debug Output: Enable debug logging for IPsec and routing on the FortiGate to capture detailed information about the failed SA addition and route clash. - Analyze the logs to identify the specific cause of the issue and take corrective actions accordingly.
Anthony-Fortinet Community Team.
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors