Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
ADVPN DYNAMIC tunnels are not getting established | failed to add dynamc IPsec SA due to route clash
Hello,
ADVPN DYNAMIC tunnel (spoke to spoke) is not getting established, getting below logs :
ike 0:SPOKE1_0:426016: route configuration mismatch with SPOKE1
ike 0:SPOKE1_0:1658729:SPOKE1:426016: failed to add dynamc IPsec SA due to route clash
ike Failed to add selectors
SJ
SJ
2 REPLIES 2
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello SJ,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks
Anthony-Fortinet Community Team.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi SJ,
To troubleshoot the issue where ADVPN dynamic tunnels are not getting established due to a failed addition of dynamic IPsec SA caused by a route clash:
- Check Routing Configuration: Verify the routing table on the FortiGate to ensure no conflicting routes are causing the clash. Check for any overlapping subnets or conflicting static routes that might be causing the route clash.
- Verify Phase 1 and Phase 2 Settings: Ensure that the Phase 1 and Phase 2 settings for the ADVPN tunnels are correctly configured on all devices. Check for any misconfigurations in the IPsec settings that could be preventing the establishment of dynamic tunnels.
- Analyze IPsec SA Status: - Use the command 'diag vpn ike status' to check the IKE and IPsec SA status for the ADVPN tunnels. - Look for any errors or inconsistencies in the SA establishment process that could indicate the cause of the failure.
- Troubleshoot Route Reflection: If using BGP in the ADVPN setup, ensure that the route reflector configuration is correctly set up on the hub FortiGate. Check the BGP neighbor settings and verify that the route reflector client is enabled on the hub device.
- Clear Existing IPsec SAs: If there are existing IPsec SAs causing conflicts, you may need to clear them using the command 'clear vpn ipsec-sa' to remove any stale or conflicting SAs.
- Monitor Logs and Debug Output: Enable debug logging for IPsec and routing on the FortiGate to capture detailed information about the failed SA addition and route clash. - Analyze the logs to identify the specific cause of the issue and take corrective actions accordingly.
Anthony-Fortinet Community Team.
