Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Toshi_Esumi
SuperUser
SuperUser

Dialup IPsec over TCP with FortiClient VPN - a gotcha

There were multiple conversations at this community about this subject on both sides: "should work" and " not supported".
I just found the culprit when my new phase1-interface configuration of this dialup IKEv2 over TCP on FG60F 7.4.9 didn't work with FortiClient VPN 7.4.3, which were properly configured to use transport - TCP 4500 both sides. It was NPU offloading at the VPN policy.

In multiple documentations for the IPsec over TCP, it was mentioned NPU offloading and ADVPN are NOT supported. So, I tried disabling the NPU offloading at the polcy with:
    set auto-asic-offload disable


Before this change, nothing showed up in IKE debugging although connection request packets were hitting at at the wan1 interface at TCP 4500. Then, as soon as I made the change, the request came through and showed up in the IKE debugging and got connected.


[below x.x.x.x is FG60F IP]
ike V=root:accepts ike tcp-transport(vd=0, vrf=0, intf=0:5, x.x.x.x:4500->y.y.y.y:10670 sock=33 refcnt=2 ph1=(nil)) (1).
ike V=root:0: comes y.y.y.y:10670->x.x.x.x:4500,ifindex=5,vrf=0,len=337....
ike V=root:0: IKEv2 exchange=SA_INIT id=fbec19b1395c657e/0000000000000000 len=337
--<snip>---
ike V=root:0:dupipsec_0:238140:dupipsec:9385: sending SNMP tunnel UP trap

I don't think this condition was written anywhere, or at least it's hard to be found if it's at somewhere.


Toshi

7 REPLIES 7
Toshi_Esumi
SuperUser
SuperUser

Of course you need to expect some impact to both vpn performance and CPU usage though  because NPU offloading is disabled.

Toshi

BillH_FTNT
Staff
Staff

Hi @Toshi_Esumi 

1. IPsec packets are also offloaded to the NPU. When packets are offloaded, fewer packets appear in debug or sniffer outputs. When we disable offloading, all packets are processed by the kernel, and debugging/sniffer tools will display full information

2. For the issue "I just found the culprit when my new phase1-interface configuration of this dialup IKEv2 over TCP on FG60F 7.4.9 didn't work with FortiClient VPN 7.4.3" ==> I will cross check this in my lab then share the result with you. Thanks

Bill

 

Toshi_Esumi
SuperUser
SuperUser

By the way, this method still doesn't work for MacOS version of FortiClient VPN. Because Mac version doesn't have the same setting menu for IPsec over TCP unlike the Windows version. It would be accomplished if we can modify the saved XML config file. But it's not possible because password encryption is mandated when you save the config. Now you can not modify the config file with a text editor.
That's why you hear often "have to have the EMS version" of FortiClient where you can modify the config.

Toshi


funkylicious

hi @Toshi_Esumi ,

on my Mac running FCT 7.4.1 i can save the config w/o a password so the backup is in clear text.

as far as i know, a password encrypted backup is required only for Windows.

"jack of all trades, master of none"
"jack of all trades, master of none"
Toshi_Esumi

Does MacOS version FCT VPN 7.4.1 support IPsec over TCP? I thought the support was started with 7.4.3.

Toshi

funkylicious

you are correct. starting with FCT 7.4.3 IPsec over TCP is supported.

i was just saying that Backup of config file in FCT on Mac ( at least in 7.4.1 ) allows me to do it w/o a password.

i havent tested this functionality in 7.4.3 

"jack of all trades, master of none"
"jack of all trades, master of none"
GauravPandya
New Contributor III

We have tested the same scenario last week successfully.

FGT - 7.4.9

FortiClient - 7.4.3

Dialup IPSEC VPN

Authentication - SAML 

set auto-asic-offload setting is enabled and it is working as expected

 

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors