Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Borys_DE
New Contributor II

Dialup peer don`t connect to server when reconnecting IPsec tunnel

Hello everyone, 

I set up a Dialup IPSec tunnel between two FortiGates. The remote FortiGate connects to the server via an external LTE modem. Port forwarding is configured on the modem. If the connection is lost, the tunnel isn't automatically reestablished. Phase 1 appears to be established, but phase 2 isn't. After rebooting the remote Fortigate, the tunnel establishes itself automatically. However, after the connection is lost, it doesn't establish itself again. Where to look for the problem? Here's the debugging log:

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: created connection: 0x9764470 5 192.168.2.2->105.109.199.30:500.

ike V=root:0:VPN_Test_TSw1:348: initiator: aggressive mode is sending 1st message...

ike V=root:0:VPN_Test_TSw1:348: cookie f28a0d09e11de14b/0000000000000000

ike V=root:0:VPN_Test_TSw1:348: generate DH public value request queued

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14B000000000000000001100400000000000000026E0400003C000000010000000100000030010100010000002801010000800B0001000C000400015

18080010007800E010080030001800200028004000E0A000104D73D37B5C846B47FA24CD69E10593530F9EF85CE13638F0357A734F01E0C49B4D78D7022041E6100B7AFEE52C1C3E0EA5B06E8319DBC628

B4B358623A389E993B70D73F79E30DD09F28FB04E937EB8B89EA553EE2C62F694CF4721B5BFF68926F39EB9487E8B4953486A210486287C08CE69320B5F3BB012F3F703CAB0A17549CC1DC327B5E46B08C

86528EE3EAA3F4367C21044031261E304D5FA1C937D2C838237607937F3B9C556BF7D45ADE47B231F030D2BE4E09C643F74EE2ADA0F853EE2B79600632E0989BC550D0702AF34536EED8167442200DE362

DF8C9B99B0F50C78E90CF08F5B74BBDDD81DB7F494DE14B4EF70E3ACEB1E926DC68F3B6EFD0ED05000024A7950136DECC5925100B1001CB2DAE342D1831A1E5D2B98A78FB9AF7C472F0150D00000E0B000

0005465737446470D0000144A131C81070358455C5728F20E95452F0D0000147D9419A65310CA6F2C179D9215529D560D000014CD60464335DF21F87CFDB2FC68B6A4480D00001490CB80913EBB696E086

381B5EC427B1F0D00001416F6CA16E4A4066D83821A0F0AEAA8620D0000144485152D18B6BBCD0BE8A8469579DDCC0D000014AFCAD71368A1F1C96B8696FC775701000D00001412F5F28C457168A9702D9

FE274CC02040D0000144048B7D56EBCE88525E7DE7F00D6C2D30D0000184048B7D56EBCE88525E7DE7F00D6C2D3C0000000000000148299031757A36082C6A621DE00000000

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (agg_i1send): 192.168.2.2:500->105.109.199.30:500, len=622, vrf=0, id=f28a0d09e11de14b/0000000000000000

ike V=root:0: comes 105.109.199.30:500->192.168.2.2:500,ifindex=5,vrf=0,len=576....

ike V=root:0: IKEv1 exchange=Aggressive id=f28a0d09e11de14b/d5eae735d8a51bc4 len=576 vrf=0

ike 0: in F28A0D09E11DE14BD5EAE735D8A51BC40110040000000000000002400400003C000000010000000100000030010100010000002801010000800B0001000C00040001518080010007800E0100

80030001800200028004000E0A0001046658D172AB99266DBC252654A4BE43590374E21F371470589776181EF50BEA188B6C1060FB136FFCD34352160C021141A4C64B4E0D065D19BEDD56EF99CDB69115

910F98B1216D9910EE9886BCAC47B46A0D0369FCC23B1A3D23EF7DC98AD8E099272F8F560B3DA676C9A3DEDC0C390B20C631BF928BC2CAE4C8A9A18E2579E4EA76C59FDCF60B639DBE6DB7707D561809E0

F2EE8FC0F448004B1FBF9ABD334D0F59270928C3AF7B1E6155232EA3AB1226BCE31F6C86444E29D8807538219A32BF4BB31AC8D0567D77AF807B582DBECE8D1496905543D6456BB85F9F0188768D593E51

BF113504482518A73D58577A5683C7A7D54B0B936D7FE28F0E22DC3C6905000014D2F76DBEABBD56997A627CFA994B59080800000C02000000526F6F740D000018AB43B27421D140CB6C996F5F991BBCF1

9A2EE690140000144A131C81070358455C5728F20E95452F140000184B8A47591332356A79D475825A10618498A0580F0D0000189B94C71424DF0C400387A04BA3B412B8657D79DD0D000014AFCAD71368

A1F1C96B8696FC775701000D00001412F5F28C457168A9702D9FE274CC02040D0000148299031757A36082C6A621DE000000000D0000144048B7D56EBCE88525E7DE7F00D6C2D3000000184048B7D56EBC

E88525E7DE7F00D6C2D3C0000000

ike V=root:0:VPN_Test_TSw1:348: VID RFC 3947 4A131C81070358455C5728F20E95452F

ike V=root:0:VPN_Test_TSw1:348: VID DPD AFCAD71368A1F1C96B8696FC77570100

ike V=root:0:VPN_Test_TSw1:348: DPD negotiated

ike V=root:0:VPN_Test_TSw1:348: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0204

ike V=root:0:VPN_Test_TSw1:348: peer supports UNITY

ike V=root:0:VPN_Test_TSw1:348: VID FORTIGATE 8299031757A36082C6A621DE00000000

ike V=root:0:VPN_Test_TSw1:348: peer is FortiGate/FortiOS (v0 b0)

ike V=root:0:VPN_Test_TSw1:348: VID FRAGMENTATION 4048B7D56EBCE88525E7DE7F00D6C2D3

ike V=root:0:VPN_Test_TSw1:348: VID FRAGMENTATION 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000

ike V=root:0:VPN_Test_TSw1:348: received peer identifier FQDN 'Root'

ike V=root:0:VPN_Test_TSw1:348: negotiation result

ike V=root:0:VPN_Test_TSw1:348: proposal id = 1:

ike V=root:0:VPN_Test_TSw1:348:   protocol id = ISAKMP:

ike V=root:0:VPN_Test_TSw1:348:      trans_id = KEY_IKE.

ike V=root:0:VPN_Test_TSw1:348:      encapsulation = IKE/none

ike V=root:0:VPN_Test_TSw1:348:         type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256

ike V=root:0:VPN_Test_TSw1:348:         type=OAKLEY_HASH_ALG, val=SHA.

ike V=root:0:VPN_Test_TSw1:348:         type=AUTH_METHOD, val=PRESHARED_KEY.

ike V=root:0:VPN_Test_TSw1:348:         type=OAKLEY_GROUP, val=MODP2048.

ike V=root:0:VPN_Test_TSw1:348: ISAKMP SA lifetime=86400

ike V=root:0:VPN_Test_TSw1:348: received NAT-D payload type 20

ike V=root:0:VPN_Test_TSw1:348: received NAT-D payload type 20

ike V=root:0:VPN_Test_TSw1:348: selected NAT-T version: RFC 3947

ike V=root:0:VPN_Test_TSw1:348: NAT detected: ME

ike V=root:0:VPN_Test_TSw1:348: compute DH shared secret request queued

ike 0:VPN_Test_TSw1:348: ISAKMP SA f28a0d09e11de14b/d5eae735d8a51bc4 key 32:95B4470C719B24F5704BCEB350B100F30E7A7691128D6CDAF3DC5D26A7B26674

ike V=root:0:VPN_Test_TSw1:348: PSK authentication succeeded

ike V=root:0:VPN_Test_TSw1:348: authentication OK

ike V=root:0:VPN_Test_TSw1:348: NAT-T float port 4500

ike V=root:0:VPN_Test_TSw1:348: add INITIAL-CONTACT

ike 0:VPN_Test_TSw1:348: enc F28A0D09E11DE14BD5EAE735D8A51BC40810040100000000000000801400001808C0DBFF1126CDBF9CDC36DDAD2504C38F87DAC214000018F57590E70A8ED26752D23

3CE39973A818E6A8D090B0000182EEA10AF2A93A962B75725FCED62EE35FCB3785C0000001C0000000101106002F28A0D09E11DE14BD5EAE735D8A51BC4

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100401000000000000008CE840B1D5E9E961F05DFAC075F4B46BE47254720A844D2CC7EC0CFA327BD7B67C8193238BB9BD8

DB953525965879181282BCA5A7F18BC426F11FF6DA3502C05D0E20C30F35BC8B80ADA0480950E9F20B8966E9860AC2A176947C227381585651ABC4EAC041E02975833BCF5CB37BA2834

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (agg_i2send): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4

ike V=root:0:VPN_Test_TSw1:348: established IKE SA f28a0d09e11de14b/d5eae735d8a51bc4

ike V=root:0:VPN_Test_TSw1:348: check peer route: if_addr4_rcvd=0, if_addr6_rcvd=0, mode_cfg=0

ike V=root:0:VPN_Test_TSw1:348: initiating mode-cfg pull from peer

ike V=root:0:VPN_Test_TSw1:348: mode-cfg request APPLICATION_VERSION

ike V=root:0:VPN_Test_TSw1:348: mode-cfg request INTERNAL_IP4_ADDRESS

ike V=root:0:VPN_Test_TSw1:348: mode-cfg request INTERNAL_IP4_NETMASK

ike V=root:0:VPN_Test_TSw1:348: mode-cfg request UNITY_SPLIT_INCLUDE

ike V=root:0:VPN_Test_TSw1:348: mode-cfg request UNITY_PFS

ike 0:VPN_Test_TSw1:348: enc F28A0D09E11DE14BD5EAE735D8A51BC408100601A7B1376B0000007C0E0000186DAB60911B0ED6B61EFDC52EF525D8BD21875F1C000000480100B1E90007002C466F7

27469476174652D3430462076372E342E382C6275696C64323739352C323530353233202847412E4D2900010000000200007004000070070000

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100601A7B1376B0000008C8EDDC8B0AEE4EAFC366AECD809ABD9100629EE4770278C255D141825C874C13EDF463E5897756

823B0729D122B3A0E278A064AA6BC173916EA82A63D98BD4608D195C94C5522AC31F992839E9A2F25785AD8B9A637BC992423363CE65DFF5FAD3872F34225FB5F64C51C73583C8874A4

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (cfg_send): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4:a7b1376b

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500 negotiating

ike V=root:0:VPN_Test_TSw1:348: peer has not completed Configuration Method

ike V=root:0:VPN_Test_TSw1:348:VPN_Test_TSw1:1057: Mode Config pending, queuing quick-mode request

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100601A7B1376B0000008C8EDDC8B0AEE4EAFC366AECD809ABD9100629EE4770278C255D141825C874C13EDF463E5897756

823B0729D122B3A0E278A064AA6BC173916EA82A63D98BD4608D195C94C5522AC31F992839E9A2F25785AD8B9A637BC992423363CE65DFF5FAD3872F34225FB5F64C51C73583C8874A4

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (CFG_RETRANS): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4:a7b1376b

ike V=root:0: comes 105.109.199.30:500->192.168.2.2:500,ifindex=5,vrf=0,len=544....

ike V=root:0: IKEv1 exchange=Aggressive id=f28a0d09e11de14b/d5eae735d8a51bc4 len=544 vrf=0

ike 0: in F28A0D09E11DE14BD5EAE735D8A51BC48410040000000000000002200000020400010100F28A0D09E11DE14BD5EAE735D8A51BC40110040000000000000002400400003C0000000100000001

00000030010100010000002801010000800B0001000C00040001518080010007800E010080030001800200028004000E0A0001046658D172AB99266DBC252654A4BE43590374E21F371470589776181EF5

0BEA188B6C1060FB136FFCD34352160C021141A4C64B4E0D065D19BEDD56EF99CDB69115910F98B1216D9910EE9886BCAC47B46A0D0369FCC23B1A3D23EF7DC98AD8E099272F8F560B3DA676C9A3DEDC0C

390B20C631BF928BC2CAE4C8A9A18E2579E4EA76C59FDCF60B639DBE6DB7707D561809E0F2EE8FC0F448004B1FBF9ABD334D0F59270928C3AF7B1E6155232EA3AB1226BCE31F6C86444E29D8807538219A

32BF4BB31AC8D0567D77AF807B582DBECE8D1496905543D6456BB85F9F0188768D593E51BF113504482518A73D58577A5683C7A7D54B0B936D7FE28F0E22DC3C6905000014D2F76DBEABBD56997A627CFA

994B59080800000C02000000526F6F740D000018AB43B27421D140CB6C996F5F991BBCF19A2EE690140000144A131C81070358455C5728F20E95452F140000184B8A47591332356A79D475825A10618498

A0580F0D0000189B94C71424DF0C400387A04BA3B412B8657D79DD0D000014AFCAD71368A1F1C96B8696FC775701000D00001412F5F28C457168A9702D9FE2

ike V=root:0:VPN_Test_TSw1:348: received fragment len 516 id 1 index 1 last 0

ike V=root:0: comes 105.109.199.30:500->192.168.2.2:500,ifindex=5,vrf=0,len=104....

ike V=root:0: IKEv1 exchange=Aggressive id=f28a0d09e11de14b/d5eae735d8a51bc4 len=104 vrf=0

ike 0: in F28A0D09E11DE14BD5EAE735D8A51BC48410040000000000000000680000004C0001020174CC02040D0000148299031757A36082C6A621DE000000000D0000144048B7D56EBCE88525E7DE7F

00D6C2D3000000184048B7D56EBCE88525E7DE7F00D6C2D3C0000000

ike V=root:0:VPN_Test_TSw1:348: received fragment len 76 id 1 index 2 last 1

ike V=root:0:VPN_Test_TSw1:348: frag ID 256 total fragments expected 2

ike V=root:0:VPN_Test_TSw1:348: retransmission, re-send last message

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100401000000000000008CE840B1D5E9E961F05DFAC075F4B46BE47254720A844D2CC7EC0CFA327BD7B67C8193238BB9BD8

DB953525965879181282BCA5A7F18BC426F11FF6DA3502C05D0E20C30F35BC8B80ADA0480950E9F20B8966E9860AC2A176947C227381585651ABC4EAC041E02975833BCF5CB37BA2834

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (retransmit): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4

ike :shrank heap by 159744 bytes

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100601A7B1376B0000008C8EDDC8B0AEE4EAFC366AECD809ABD9100629EE4770278C255D141825C874C13EDF463E5897756

823B0729D122B3A0E278A064AA6BC173916EA82A63D98BD4608D195C94C5522AC31F992839E9A2F25785AD8B9A637BC992423363CE65DFF5FAD3872F34225FB5F64C51C73583C8874A4

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (CFG_RETRANS): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4:a7b1376b

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0: comes 105.109.199.30:500->192.168.2.2:500,ifindex=5,vrf=0,len=544....

ike V=root:0: IKEv1 exchange=Aggressive id=f28a0d09e11de14b/d5eae735d8a51bc4 len=544 vrf=0

ike 0: in F28A0D09E11DE14BD5EAE735D8A51BC48410040000000000000002200000020400020100F28A0D09E11DE14BD5EAE735D8A51BC40110040000000000000002400400003C0000000100000001

00000030010100010000002801010000800B0001000C00040001518080010007800E010080030001800200028004000E0A0001046658D172AB99266DBC252654A4BE43590374E21F371470589776181EF5

0BEA188B6C1060FB136FFCD34352160C021141A4C64B4E0D065D19BEDD56EF99CDB69115910F98B1216D9910EE9886BCAC47B46A0D0369FCC23B1A3D23EF7DC98AD8E099272F8F560B3DA676C9A3DEDC0C

390B20C631BF928BC2CAE4C8A9A18E2579E4EA76C59FDCF60B639DBE6DB7707D561809E0F2EE8FC0F448004B1FBF9ABD334D0F59270928C3AF7B1E6155232EA3AB1226BCE31F6C86444E29D8807538219A

32BF4BB31AC8D0567D77AF807B582DBECE8D1496905543D6456BB85F9F0188768D593E51BF113504482518A73D58577A5683C7A7D54B0B936D7FE28F0E22DC3C6905000014D2F76DBEABBD56997A627CFA

994B59080800000C02000000526F6F740D000018AB43B27421D140CB6C996F5F991BBCF19A2EE690140000144A131C81070358455C5728F20E95452F140000184B8A47591332356A79D475825A10618498

A0580F0D0000189B94C71424DF0C400387A04BA3B412B8657D79DD0D000014AFCAD71368A1F1C96B8696FC775701000D00001412F5F28C457168A9702D9FE2

ike V=root:0:VPN_Test_TSw1:348: received fragment len 516 id 2 index 1 last 0

ike V=root:0: comes 105.109.199.30:500->192.168.2.2:500,ifindex=5,vrf=0,len=104....

ike V=root:0: IKEv1 exchange=Aggressive id=f28a0d09e11de14b/d5eae735d8a51bc4 len=104 vrf=0

ike 0: in F28A0D09E11DE14BD5EAE735D8A51BC48410040000000000000000680000004C0002020174CC02040D0000148299031757A36082C6A621DE000000000D0000144048B7D56EBCE88525E7DE7F

00D6C2D3000000184048B7D56EBCE88525E7DE7F00D6C2D3C0000000

ike V=root:0:VPN_Test_TSw1:348: received fragment len 76 id 2 index 2 last 1

ike V=root:0:VPN_Test_TSw1:348: frag ID 512 total fragments expected 2

ike V=root:0:VPN_Test_TSw1:348: retransmission, re-send last message

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100401000000000000008CE840B1D5E9E961F05DFAC075F4B46BE47254720A844D2CC7EC0CFA327BD7B67C8193238BB9BD8

DB953525965879181282BCA5A7F18BC426F11FF6DA3502C05D0E20C30F35BC8B80ADA0480950E9F20B8966E9860AC2A176947C227381585651ABC4EAC041E02975833BCF5CB37BA2834

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (retransmit): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4

ike V=root:0:VPN_Test_TSw1: NAT keep-alive 5 192.168.2.2->105.109.199.30:4500.

ike 0:VPN_Test_TSw1:348: out FF

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (keepalive): 192.168.2.2:4500->105.109.199.30:4500, len=1, vrf=0, id=ff00000000000000/5101000000000000

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100601A7B1376B0000008C8EDDC8B0AEE4EAFC366AECD809ABD9100629EE4770278C255D141825C874C13EDF463E5897756

823B0729D122B3A0E278A064AA6BC173916EA82A63D98BD4608D195C94C5522AC31F992839E9A2F25785AD8B9A637BC992423363CE65DFF5FAD3872F34225FB5F64C51C73583C8874A4

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (CFG_RETRANS): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4:a7b1376b

ike :shrank heap by 135168 bytes

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1: NAT keep-alive 5 192.168.2.2->105.109.199.30:4500.

ike 0:VPN_Test_TSw1:348: out FF

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (keepalive): 192.168.2.2:4500->105.109.199.30:4500, len=1, vrf=0, id=ff00000000000000/4100000000000000

ike V=root:0: comes 105.109.199.30:500->192.168.2.2:500,ifindex=5,vrf=0,len=544....

ike V=root:0: IKEv1 exchange=Aggressive id=f28a0d09e11de14b/d5eae735d8a51bc4 len=544 vrf=0

ike 0: in F28A0D09E11DE14BD5EAE735D8A51BC48410040000000000000002200000020400030100F28A0D09E11DE14BD5EAE735D8A51BC40110040000000000000002400400003C0000000100000001

00000030010100010000002801010000800B0001000C00040001518080010007800E010080030001800200028004000E0A0001046658D172AB99266DBC252654A4BE43590374E21F371470589776181EF5

0BEA188B6C1060FB136FFCD34352160C021141A4C64B4E0D065D19BEDD56EF99CDB69115910F98B1216D9910EE9886BCAC47B46A0D0369FCC23B1A3D23EF7DC98AD8E099272F8F560B3DA676C9A3DEDC0C

390B20C631BF928BC2CAE4C8A9A18E2579E4EA76C59FDCF60B639DBE6DB7707D561809E0F2EE8FC0F448004B1FBF9ABD334D0F59270928C3AF7B1E6155232EA3AB1226BCE31F6C86444E29D8807538219A

32BF4BB31AC8D0567D77AF807B582DBECE8D1496905543D6456BB85F9F0188768D593E51BF113504482518A73D58577A5683C7A7D54B0B936D7FE28F0E22DC3C6905000014D2F76DBEABBD56997A627CFA

994B59080800000C02000000526F6F740D000018AB43B27421D140CB6C996F5F991BBCF19A2EE690140000144A131C81070358455C5728F20E95452F140000184B8A47591332356A79D475825A10618498

A0580F0D0000189B94C71424DF0C400387A04BA3B412B8657D79DD0D000014AFCAD71368A1F1C96B8696FC775701000D00001412F5F28C457168A9702D9FE2

ike V=root:0:VPN_Test_TSw1:348: received fragment len 516 id 3 index 1 last 0

ike V=root:0: comes 105.109.199.30:500->192.168.2.2:500,ifindex=5,vrf=0,len=104....

ike V=root:0: IKEv1 exchange=Aggressive id=f28a0d09e11de14b/d5eae735d8a51bc4 len=104 vrf=0

ike 0: in F28A0D09E11DE14BD5EAE735D8A51BC48410040000000000000000680000004C0003020174CC02040D0000148299031757A36082C6A621DE000000000D0000144048B7D56EBCE88525E7DE7F

00D6C2D3000000184048B7D56EBCE88525E7DE7F00D6C2D3C0000000

ike V=root:0:VPN_Test_TSw1:348: received fragment len 76 id 3 index 2 last 1

ike V=root:0:VPN_Test_TSw1:348: frag ID 768 total fragments expected 2

ike V=root:0:VPN_Test_TSw1:348: retransmission, re-send last message

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100401000000000000008CE840B1D5E9E961F05DFAC075F4B46BE47254720A844D2CC7EC0CFA327BD7B67C8193238BB9BD8

DB953525965879181282BCA5A7F18BC426F11FF6DA3502C05D0E20C30F35BC8B80ADA0480950E9F20B8966E9860AC2A176947C227381585651ABC4EAC041E02975833BCF5CB37BA2834

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (retransmit): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1: NAT keep-alive 5 192.168.2.2->105.109.199.30:4500.

ike 0:VPN_Test_TSw1:348: out FF

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (keepalive): 192.168.2.2:4500->105.109.199.30:4500, len=1, vrf=0, id=ff00000000000000/4100000000000000

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC408100601A7B1376B0000008C8EDDC8B0AEE4EAFC366AECD809ABD9100629EE4770278C255D141825C874C13EDF463E5897756

823B0729D122B3A0E278A064AA6BC173916EA82A63D98BD4608D195C94C5522AC31F992839E9A2F25785AD8B9A637BC992423363CE65DFF5FAD3872F34225FB5F64C51C73583C8874A4

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (CFG_RETRANS): 192.168.2.2:4500->105.109.199.30:4500, len=140, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4:a7b1376b

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1: NAT keep-alive 5 192.168.2.2->105.109.199.30:4500.

ike 0:VPN_Test_TSw1:348: out FF

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (keepalive): 192.168.2.2:4500->105.109.199.30:4500, len=1, vrf=0, id=ff00000000000000/5101000000000000

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1: NAT keep-alive 5 192.168.2.2->105.109.199.30:4500.

ike 0:VPN_Test_TSw1:348: out FF

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (keepalive): 192.168.2.2:4500->105.109.199.30:4500, len=1, vrf=0, id=ff00000000000000/a100000000000000

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1: NAT keep-alive 5 192.168.2.2->105.109.199.30:4500.

ike 0:VPN_Test_TSw1:348: out FF

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (keepalive): 192.168.2.2:4500->105.109.199.30:4500, len=1, vrf=0, id=ff00000000000000/4100000000000000

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: IPsec SA connect 5 192.168.2.2->105.109.199.30:4500

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: using existing connection

ike V=root:0:VPN_Test_TSw1:VPN_Test_TSw1: config found

ike V=root:0:VPN_Test_TSw1: request is on the queue

ike V=root:0:VPN_Test_TSw1:348::1056: cfg-mode negotiation failed due to retry timeout

ike V=root:0:VPN_Test_TSw1:348: schedule delete of IKE SA f28a0d09e11de14b/d5eae735d8a51bc4

ike V=root:0:VPN_Test_TSw1:348: scheduled delete of IKE SA f28a0d09e11de14b/d5eae735d8a51bc4

ike V=root:0:VPN_Test_TSw1:348: send IKE SA delete f28a0d09e11de14b/d5eae735d8a51bc4

ike 0:VPN_Test_TSw1:348: enc F28A0D09E11DE14BD5EAE735D8A51BC4081005016D56EA00000000500C000018E15FA6A6BAE56070DB4899BF84F19278AE1F2B450000001C0000000101100001F28A0

D09E11DE14BD5EAE735D8A51BC4

ike 0:VPN_Test_TSw1:348: out F28A0D09E11DE14BD5EAE735D8A51BC4081005016D56EA000000005C8CC3C9FCE135981B9E5E3C803B368D80E28DBF01D2DFCCFAECF3AB25EB2BBDA8736A242845B1D

8C3B411637D5915377ABBDCB2FC34C074C3E7C05EC0E59CACDC

ike V=root:0:VPN_Test_TSw1:348: sent IKE msg (ISAKMP SA DELETE-NOTIFY): 192.168.2.2:4500->105.109.199.30:4500, len=92, vrf=0, id=f28a0d09e11de14b/d5eae735d8a51bc4

:6d56ea00

ike V=root:0:VPN_Test_TSw1: connection expiring due to phase1 down

ike V=root:0:VPN_Test_TSw1: going to be deleted

ike V=root:0:VPN_Test_TSw1: reset NAT-T

1 REPLY 1
Nivedha
Staff
Staff

Hi @Borys_DE ,

You are getting peer has not completed Configuration Method error which means mode config is enabled on one peer but disabled on other.

please check the mode config settings ok both peers.

Nivedha Balasubramanian
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors