Tried with both versions 6.0.1 and 6.0.2. Both fail with IPSec VPN connections. Only 6.0.0 works.
Grabbing logs from the receiving fortigate always returns:
ike 0:FC-IPSec:276457: parse error ike 0:FC-IPSec:276457: probable pre-shared secret mismatch
Even after changing the PSK at the FG and the FCT it still shows this error on a debug reverting to 6.0.0 fixes the issue.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi
Just share the both the conf will helpful for us to support u .may b conf issue.Did you enabled Mode_cfg on both Gateway and Client .Also match the P1 and P2 proposals.
FG SRA IPSec conf:
config vpn ipsec phase1-interface edit "FC-IPSec" set type dynamic set interface "wan1" set peertype any set mode-cfg enable set ipv4-dns-server1 xxx set ipv4-dns-server2 xxx set proposal aes128-sha256 aes256-sha256 set npu-offload disable set xauthtype auto set authusrgrp "IT-VPN" set idle-timeout enable set idle-timeoutinterval 10 set ipv4-start-ip 10.133.7.100 set ipv4-end-ip 10.133.7.150 set ipv4-split-include "FC-IPSec_split" set psksecret xxx next end
config vpn ipsec phase2-interface edit "FC-IPSec" set phase1name "FC-IPSec" set proposal aes128-sha256 aes256-sha256 set pfs enable set dhgrp 14 set replay enable set keepalive disable set add-route phase1 set auto-discovery-sender phase1 set auto-discovery-forwarder phase1 set keylife-type seconds set single-source disable set route-overlap use-new set encapsulation tunnel-mode set comments '' set protocol 0 set src-addr-type subnet set src-port 0 set dst-addr-type subnet set dst-port 0 set keylifeseconds 43200 set src-subnet 0.0.0.0 0.0.0.0 set dst-subnet 0.0.0.0 0.0.0.0 next end
The VPN settings are actually pushed down by EMS onto the clients but for testing of the new clients I manually install the latest versions before I will have users upgrade.
FCT VPN settings:
These are identical between all versions 6.0.0 and above as I said they are pushed out by an EMS profile. But 6.0.1 and 6.0.2 will give errors of probable preshared key mismtach. After reversion to 6.0.0 the PSK mismatch goes away.
Hi,
IPSEC configuration looks fine and the image is missing for please upload forticlient conf.
EMS doesn't allow me to pull the config and its a pain to change and push the profile. Here's a screen capture.
Hi
Config looks fine.I hope FGT device mode is main mode since client mode set to main .
Yes the FGT (200E 6.0.2)is in main mode as well. The IPSec connection works fine on FCT 6.0.0. If I upgrade to 6.0.1 or 6.0.2 the IPSec connection will continually fail stating probable PSK mismatch (these vpn settings are pushed by EMS so no risk of fat fingering). The connection will only work after downgrading back to 6.0.0.
I think there is no issue in the vpn , i am suspecting some Bug in the software or EMS software compatibility with New FCT version .So I suggest your to open a TAC case .
Opened up a TAC case. It was discovered that using more than 1 DH group on the phase 1 proposal was causing the issue (at least in the case of DH group 5 and 14). Removing DH group 14 allowed the FCT VPN connection to succeed.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1634 | |
1063 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.