FGT80C3909641787 # diag debug ena FGT80C3909641787 # diag debug cons ti ena FGT80C3909641787 # diag debug app ike -1 FGT80C3909641787 # 2010-06-11 12:11:26 ike 0:EM_Mem_Test:Em_Mem_Test_Ph2: IPsec SA connect 4 65.182.241.92->170.138.39.78:500, natt_mode=0 2010-06-11 12:11:26 ike 0:EM_Mem_Test: found phase2 Em_Mem_Test_Ph2 2010-06-11 12:11:26 ike 0:EM_Mem_Test: created connection: 0x90d53b0 4 65.182.241.92->170.138.39.78:500. 2010-06-11 12:11:26 ike 0:EM_Mem_Test: new connection. 2010-06-11 12:11:26 ike 0:EM_Mem_Test: IPsec SA connect 4 65.182.241.92->170.138.39.78:500 negotiating 2010-06-11 12:11:26 ike 0:EM_Mem_Test: no suitable ISAKMP SA, queuing quick-mode request and initiating ISAKMP SA negotiation 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: initiator: main mode is sending 1st message... 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: cookie 0e536b925523ce5d/0000000000000000 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: sent IKE msg (ident_i1send): 65.182.241.92:500->170.138.39.78:500, len=220 2010-06-11 12:11:26 ike 0: comes 170.138.39.78:500->65.182.241.92:500,ifindex=4.... 2010-06-11 12:11:26 ike 0: IKEv1 exchange=Identity Protection id=0e536b925523ce5d/25f80de75d565166 len=104 2010-06-11 12:11:26 ike 0: found EM_Mem_Test 65.182.241.92 4 -> 170.138.39.78:500 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: initiator: main mode get 1st response... 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: VID FRAGMENTATION 4048B7D56EBCE88525E7DE7F00D6C2D3C0000000 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: negotiation result 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: proposal id = 1: 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: protocol id = ISAKMP: 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: trans_id = KEY_IKE. 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: encapsulation = IKE/none 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC. 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: type=OAKLEY_HASH_ALG, val=SHA. 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: type=AUTH_METHOD, val=PRESHARED_KEY. 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: type=OAKLEY_GROUP, val=1024. 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: ISKAMP SA lifetime=28800 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: sent IKE msg (ident_i2send): 65.182.241.92:500->170.138.39.78:500, len=180 2010-06-11 12:11:26 ike 0: comes 170.138.39.78:500->65.182.241.92:500,ifindex=4.... 2010-06-11 12:11:26 ike 0: IKEv1 exchange=Identity Protection id=0e536b925523ce5d/25f80de75d565166 len=256 2010-06-11 12:11:26 ike 0: found EM_Mem_Test 65.182.241.92 4 -> 170.138.39.78:500 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: initiator: main mode get 2nd response... 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: VID unknown (16): D03FAAFA5D5751661E2FC3B52381FC42 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: VID unknown (16): 1F07F70EAA6514D3B0FA96542A500100 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: add initial-contact 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: sent IKE msg (ident_i3send): 65.182.241.92:500->170.138.39.78:500, len=100 2010-06-11 12:11:26 ike 0: comes 170.138.39.78:500->65.182.241.92:500,ifindex=4.... 2010-06-11 12:11:26 ike 0: IKEv1 exchange=Identity Protection id=0e536b925523ce5d/25f80de75d565166 len=84 2010-06-11 12:11:26 ike 0: found EM_Mem_Test 65.182.241.92 4 -> 170.138.39.78:500 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: initiator: main mode get 3rd response... 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: VID DPD AFCAD71368A1F1C96B8696FC77570100 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: PSK authentication succeeded 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: authentication OK 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: established IKE SA 0e536b925523ce5d/25f80de75d565166 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: initiating pending Quick-Mode negotiations 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: cookie 0e536b925523ce5d/25f80de75d565166:25ef65a6 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161:Em_Mem_Test_Ph2:100038: initiator selectors 0 10.0.0.0/255.255.255.0:0->170.138.33.0/255.255.255.0:0 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: sent IKE msg (quick_i1send): 65.182.241.92:500->170.138.39.78:500, len=156 2010-06-11 12:11:26 ike 0: comes 170.138.39.78:500->65.182.241.92:500,ifindex=4.... 2010-06-11 12:11:26 ike 0: IKEv1 exchange=Informational id=0e536b925523ce5d/25f80de75d565166:392cf18a len=84 2010-06-11 12:11:26 ike 0: found EM_Mem_Test 65.182.241.92 4 -> 170.138.39.78:500 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: notify msg received: NO-PROPOSAL-CHOSEN 2010-06-11 12:11:26 ike 0: comes 170.138.39.78:500->65.182.241.92:500,ifindex=4.... 2010-06-11 12:11:26 ike 0: IKEv1 exchange=Informational id=0e536b925523ce5d/25f80de75d565166:afd6c8f5 len=84 2010-06-11 12:11:26 ike 0: found EM_Mem_Test 65.182.241.92 4 -> 170.138.39.78:500 2010-06-11 12:11:26 ike 0:EM_Mem_Test:336161: recv ISAKMP SA delete 0e536b925523ce5d/25f80de75d565166 2010-06-11 12:11:26 ike 0:EM_Mem_Test: deleting 2010-06-11 12:11:26 ike 0:EM_Mem_Test: flushing 2010-06-11 12:11:26 ike 0:EM_Mem_Test: flushed 2010-06-11 12:11:26 ike 0:EM_Mem_Test: deleted diag debug app ike 0Any suggestions / comments? I sent the settings off to the customer, and I know we' re running the same Phase 1 & 2 values (other than the phase 2 source/destination addresses). -- Rich
PCNSE
NSE
StrongSwan
ORIGINAL: rphaneuf And any suggestions on the configuration for a Interface mode tunnel set-up? -- RichYou will need to add static routes to the remote subnets when using interface mode.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
tunnel-group 65.182.241.92 type ipsec-l2l tunnel-group 65.182.241.92 ipsec-attributes pre-shared-key * crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 name 65.182.241.92 Regence_65.182.241.92 description Regence_65.182.241.92 access-list WAN_cryptomap_103 extended permit ip host 170.138.33.129 host Regence_65.182.241.92 crypto map WAN_map1 109 set peer Regence_65.182.241.92 crypto map WAN_map1 109 match address WAN_cryptomap_103 crypto map WAN_map1 109 set pfs crypto map WAN_map1 109 set peer Regence_65.182.241.92 crypto map WAN_map1 109 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5 crypto map WAN_map1 109 set reverse-routeThanks for the help guys!
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.