I do not know a lot about IPSec except there are many layers of encryption in it. But I have to get Dialup IPSec VPN working for our company. I used the Wizard on the FortiGate to do most of the work. Then to build the FortiClient config I looked at the options and tried my best to select the ones that looked correct. But the initial connection is failing. At one point I saw a message that ike failed.
The setup options for both the FortiGate and FortiClient EMS do not seem to be the same or even in the same locations. I have tried a manual config in the client and I have tried a config in EMS which is pushed down to me. The settings in EMS do not even match the settings you can do in the Client. Is there a way to take the FortiGate IPsec config and convert it to a FortiClient config that will work with it? Without being an IPsec expert?
We may help if you can share both configs (you can hide the IP).
you can see the settings for phase1 and 2 running a show full vpn ipsec phase1-interface and phase2-interface.
usually the default settings that the wizard sets is for ikev1 / phase1 aes128/256-sha256 / dh 5 or 14 ( dont set both ) / phase2 pfs on and same dh . some of these settings can be confirmed using the show command above.
Please share ipsec configuration where is also showed phase1 and phase 2. Please also add two FortGates configs. Don't forget to hide classified information.
Fortigate config:
</ipsec_settings>
<on_connect>
<script>
<os>mac</os>
<script>$null</script>
</script>
</on_connect>
<on_disconnect>
<script>
<os>mac</os>
<script>$null</script>
</script>
</on_disconnect>
<tags>
<allowed></allowed>
<prohibited></prohibited>
</tags>
<host_check_fail_warning></host_check_fail_warning>
<keep_running>0</keep_running>
<disclaimer_msg>$null</disclaimer_msg>
<ui>
<show_passcode>0</show_passcode>
<show_remember_password>0</show_remember_password>
<show_alwaysup>0</show_alwaysup>
<show_autoconnect>0</show_autoconnect>
<save_username>0</save_username>
<save_password>0</save_password>
</ui>
</connection>
It looks empty.
Can you share screenshots of both FCT IPsec config and FGT IPsec config?
Fortigate config
config vpn ipsec phase1-interface
    edit *****
        set type dynamic
        set interface "port1"
        set ip-version 4
        set ike-version 2
        set local-gw 0.0.0.0
        set keylife 86400
        set authmethod psk
        unset authmethod-remote
        set peertype any
        set monitor-min 0
        set net-device disable
        set exchange-interface-ip disable
        set aggregate-member disable
        set packet-redistribution disable
        set mode-cfg enable
        set ipv4-wins-server1 0.0.0.0
        set ipv4-wins-server2 0.0.0.0
        set proposal aes128-sha256 aes256-sha256
        set add-route enable
        set localid ''
        set localid-type auto
        set negotiate-timeout 30
        set fragmentation enable
        set ip-fragmentation post-encapsulation
        set dpd on-demand
        set dhgrp 14
        set suite-b disable
        set eap enable
        set eap-identity send-request
        set acct-verify disable
        set ppk disable
        set wizard-type dialup-forticlient
        set reauth disable
        set authusrgrp *******
        set idle-timeout disable
        set ha-sync-esp-seqno enable
        set fgsp-sync disable
        set inbound-dscp-copy disable
        set encapsulation none
        set nattraversal disable
        set fragmentation-mtu 1200
        set childless-ike disable
        set azure-ad-autoconnect disable
        set client-resume disable
        set rekey enable
        set enforce-unique-id disable
        set network-overlay disable
        set dev-id-notification disable
        set link-cost 0
        set kms ''
        set exchange-fgt-device-id disable
        set ems-sn-check disable
        set qkd disable
        set transport tcp
        set fortinet-esp enable
        set remote-gw-match any
        set default-gw 0.0.0.0
        set default-gw-priority 0
        set assign-ip enable
        set assign-ip-from name
        set ipv4-netmask 255.255.255.255
        set dns-mode auto
        set ipv4-split-include *****
        set split-include-service ''
        set ipv4-name *******
        set ipv6-prefix 128
        set ipv6-split-include ''
        set ipv6-name ''
        set ip-delay-interval 0
        set ipv4-split-exclude ''
        set ipv6-split-exclude ''
        set save-password enable
        set client-auto-negotiate enable
        set client-keep-alive enable
        set psksecret ENC **********
        set distance 15
        set priority 1
        set dpd-retrycount 3
        set dpd-retryinterval 20
    next
endForticlient config:
<connection>
    <name>IPSecVPN</name>
    <type>manual</type>
    <ike_settings>
        <version>2</version>
        <eap_method>0</eap_method>
        <sso_enabled>1</sso_enabled>
        <ike_saml_port>10666</ike_saml_port>
        <use_external_browser>1</use_external_browser>
        <prompt_certificate>0</prompt_certificate>
        <description></description>
        <server>example.com</server>
        <authentication_method>Preshared Key</authentication_method>
        <auth_key></auth_key>
        <auth_data>
            <preshared_key>Enc ****</preshared_key>
            <certificate></certificate>
        </auth_data>
        <mode>aggressive</mode>
        <dhgroup>14</dhgroup>
        <key_life>86400</key_life>
        <localid></localid>
        <nat_traversal>0</nat_traversal>
        <networkid>0</networkid>
        <sase_mode>0</sase_mode>
        <mode_config>1</mode_config>
        <enable_local_lan>0</enable_local_lan>
        <enable_ike_fragmentation>0</enable_ike_fragmentation>
        <dpd>1</dpd>
        <xauth>
            <enabled>0</enabled>
            <prompt_username>0</prompt_username>
            <username>Enc ****</username>
            <password>Enc ****</password>
        </xauth>
        <proposals>
            <proposal>AES128|SHA256</proposal>
            <proposal>AES256|SHA256</proposal>
        </proposals>
        <fgt>0</fgt>
    </ike_settings>
    <ipsec_settings>
        <remote_networks></remote_networks>
        <dhgroup>14</dhgroup>
        <key_life_type>both</key_life_type>
        <key_life_seconds>43200</key_life_seconds>
        <key_life_Kbytes>5120</key_life_Kbytes>
        <replay_detection>0</replay_detection>
        <pfs>1</pfs>
        <use_vip>1</use_vip>
        <virtualip>
            <type>modeconfig</type>
            <ip></ip>
            <mask></mask>
            <dnsserver></dnsserver>
        </virtualip>
        <proposals>
            <proposal>AES128|SHA256</proposal>
            <proposal>AES256|SHA256</proposal>
        </proposals>
        <ipv4_split_exclude_networks></ipv4_split_exclude_networks>
    </ipsec_settings>
    <on_connect>
        <script>
            <os>mac</os>
            <script>$null</script>
        </script>
    </on_connect>
    <on_disconnect>
        <script>
            <os>mac</os>
            <script>$null</script>
        </script>
    </on_disconnect>
    <tags>
        <allowed></allowed>
        <prohibited></prohibited>
    </tags>
    <host_check_fail_warning></host_check_fail_warning>
    <keep_running>0</keep_running>
    <disclaimer_msg>$null</disclaimer_msg>
    <ui>
        <show_passcode>0</show_passcode>
        <show_remember_password>0</show_remember_password>
        <show_alwaysup>0</show_alwaysup>
        <show_autoconnect>0</show_autoconnect>
        <save_username>0</save_username>
        <save_password>0</save_password>
    </ui>
</connection>If your client is behind a router then enable NAT traversal on both FCT and FGT.
Created on ‎04-15-2025 04:08 AM Edited on ‎04-15-2025 04:28 AM
Unless you want to count an AWS EIP as behind a router its not.
Right now I am getting: "116: no proposal chosen, send error response" On the Fortigate when I am running debug there. I can only guess that the proposal offered in the debug is the clients offer????
 
					
				
				
			
		
| User | Count | 
|---|---|
| 2678 | |
| 1412 | |
| 810 | |
| 703 | |
| 455 | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.