set type dynamic set interface "port1" set ike-version 2 set peertype any set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha384 aes128gcm-prfsha256 set dpd on-idle set dhgrp 20 19 14 set reauth enable set idle-timeout enable set psksecret ENC 1VQ0j0YX34DWAmM8U2OnsibIcaGXjAsuaJfZEE4tZ/YPh1cayPwyql3b47Ro01xQVPs60wZHn4l/f8/mQZnsHidUbGPp7Q61gWN8FP91Q1sbAKuZoCxbFn13+rJAnSS7kkT7OnaB3iYWqf6pU4SZIJjYa2HxRkZglfGuq8TnoetM8g+qc/kFKlHwCTow4m+ZRrsy+A== set dpd-retryinterval 60
My Setup is this.
But whenever I tried to bring up tunnel against fortigate (FortiOS v6.0.9)
I see following error.
ike 0: IKEv2 exchange=SA_INIT id=d740acea5f4716a4/0000000000000000 len=264 ike 0: in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ike 0:d740acea5f4716a4/0000000000000000:4901: responder received SA_INIT msg ike 0:d740acea5f4716a4/0000000000000000:4901: received notify type NAT_DETECTION_SOURCE_IP ike 0:d740acea5f4716a4/0000000000000000:4901: received notify type NAT_DETECTION_DESTINATION_IP ike 0:d740acea5f4716a4/0000000000000000:4901: received notify type FRAGMENTATION_SUPPORTED ike 0:d740acea5f4716a4/0000000000000000:4901: received notify type SIGNATURE_HASH_ALGORITHMS ike 0:d740acea5f4716a4/0000000000000000:4901: received notify type 16406 ike 0:d740acea5f4716a4/0000000000000000:4901: ignoring unauthenticated notify payload (16406) ike 0:d740acea5f4716a4/0000000000000000:4901: incoming proposal: ike 0:d740acea5f4716a4/0000000000000000:4901: proposal id = 1: ike 0:d740acea5f4716a4/0000000000000000:4901: protocol = IKEv2: ike 0:d740acea5f4716a4/0000000000000000:4901: encapsulation = IKEv2/none ike 0:d740acea5f4716a4/0000000000000000:4901: type=ENCR, val=AES_GCM_16 (key_len = 128) ike 0:d740acea5f4716a4/0000000000000000:4901: type=PRF, val=PRF_HMAC_SHA2_256 ike 0:d740acea5f4716a4/0000000000000000:4901: type=DH_GROUP, val=ECP256. ike 0:IKEv2: ignoring IKEv2 request, interface is administratively down ike 0:d740acea5f4716a4/0000000000000000:4901: negotiation failure ike Negotiate SA Error: ike ike [10142]
With same set of cipher suite and setting,
IKEv1 is working fine, but IKEv2 doesn't work.
Looks like it doesn't like the proposal or something, but from the log it is not clear.
Anybody have same issue?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Never seen that, but I would 1st start. trimming the proposal
This is strange, to say the least
"set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha384 aes128gcm-prfsha256"
What are you using on the far end and why so many proposals?
Ken Felix
PCNSE
NSE
StrongSwan
I don't think it's the proposal it's getting. Have you seen in the IKE debug the FGT is sending SA_INIT? It's directional, so both sides should be trying at the same time.
This might happen if a set of proper policies (inbound and outbound) are not applied.
OP, did you get any where or at least a tcpdump to inspect the IKEv2 datagrams?
Ken Felix
PCNSE
NSE
StrongSwan
To answer your questions.
FGT doesn't respond back to initiator with failure reason. It generates phase 1 error locally and that is it.
I have IKEv1 configuration on the same subnet on same port, that is working fine with the given proposal.
Only IKEv2 complains it.
Trim the proposal set and then try
set proposal aes128-sha256
I would not mix GCM with non GCM proposals fwiw
Ken Felix
PCNSE
NSE
StrongSwan
I limit the cipher suite to only 1. AES256-SHA256 DH group 14.
Same issue.
set proposal aes256-sha256 set add-route enable set localid '' set localid-type auto set negotiate-timeout 30 set fragmentation enable set dpd on-idle set forticlient-enforcement disable set comments '' set dhgrp 14
FGTAWS0001344337 # ike 0: comes 66.151.147.212:56493->10.0.0.5:500,ifindex=3.... ike 0: IKEv2 exchange=SA_INIT id=3dd5256b2225383d/0000000000000000 len=464 ike 0: in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ike 0:3dd5256b2225383d/0000000000000000:226: responder received SA_INIT msg ike 0:3dd5256b2225383d/0000000000000000:226: received notify type NAT_DETECTION_SOURCE_IP ike 0:3dd5256b2225383d/0000000000000000:226: received notify type NAT_DETECTION_DESTINATION_IP ike 0:3dd5256b2225383d/0000000000000000:226: received notify type FRAGMENTATION_SUPPORTED ike 0:3dd5256b2225383d/0000000000000000:226: received notify type SIGNATURE_HASH_ALGORITHMS ike 0:3dd5256b2225383d/0000000000000000:226: received notify type 16406 ike 0:3dd5256b2225383d/0000000000000000:226: ignoring unauthenticated notify payload (16406) ike 0:3dd5256b2225383d/0000000000000000:226: incoming proposal: ike 0:3dd5256b2225383d/0000000000000000:226: proposal id = 1: ike 0:3dd5256b2225383d/0000000000000000:226: protocol = IKEv2: ike 0:3dd5256b2225383d/0000000000000000:226: encapsulation = IKEv2/none ike 0:3dd5256b2225383d/0000000000000000:226: type=ENCR, val=AES_CBC (key_len = 256) ike 0:3dd5256b2225383d/0000000000000000:226: type=INTEGR, val=AUTH_HMAC_SHA2_256_128 ike 0:3dd5256b2225383d/0000000000000000:226: type=PRF, val=PRF_HMAC_SHA2_256 ike 0:3dd5256b2225383d/0000000000000000:226: type=DH_GROUP, val=MODP2048. ike 0: cache rebuild start ike 0:Illumio IKEv2: cached as dynamic ike 0: cache rebuild done ike 0:Illumio IKEv2: ignoring IKEv2 request, interface is administratively down ike 0:3dd5256b2225383d/0000000000000000:226: negotiation failure ike Negotiate SA Error: ike ike [10138]
So ikev1 works ikev2 does not. this is strange. Have you double and triple check proposal between the two device? I just ran thru a exhausting ipsec vpn diagnostic and we had a mismatch in the proposals and the fortigate was ignoring the alternative proposals.
Also double check the policy is enabled( i have a hunch it is ) but figure I would throw that out also.
Ken Felix
PCNSE
NSE
StrongSwan
Yes. It is enabled.
With same setup, if I change the peer ike version to 1, it works.
Open a ticket with support. is the other side a fortigate also ? And your confirmed it's IKEv2 enabled ?
Ken Felix
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1714 | |
1093 | |
752 | |
447 | |
232 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.