Bill ========== Fortigate 600C 5.0.12, 111C 5.0.2 Logstash 1.4.1
CISSP, NSE4
ike 0:BOStoRIp1:2574:31191: peer: type=7/7, local=0:192.168.1.0-192.168.1.255:0, remote=0:192.168.8.0-192.168.8.255:0 ike 0:BOStoRIp1:2574:31191: mine: type=7/7, local=0:0.0.0.0-255.255.255.255:0, remote=0:0.0.0.0-255.255.255.255:0Hi, your problems are not related to MR2 or MR3... There are just wrong Phase 2 settings! These IP adresses have to match on both sides to establish a tunnel... I don' t know the D-Ling devices, but it seems you will have to use 192.168.x.0 as your Phase 2 selectors! best regards, roman
Bill ========== Fortigate 600C 5.0.12, 111C 5.0.2 Logstash 1.4.1
ORIGINAL: ede_pfau As said before this is NOT a version issue. You have got the quick mode selectors mixed up - exchange source and destination. Check the router if you have the correct subnet specified behind the tunnel (if that is possible). IPSec VPN is not black magic / voodoo but you have to get some knowledge about the relevant parameters. I see that you even use the debug feature. Then I assume you have worked through the IPSec VPN chapter in the FortiOS Handbook as well. The role of the QM selectors is explained quite clearly and a lot of examples given which do work. Of course, the D-Link side might bear some undocumented restrictions (as experienced with Draytek routers myself). One of the reasons why I changed all SOHO locations to 1. a dumb modem in bridge mode plus 2. a small Fortigate. No more hassles and total control. One more caveat: while experimenting bear in mind that both devices must be ' clean' after you change anything in the parameters. That is, any SA must either time out or be torn down before trying to establish the tunnel. On a FGT the command ' diag vpn tun flush' will do that. No idea about the D-Link side.+1 with what ede_pfau said. I beat my head against the wall trying to get our FGT' s to VPN with a Checkpoint unit. I was getting the same errors you are and it was because of the quick-mode selector. Checkpoint called them " encryption domains" and the admin on the other side had them set whereas my QM' s weren' t. Once we had them in tune with each other, and the previous tunnels were torn down, all was good.
Created on 05-02-2011 08:05 AM
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.