Created on 01-26-2010 01:02 AM
duplicate connection detected on name insert, dropping this connection get tunnel info error.I have tried: - wait for the phase1 & 2 timeout - easier pre shared key - deleting all routes, policies, phase 1 & phase 2 linked to this VPN and recreating them - change the phase 1 and phase 2 names by adding a trailer " t" I have around 40 VPN tunnels from multi vendors (checkpoint, fortinet, PIX, ..) never seen that before. Here' s the log on FGT110C side:
0:VPNSSB35t:2650977: responder: main mode get 1st message... 0:VPNSSB35t:2650977: VID RFC 3947 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-08 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-07 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-06 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-05 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-04 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-03 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-02 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-02 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-01 0:VPNSSB35t:2650977: VID draft-ietf-ipsec-nat-t-ike-00 0:VPNSSB35t:2650977: VID DPD 0:VPNSSB35t:2650977: negotiation result 0:VPNSSB35t:2650977: proposal id = 1: 0:VPNSSB35t:2650977: protocol id = ISAKMP: 0:VPNSSB35t:2650977: trans_id = KEY_IKE. 0:VPNSSB35t:2650977: encapsulation = IKE/none 0:VPNSSB35t:2650977: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC. 0:VPNSSB35t:2650977: type=OAKLEY_HASH_ALG, val=SHA. 0:VPNSSB35t:2650977: type=AUTH_METHOD, val=PRESHARED_KEY. 0:VPNSSB35t:2650977: type=OAKLEY_GROUP, val=1024. 0:VPNSSB35t:2650977: ISKAMP SA lifetime=28800 0:VPNSSB35t:2650977: selected NAT-T version: RFC 3947 0:VPNSSB35t:2650977: cookie 1f62f8dce1c7c06e/92bf9de2dfb361aa 0:VPNSSB35t:2650977: sent IKE msg (ident_r1send): myFGT110C:500->myFGT100A:500, len=120 VPNSSB35t: Responder: sent myFGT100A main mode message #1 (OK) 0:VPNSSB35t: link fail 3 myFGT100A->myFGT100A:500 dpd=2 0:VPNSSB35t: created DPD triggered connection: 0x8c7b448 3 myFGT100A->myFGT100A:500. 0:VPNSSB35t: new connection. 0:VPNSSB35t: duplicate connection detected on name insert, dropping this connection 0:VPNSSB35t: get tunnel info error. diag d0: comes myFGT100A:500->myFGT110C:500,ifindex=3.... 0: exchange=Identity Protection id=1f62f8dce1c7c06e/0000000000000000 len=320 0: found VPNSSB35t myFGT110C 3 -> myFGT100A:500 0:VPNSSB35t:2650977: retransmission, re-send last message 0:VPNSSB35t:2650977: sent IKE msg (retransmit): myFGT110C:500->myFGT100A:500, len=120 0:VPNSSB35t:2650977: sent IKE msg (P1_RETRANSMIT): myFGT110C:500->myFGT100A:500, len=120Any idea ? rebooting it (we are not on Win***)? Regards
Hello everyone,
we have the same problem with a tunnel. Is there any solution for this? We would be very grateful for a tip.
Regards
Hello,
The error message "duplicate connection detected on name insert, dropping this connection" in FortiGate indicates that there is a conflict with the VPN configuration name you are trying to create. This error typically occurs when there is an existing VPN configuration with the same name as the one you are attempting to establish.
Could you confirm the firmware version and the model of the Fortigate?
To resolve this issue, you can follow these steps:
Check existing VPN configurations: Verify if there are any VPN configurations with the same name on both FortiGate devices. Look for any duplicate configurations that might be causing the conflict. Ensure you are checking both the Phase 1 and Phase 2 configurations.
Modify VPN configuration names: If you find any conflicting VPN configurations, modify their names to be unique. Append a different identifier or a trailer to the name of the VPN configuration, ensuring it is different from any existing configurations.
Clear existing VPN connections: If there are any existing VPN connections using the same name, terminate or delete them before creating the new VPN tunnel. This will allow you to establish a fresh connection with the modified and unique VPN configuration.
Verify deleted configurations: After deleting any conflicting VPN configurations, double-check that all related routes, policies, and other configurations associated with the previous VPN connections have been completely removed. Sometimes, residual configurations can cause conflicts even if the VPN connection itself has been terminated.
Feel free to contact us if you have any queries .
regards,
Shilpa
Hello,
thank you very much for the feedback.
The firmware on all appliances is at version 7.0.11 build0489. The main site has an FG400F and the other sites have an FG40F.
I can't find any duplicate configurations per site. On the remote sites, some Phase2 selectors have the same names, but only one site is affected by the behavior.
At night, when the IP changes, our monitoring reports that the site is no longer reachable. On the main site, the Fortigate indicates that the tunnel is UP, which is not true. Now when I debug the tunnels, I get the message with the duplicate entry.
When I manually take the tunnel offline and reconnect, the tunnel is reestablished. The next night the game starts all over again.
Greetings
Created on 03-22-2024 11:43 AM Edited on 03-22-2024 11:43 AM
please apply this change on both side of the tunnel
config vpn ipsec phase2-interface
edit <Phase2-Name>
set auto-negotiate enable
set keylifeseconds 1800
next
end
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.