Hello
After adding a second VPN, "VPN_Gamma," the first one stopped working. Only after disabling the vpn_VPN_Gamma_remote policy did the first VPN start working again. What could be causing this?
Solved! Go to Solution.
Incoming connection attempts are matched to local tunnel phase1 configurations based on:
If the configurations overlap and an incoming connection can match multiple phase1 definitions, the first one sorted alphabetically always wins.
Given that the tunnel named "VPN_Sigma_BR" stops working when you create a tunnel named "Anko", I would say that this is a very strong indicator that their configs overlap, and thus the alphabetically first tunnel wins.
We don't see the full configuration to judge this with 100% certainty, but given the observed behaviour + the fact that both were initially created using the same wizard, this is almost certainly the case.
You will need to review the phase1 settings and decide on what you can and want to change to distinguish the tunnels. You have various options such as using different local IPs for each tunnel (if you have multiple IPs available), or using different interfaces, or using different and non-overlapping crypto settings (e.g. AES256-SHA256 for one tunnel and AES256-SHA384 for the other), using different peer IDs for each tunnel, etc.
Incoming connection attempts are matched to local tunnel phase1 configurations based on:
If the configurations overlap and an incoming connection can match multiple phase1 definitions, the first one sorted alphabetically always wins.
Given that the tunnel named "VPN_Sigma_BR" stops working when you create a tunnel named "Anko", I would say that this is a very strong indicator that their configs overlap, and thus the alphabetically first tunnel wins.
We don't see the full configuration to judge this with 100% certainty, but given the observed behaviour + the fact that both were initially created using the same wizard, this is almost certainly the case.
You will need to review the phase1 settings and decide on what you can and want to change to distinguish the tunnels. You have various options such as using different local IPs for each tunnel (if you have multiple IPs available), or using different interfaces, or using different and non-overlapping crypto settings (e.g. AES256-SHA256 for one tunnel and AES256-SHA384 for the other), using different peer IDs for each tunnel, etc.
User | Count |
---|---|
2571 | |
1364 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.