Hello, I need your help. I'm trying to set up an IPsec remote access VPN on FortiGate for the first time. Unfortunately, when I try to connect, after clicking "Connect," it shows "timeout while connecting to IP address." I was following this guide.
https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-configure-IPsec-remote-access-with-...
https://www.youtube.com/watch?v=diRUIQGnWqs
If you can, please help me — what could be the reason?
Hi Liza
On the remote FGT type this and try again.
diagnose vpn ike log-filter src-addr4 x.x.x.x
diagnose debug console timestamp enable
diagnose debug application ike -1
diagnose debug enable
Where x.x.x.x is the client public IP.
This should give you more information about the failure.
Created on 07-21-2025 06:54 AM Edited on 07-21-2025 06:55 AM
# ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:189: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::189: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:189: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:189: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:190: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::190: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:190: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:190: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:191: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::191: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:191: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:191: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X5:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:192: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::192: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:192: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:192: no SA proposal chosen
ike :shrank heap by 159744 bytes
You need to verify four configuration points: Phase 1, Phase 2, Firewall Policy, and Routing.
Use IKE debug commands to gather data for IPsec Phase 1 and Phase 2.
Ping can help you check reachability, and finally, you can run a debug flow to verify how IPsec packets are being processed.
# diagnose debug flow filter clear
# diagnose debug flow filter dport <port>
# diagnose debug flow filter addr <IP address>
# diagnose debug flow trace start <count>
# diagnose debug enable
Created on 07-21-2025 06:52 AM Edited on 07-21-2025 06:55 AM
this is debug infomation
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:189: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:189: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::189: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:189: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:189: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:189: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:189: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:189: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:189: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:189: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:189: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:190: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:190: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::190: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:190: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:190: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:190: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:190: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:190: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:190: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:190: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:190: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:191: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:191: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::191: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:191: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:191: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:191: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:191: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:191: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:191: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:191: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:191: no SA proposal chosen
ike V=root:0: comes X.X.X.X:1068->X.X.X.X5:500,ifindex=3,vrf=0,len=412....
ike V=root:0: IKEv1 exchange=Aggressive id=63bbeace24f33672/0000000000000000 len=412 vrf=0
ike 0: in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
ike V=root:0:63bbeace24f33672/0000000000000000:192: responder: aggressive mode get 1st message...
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID CISCO-UNITY 12F5F28C457168A9702D9FE274CC0100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID RFC 3947 4A131C81070358455C5728F20E95452F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID DPD AFCAD71368A1F1C96B8696FC77570100
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID forticlient connect license 4C53427B6D465D1B337BB755A37A7FEF
ike V=root:0:63bbeace24f33672/0000000000000000:192: VID Fortinet Endpoint Control B4F01CA951E9DA8D0BAFBBD34AD3044E
ike V=root:0::192: peer identifier IPV4_ADDR 172.20.10.2
ike V=root:0: IKEv1 Aggressive, comes X.X.X.X:1068->X.X.X.X 3
ike V=root:0:63bbeace24f33672/0000000000000000:192: my proposal, gw Remote_access:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP2048.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY_XAUTH_I.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 1:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=MODP1536.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: incoming proposal:
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=128
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: proposal id = 0:
ike V=root:0:63bbeace24f33672/0000000000000000:192: protocol id = ISAKMP:
ike V=root:0:63bbeace24f33672/0000000000000000:192: trans_id = KEY_IKE.
ike V=root:0:63bbeace24f33672/0000000000000000:192: encapsulation = IKE/none
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC, key-len=256
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_HASH_ALG, val=SHA2_256.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=AUTH_METHOD, val=PRESHARED_KEY.
ike V=root:0:63bbeace24f33672/0000000000000000:192: type=OAKLEY_GROUP, val=ECP384.
ike V=root:0:63bbeace24f33672/0000000000000000:192: ISAKMP SA lifetime=86400
ike V=root:0:63bbeace24f33672/0000000000000000:192: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:192: no SA proposal chosen
ike :shrank heap by 159744 bytes
Please check the article for the troubleshooting steps
FYI
ike V=root:0:63bbeace24f33672/0000000000000000:189: negotiation failure
ike V=root:Negotiate ISAKMP SA Error:
ike V=root:0:63bbeace24f33672/0000000000000000:189: no SA proposal chosen
what does it mean please help
The error “no SA proposal chosen” indicates that none of the proposals sent by the initiator matched the responder's accepted parameters.
okay, i will try again and change in the responder's side parameters.After that, i will write you if it works.
User | Count |
---|---|
2534 | |
1351 | |
795 | |
641 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.