Hello,
I'm currently configuring a second client IPSec VPN. The new uses IKEv2, on the same WAN interface/IPaddress. I saw help pages about the PeerID and LocalID, but my tries aren't okay. I have an phase1 error. I put a PeerID on the Authentication frame, and I reported it on the LocalID in the Forticlient configuration as I understand. Is it okay ? What about the LocalID on the Fortigate ?
Is this configuration a problem ?
Solved! Go to Solution.
We worked on this problem with a colleague. We had to modify the configuration in CLI and add two "set eap" lines. We don't use at this time the PeerID/LocalID.
Which phase1 error do you have?
You can use debug command to see more details.
diagnose vpn ike log-filter YOUR-FILTER
diagnose debug application ike -1
diagnose debug console timestamp enable
diagnose debug enable
If I'm not wrong you don't need to configure Local ID on FGT, since it is not for FortiClient but for FGT to FGT tunnel.
I'm assuming the error you are getting is "gw validation failed" in IKE debugging.
When you use IKEv2 for remote access/dialup, you need to add a few commands in CLI to enable EAP as in the KB.
https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-fix-gw-validation-failed-error-IPse...
Local ID on the FGT side can be configured under phase 1 proposal section. However, since FortiClient (7.4.x) side can not configure Peer ID, there is no use for the FGT side's local ID as long as you use FortiClient.
Also, with FGT/FortiClient, those peer ID/local ID are just a string. It doesn't have to be an IP address.
Toshi
Hi @EricS ,
I assume that the first screenshot is for FCT and the second one is for FortiGate IPSec VPN.
The FCT is using IKE v2 and FGT is using IKE v1. They do not match.
The following is from my FCT 7.2:
I can confirm that this is the same for FCT 7.4.
If you are using EMS, the following screenshot is from EMS:
@EricS , so I am not sure why there is no Local ID field in either of your screenshots which makes me confused about which one is for FCT.
@Toshi_Esumi @AEK The actual error in client is No response from the peer, phase1 retransmit reaches maximum count. In VPN FG log, the error is "progress IPsec phase 1" during SA_INIT.
@dingjerry_FTNTThe screenshots concern two differents IPSec VPN for Forticlient. The second is for information.
Can you share the full debug log from FG side? With filter please, you can filter by client IP.
diagnose vpn ike log-filter YOUR-FILTER
diagnose debug application ike -1
diagnose debug console timestamp enable
diagnose debug enable
Hi @EricS ,
Thanks for the information.
Suggestions:
1) Please provide screenshots of your FCT configurations, similar to those I provided. I suspect that your FCT did not configure the correct settings matching the second tunnel.
2) For the second IPSec VPN tunnel, it's better also to enable the "Specific Peer ID" and assign a different Peer ID there.
3) If everything is good, please use the debug commands provided by @AEK to collect some outputs.
NOTE:
The "ike log-filter" command may be different since you did not tell us what your FortiOS version is. You have to use the question mark to tell the corerct syntax of the command.
basically peer ids are used for identification.
You could (as I see you did in your screenshots) limit one side to accept only a specfic id. Then the other side of the tunnel must have exactly this id as local id. Otherways the connection will be refused.
This is also very handy if you happen to have multiple ipsecs on one interface.
If you get a "no response from peer" you should check the ike log on the othe end to see what happened.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
We worked on this problem with a colleague. We had to modify the configuration in CLI and add two "set eap" lines. We don't use at this time the PeerID/LocalID.
User | Count |
---|---|
2626 | |
1400 | |
810 | |
672 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.