Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Leandro
New Contributor

Route-based VPN IPsec

Hello guys, I' m trying to do a IPsec VPN on a Fortigate 60C, the firmware version is v4.0,build5367,101109 (MR2) I have created the Phase 1 and 2, Phase 1 settings: Agressive mode Blank preshared key, Accept peer ID in dialup group " User group" , IKE version 1, Local Gateway IP: Main interface IP P1 proposal: 1 3DES - SHA1 2 AES128 - SHA1 DH Group: 5, Dead Peer Detection. Phase 2 settings: P2 proposal: 1 3DES - SHA1 2 AES128 - SHA1 Enable replay detection Enable perfect foward secrecy (FPS) DH Group 5 Autokey Keep Alive DHCP-IPsec Quick Mode Selector Source address: 0.0.0.0/0 Source port: 0 Destination address: 0.0.0.0/0 Destination port: 0 Protocol: 0 Created 2 firewall rules using the VPN interface pointing to internal and another one from internal to VPN interface. Both rules have: Accept action, No NAT, service ANY; I also created a DHCP server, type IPsec, assinged a free IP range on my internal network, the default gateway is the internal Fortigate interface. The problem is, when I try to connect throught FortiClient I' m not able to, when I check the event log on Fortinet the error message is " IPsec phase 2 error" , the error reason: " no matching gateway for new request" . I' ve also checked the firewall from the client, to see if it is open for IPsec requests. Is this a Phase 2 wrong config? Peer ID problem? To connect I' m using the user a pass that the user have on FortiGate, this user is associated to the user group on the phase 1 config. I appreciate any help.
Leandro
Leandro
10 REPLIES 10
ede_pfau
SuperUser
SuperUser

a) I would not use a blank PSK. Put in something. b) in the quick mode selectors, put your LAN address range into the " destination address" as this is known. c) in the FortiClient setup, put this subnet address into the " destination network" field. The last point makes the Forticlient create a route to the destination.
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
Leandro
New Contributor

Hello ede_pau, thanks for your reply, and sorry for taking so long to reply... I' ve been busy. I followed the steps that you provide but it still not connecting... When I assign the sub-net address for the WAN IP on FortiClient, it shows me a error message that couldn' t find the destination, so I removed, but it still not working. I checked the event log from the fortigate unit and it prompts a error message every time i try to connect it: IPsec phase 2 error ID error: 37125 Reason: no matching gateway for new request. What gateway is that? DHCP gateway?
Leandro
Leandro
Leandro
New Contributor

I' ve changed the Phase 1 mode to Aggressive and the error on event log has disappeared, but the connection still not work. Checking the debug log I found out that the Phase 1 mode should be " Aggressive" instead of " Main" that' s why I changed. Looking through the debug log I see the information below that repeats a lot, and If I am not wrong this is the DPD checking the connection, but why the connection don' t complete then? I' ve altered the IP' s for security reason 200.200.200.200 - Fortigate WAN IP address 172.16.55.125 - internet client IP address
 ike 0:VPN_1_0:199: sent IKE msg (R-U-THERE): 200.200.200.200:4500->172.16.55.125:4500, len=92
 ike 0: comes 172.16.55.125:4500->200.200.200.200:4500,ifindex=5....
 ike 0: IKEv1 exchange=Informational id=c321f87688c36d32/8da768e25382c548:e866802a len=92
 ike 0: found VPN_1_0 200.200.200.200 5 -> 172.16.55.125:4500
 ike 0:VPN_1_0:199: notify msg received: R-U-THERE-ACK
 ike 0:VPN_1_0: link is idle 5 200.200.200.200->172.16.55.125:4500 dpd=1 seqno=2
 ike 0:VPN_1_0:199: send IKEv1 DPD probe, seqno 2
 ike 0:VPN_1_0:199: confirmed nat-t RFC 3947
 ike 0:VPN_1_0:199: sent IKE msg (R-U-THERE): 200.200.200.200:4500->172.16.55.125:4500, len=92
 ike 0: comes 172.16.55.125:4500->200.200.200.200:4500,ifindex=5....
 ike 0: IKEv1 exchange=Informational id=c321f87688c36d32/8da768e25382c548:d72b0923 len=92
 ike 0: found VPN_1_0 200.200.200.200 5 -> 172.16.55.125:4500
 ike 0:VPN_1_0:199: notify msg received: R-U-THERE-ACK
 ike 0:VPN_1_0: link is idle 5 200.200.200.200->172.16.55.125:4500 dpd=1 seqno=3
 ike 0:VPN_1_0:199: send IKEv1 DPD probe, seqno 3
 ike 0:VPN_1_0:199: confirmed nat-t RFC 3947
 
Leandro
Leandro
FTGmaster
New Contributor

did you create the static route for both the fgt? (IP-Mask) Dest_add (device) YourVPN and i' m not sure of what you put as source_add and dest_addr of phase2. try: source_add: your local lan .0/24 (if you have all the subnet) dest_addr: remote lan .0/24 (if you have all the subnet)

FCNSA - FCNSP Certified FortiGate 20D - 30B - 40C - 50B - 60B - 60C - 80C - 100D - 110C FortiAnalyzer 100C FortiAP 220B HA

FCNSA - FCNSP Certified FortiGate 20D - 30B - 40C - 50B - 60B - 60C - 80C - 100D - 110C FortiAnalyzer 100C FortiAP 220B HA
Leandro

Hello FTGmaster, I didn' t create a route because I' m trying to connect a client to the fortigate, not a VPN between 2 fortigates, is that what you meant? For destination I put the LAN behind the internal fortigate unit and for source I leaved " 0.0.0.0/0" for all address. That' s how it is my Phase 2:
Leandro
Leandro
Leandro
New Contributor

I' ve also tried to change de destination address to another subnet that I created but the tunnel doesn' t complete the negotiation. Any clues?
Leandro
Leandro
guygox
New Contributor

I have the same problem. Cannot get an IP through IPSEC DHCP.... Phase 2 does not complete. If " acquire virtual IP" is not checked on the forticlient it works... Please help.. If I use Tunnel Mode instead of Interface mode, it works. My virtual interface get an IP address... I' ve found on forums similar problems but no answer...Except this article : http://www.netexpertise.eu/en/fortinet/fortigate-dialup-vpn-client-gets-no-dhcp-lease.html but it applies to tunnel mode so I don' t know if I have to had a policy
Leandro
New Contributor

I' ve tried that too, but it didn' t work so far.
Leandro
Leandro
pkley
New Contributor

Upgrade to 4.3, they made dialup WAY easier and it actually works. I think there' s an issue with 4.2, I just was trying this and gave up (even tech support couldn' t make it work) since we' re rolling out to newer hardware as we speak and I' ll just set it up on 5.0.1.
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors