no matching gateway for new request phase 2I tried to changed the username and peer, the error is the same. So if i use a wrong username or password, there is no difference, still 37125. I' m thinking about the NAT and Ports, do i need to open some ? Or the Fortigate Firewall is enough smart to open automatically if VPN IPSEC is activated ? Best regards and thanks for your answers. =)
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
Fortigate Newbie
FCNSP/WCSP
ike 0:iOS_p1_0:29: mode-cfg type 28672 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28672 ike 0:iOS_p1_0:29: mode-cfg type 28674 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28674 ike 0:iOS_p1_0:29: mode-cfg type 28675 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28675 ike 0:iOS_p1_0:29: mode-cfg type 28676 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28676 ike 0:iOS_p1_0:29: mode-cfg type 28678 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28678 ike 0:iOS_p1_0:29: mode-cfg type 28679 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28679 ike 0:iOS_p1_0:29: mode-cfg type 28673 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28673 ike 0:iOS_p1_0:29: mode-cfg type 28680 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28680 ike 0:iOS_p1_0:29: mode-cfg type 28681 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg not enabled, ignoring Configuration Method Request 28681 ike 0:iOS_p1_0:29: mode-cfg type 28683 request 0:' ' ike 0:iOS_p1_0:29: mode-cfg attribute type 28683 not supported, ignoring ike 0:iOS_p1_0:29: confirmed nat-t RFC 3947 ike 0:iOS_p1_0:29: sent IKE msg (cfg_send): 12.12.12.12:4500->13.13.13.13:4500, len=108 ike 0:iOS_p1_0: link is idle 12 12.12.12.12->13.13.13.13:4500 dpd=1 seqno=1 ike 0:iOS_p1_0: link is idle 12 12.12.12.12->13.13.13.13:4500 dpd=1 seqno=2 ike 0:iOS_p1_0:29: send IKEv1 DPD probe, seqno 2 ike 0:iOS_p1_0:29: confirmed nat-t RFC 3947 ike 0:iOS_p1_0:29: sent IKE msg (R-U-THERE): 12.12.12.12:4500->13.13.13.13:4500, len=92 ike 0: comes 13.13.13.13:4500->12.12.12.12:4500,ifindex=12.... ike 0: IKEv1 exchange=Informational id=d426247074bdaa79/8b3663503e5b3c69:47d3c907 len=92 ike 0: found iOS_p1_0 12.12.12.12 12 -> 13.13.13.13:4500 ike 0:iOS_p1_0:29: notify msg received: R-U-THERE-ACK ike 0:iOS_p1_0: link is idle 12 12.12.12.12->13.13.13.13:4500 dpd=1 seqno=3 ike 0:iOS_p1_0:29: send IKEv1 DPD probe, seqno 3 ike 0:iOS_p1_0:29: confirmed nat-t RFC 3947 ike 0:iOS_p1_0:29: sent IKE msg (R-U-THERE): 12.12.12.12:4500->13.13.13.13:4500, len=92 ike 0: comes 13.13.13.13:4500->12.12.12.12:4500,ifindex=12.... ike 0: IKEv1 exchange=Informational id=d426247074bdaa79/8b3663503e5b3c69:117e9a53 len=92 ike 0: found iOS_p1_0 12.12.12.12 12 -> 13.13.13.13:4500 ike 0:iOS_p1_0:29: notify msg received: R-U-THERE-ACK ike 0: comes 13.13.13.13:4500->12.12.12.12:4500,ifindex=12.... ike 0: IKEv1 exchange=Informational id=d426247074bdaa79/8b3663503e5b3c69:446351ed len=92 ike 0: found iOS_p1_0 12.12.12.12 12 -> 13.13.13.13:4500 ike 0:iOS_p1_0:29: recv ISAKMP SA delete d426247074bdaa79/8b3663503e5b3c69 ike 0:iOS_p1_0: deleting ike 0:iOS_p1_0: flushing ike 0:iOS_p1_0: sending SNMP tunnel DOWN trap ike 0:iOS_p1_0: flushed ike 0:iOS_p1_0: delete dynamic ike 0:iOS_p1_0: deletedIf you have any idea, it would be great !! :D
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1643 | |
1069 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.