Hi,
Recently one of the site of the firewall decides to stop working for the VPN. When on the debug, The IKE shows that the Phase 1 negotiation time out. As for the log view in the web console its only keeps show phase 1 success. All firewalls are Fortigate.
ike 0: comes X.X.X.X:500->Y.Y.Y.Y:500,ifindex=5....
ike 0: IKEv2 exchange=SA_INIT id=4d03992337029789/0000000000000000 len=348
ike 0: in 4D03992337029789000000000000000021202208000000000000015C2200002C00000028010100040300000801000003030000080200000103000008030000010000000804000005280000C8000500009D7A8D55E483ED2E018CF35A406E4A8FF1159E5AB4E9F903667F17082D7FC9F5A44CB5B82E81DA3293CC6E8816F99EC0F513994D21228AD94B6021A529B36A4D6AC80B07710AA6BFDB48800041764D037CB07ADEC0DA020161A8002D4F42E4394C20C493915158119DDC6DCEF7A6E0BE84D6C8C93C53536834C8CF03653B49E4EE27D32EB360C97F2A0384B7A3AFE3C703FE408CD308346B82B518372F2CC3DE3E17741115BCB1B29C6D8B54EBF43F6CD788FDDC9DA068DBA6049700BC196CFB29000014EB1CD341E406B538F470C4BB44BA5C472900001C00004004522F7FE21A8090EA25E264B04C8AFB19BEFE6C290000001C00004005A1F195460BB9B0BF6ECF97A0248DFE293F67D64B
ike 0:4d03992337029789/0000000000000000:13566: responder received SA_INIT msg
ike 0:4d03992337029789/0000000000000000:13566: received notify type NAT_DETECTION_SOURCE_IP
ike 0:4d03992337029789/0000000000000000:13566: received notify type NAT_DETECTION_DESTINATION_IP
ike 0:4d03992337029789/0000000000000000:13566: incoming proposal:
ike 0:4d03992337029789/0000000000000000:13566: proposal id = 1:
ike 0:4d03992337029789/0000000000000000:13566: protocol = IKEv2:
ike 0:4d03992337029789/0000000000000000:13566: encapsulation = IKEv2/none
ike 0:4d03992337029789/0000000000000000:13566: type=ENCR, val=3DES_CBC
ike 0:4d03992337029789/0000000000000000:13566: type=INTEGR, val=AUTH_HMAC_MD5_96
ike 0:4d03992337029789/0000000000000000:13566: type=PRF, val=PRF_HMAC_MD5
ike 0:4d03992337029789/0000000000000000:13566: type=DH_GROUP, val=MODP1536.
ike 0:4d03992337029789/0000000000000000:13566: matched proposal id 1
ike 0:4d03992337029789/0000000000000000:13566: proposal id = 1:
ike 0:4d03992337029789/0000000000000000:13566: protocol = IKEv2:
ike 0:4d03992337029789/0000000000000000:13566: encapsulation = IKEv2/none
ike 0:4d03992337029789/0000000000000000:13566: type=ENCR, val=3DES_CBC
ike 0:4d03992337029789/0000000000000000:13566: type=INTEGR, val=AUTH_HMAC_MD5_96
ike 0:4d03992337029789/0000000000000000:13566: type=PRF, val=PRF_HMAC_MD5
ike 0:4d03992337029789/0000000000000000:13566: type=DH_GROUP, val=MODP1536.
ike 0:4d03992337029789/0000000000000000:13566: lifetime=86400
ike 0:4d03992337029789/0000000000000000:13566: SA proposal chosen, matched gateway VPN_HQ
ike 0:VPN_HQ:13566: processing notify type NAT_DETECTION_SOURCE_IP
ike 0:VPN_HQ:13566: processing NAT-D payload
ike 0:VPN_HQ:13566: NAT not detected
ike 0:VPN_HQ:13566: process NAT-D
ike 0:VPN_HQ:13566: processing notify type NAT_DETECTION_DESTINATION_IP
ike 0:VPN_HQ:13566: processing NAT-D payload
ike 0:VPN_HQ:13566: NAT not detected
ike 0:VPN_HQ:13566: process NAT-D
ike 0:VPN_HQ:13566: responder preparing SA_INIT msg
ike 0:VPN_HQ:13566: out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
ike 0:VPN_HQ:13566: sent IKE msg (SA_INIT_RESPONSE): Y.Y.Y.Y:500->X.X.X.X:500, len=348, id=4d03992337029789/21a5b3617dd3618f
ike 0:VPN_HQ:13566: IKE SA 4d03992337029789/21a5b3617dd3618f SK_ei 24:AD4C6B14130CFA8EF5AD5728E9F688EEAA5BEB229F01AB10
ike 0:VPN_HQ:13566: IKE SA 4d03992337029789/21a5b3617dd3618f SK_er 24:BD852424A55C147A165580B8AA3BF54B1C770C6E1B932CB6
ike 0:VPN_HQ:13566: IKE SA 4d03992337029789/21a5b3617dd3618f SK_ai 16:3485F9628319F123BE6AFF97252B5724
ike 0:VPN_HQ:13566: IKE SA 4d03992337029789/21a5b3617dd3618f SK_ar 16:0F005F9182CEE2C170EDA959554BFA39
ike 0: comes 219.92.67.198:500->121.121.15.131:500,ifindex=5....
ike 0: IKEv2 exchange=SA_INIT id=4d03992337029789/0000000000000000 len=348
ike 0: in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
ike 0:VPN_HQ:13566: detected retransmit, resend last message
ike 0:VPN_HQ:13566: out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
ike 0:VPN_HQ:13566: sent IKE msg (retransmit): Y.Y.Y.Y:500->X.X.X.X:500, len=348, id=4d03992337029789/21a5b3617dd3618f
ike 0: comes 219.92.67.198:500->121.121.15.131:500,ifindex=5....
ike 0: IKEv2 exchange=SA_INIT id=4d03992337029789/0000000000000000 len=348
ike 0: in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
ike 0:VPN_HQ:13566: detected retransmit, resend last message
ike 0:VPN_HQ:13566: out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
ike 0:VPN_HQ:13566: sent IKE msg (retransmit): Y.Y.Y.Y:500->X.X.X.X:500, len=348, id=4d03992337029789/21a5b3617dd3618f
ike 0: comes X.X.X.X:500->Y.Y.Y.Y:500,ifindex=5....
ike 0: IKEv2 exchange=SA_INIT id=e1d5d68ec8a21de0/0000000000000000 len=348
ike 0: in E1D5D68EC8A21DE0000000000000000021202208000000000000015C2200002C00000028010100040300000801000003030000080200000103000008030000010000000804000005280000C8000500003CBD10221886C882A7F0D7F879C81F26D9DC400F3AE2DBD80B7681A05E5EC8B677E0F74D78FDFA6579C3B6326A36330D6FCF02DDBE3F59F60929800C895F05F5E391EBAA6FFE7E6628AE2BEC8E2A143F161B201C96777D0AA1DBC4946DE06454D0B8E3FB16F77B279B900BD4BEC12A7AC3DF4E1DA191E06F46016A798AABD638DA476BF71E3353DBBAD5E5F19DEEEA5599282D53733A59514C7725E3A739E754811CA26550784DBC74046E63A7227C4EF8F8F2BF32B9DBE37F6F63D13874CA4B290000149CC6972D01647A735807AE564AD808072900001C000040041EB5F88F4A90B6498581271C1737133F8E26250A0000001C00004005658363A63E51A5B450CB814DD7EA7D8982CE0E13
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: responder received SA_INIT msg
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: received notify type NAT_DETECTION_SOURCE_IP
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: received notify type NAT_DETECTION_DESTINATION_IP
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: incoming proposal:
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: proposal id = 1:
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: protocol = IKEv2:
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: encapsulation = IKEv2/none
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=ENCR, val=3DES_CBC
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=INTEGR, val=AUTH_HMAC_MD5_96
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=PRF, val=PRF_HMAC_MD5
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=DH_GROUP, val=MODP1536.
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: matched proposal id 1
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: proposal id = 1:
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: protocol = IKEv2:
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: encapsulation = IKEv2/none
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=ENCR, val=3DES_CBC
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=INTEGR, val=AUTH_HMAC_MD5_96
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=PRF, val=PRF_HMAC_MD5
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: type=DH_GROUP, val=MODP1536.
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: lifetime=86400
ike 0:e1d5d68ec8a21de0/0000000000000000:13568: SA proposal chosen, matched gateway VPN_HQ
ike 0: found VPN_HQ Y.Y.Y.Y 5 -> X.X.X.X:500
ike 0:VPN_HQ:13568: processing notify type NAT_DETECTION_SOURCE_IP
ike 0:VPN_HQ:13568: processing NAT-D payload
ike 0:VPN_HQ:13568: NAT not detected
ike 0:VPN_HQ:13568: process NAT-D
ike 0:VPN_HQ:13568: processing notify type NAT_DETECTION_DESTINATION_IP
ike 0:VPN_HQ:13568: processing NAT-D payload
ike 0:VPN_HQ:13568: NAT not detected
ike 0:VPN_HQ:13568: process NAT-D
ike 0:VPN_HQ:13568: responder preparing SA_INIT msg
ike 0:VPN_HQ:13568: out E1D5D68EC8A21DE0A8A06E3B05D261DC21202220000000000000015C2200002C00000028010100040300000801000003030000080200000103000008030000010000000804000005280000C800050000D37B72D095D5FEEE24D805CCEFA7625C533115A9F340FB2B309FACA2FCCD5D399B3CC72E3C6CE3FF66F3DDB10ED6C0AC755B91497FC7A67DB334658B346B19153D87D949654964DAAC4DAA2D39FD0E4DE91E87EEBD59187839CCB460B26ABCC91362B5A862DAB22548FFEF0A9D4169325C69D32F036174AABE28B7DF28A17224CE8FD285BEE1F54EF137AF0C0B985EC32A9E56698F220E0BBB63E30B7AC87AA7999420A842A206005434920A922A3173E99ED42830AB862BF22CE164FD506DAF290000149EFBA2AD36F3E40D329499702E2331312900001C000040044B440D2BA447EA36524D0445F2C9141A68538D840000001C000040054C957C2AB526C02AEE0B87962B7BB2EC1E8B24B4
ike 0:VPN_HQ:13568: sent IKE msg (SA_INIT_RESPONSE): Y.Y.Y.Y:500->X.X.X.X:500, len=348, id=e1d5d68ec8a21de0/a8a06e3b05d261dc
ike 0:VPN_HQ:13568: IKE SA e1d5d68ec8a21de0/a8a06e3b05d261dc SK_ei 24:CF64D9DF6CC14F132999778381DBA49EDE8763C9604FA12C
ike 0:VPN_HQ:13568: IKE SA e1d5d68ec8a21de0/a8a06e3b05d261dc SK_er 24:5E882D184B06CEAFF67407E5EFA04C2188A962A756757158
ike 0:VPN_HQ:13568: IKE SA e1d5d68ec8a21de0/a8a06e3b05d261dc SK_ai 16:B8DADEA865B968DD84F9AA70753E6FE1
ike 0:VPN_HQ:13568: IKE SA e1d5d68ec8a21de0/a8a06e3b05d261dc SK_ar 16:6D5B8B8CB8609363E063DE0E24A37B4B
ike 0:VPN_HQ:13566: negotiation timeout, deleting
ike 0:VPN_HQ: schedule auto-negotiate
ike 0: comes X.X.X.X:500->Y.Y.Y.Y:500,ifindex=5....
ike 0: IKEv2 exchange=SA_INIT id=e1d5d68ec8a21de0/0000000000000000 len=348
ike 0: in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
ike 0:VPN_HQ:13568: detected retransmit, resend last message
ike 0:VPN_HQ:13568: out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
ike 0:VPN_HQ:13568: sent IKE msg (retransmit): Y.Y.Y.Y:500->X.X.X.X:500, len=348, id=e1d5d68ec8a21de0/a8a06e3b05d261dc
ike 0: comes X.X.X.X:500->Y.Y.Y.Y:500,ifindex=5....
ike 0: IKEv2 exchange=SA_INIT id=e1d5d68ec8a21de0/0000000000000000 len=348
ike 0: in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
ike 0:VPN_HQ:13568: detected retransmit, resend last message
ike 0:VPN_HQ:13568: out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
ike 0:VPN_HQ:13568: sent IKE msg (retransmit): Y.Y.Y.Y:500->X.X.X.X:500, len=348, id=e1d5d68ec8a21de0/a8a06e3b05d261dc
ike 0:VPN_HQ:13568: negotiation timeout, deleting
ike 0:VPN_HQ: connection expiring due to phase1 down
ike 0:VPN_HQ: deleting
ike 0:VPN_HQ: flushing
ike 0:VPN_HQ: flushed
ike 0:VPN_HQ: deleted
ike 0:VPN_HQ: schedule auto-negotiate
Anyone experienced this issue before?
Thanks
Based on the IKE debug output, the end you ran the debug is receiving IKE messages from the other end, and responding to them. But the other end doesn't seem to be able to receive or see the responses and keeps sending the original request.
First, I would do sniffing and/or the same IKE debug on the other end. My guess is none of those packets are arriving there. Something in-between is likely blocking or filtering.
Thanks, well this is the ike debug on the other end of the firewall. Not sure if its the router that cause this issue. There is a router with PPPoE dialup infront of the firewall without NAT.
ike 0:VPN_DR1Tech:676533: initiator: main mode is sending 1st message...
ike 0:VPN_DR1Tech:676533: cookie 54893b4a5a8c8148/0000000000000000
ike 0:VPN_DR1Tech:676533: out 54893B4A5A8C814800000000000000000110020000000000000001200D00003800000001000000010000002C010100010000002401010000800B0001000C000400015180800100058003000180020001800400050D0000144A131C81070358455C5728F20E95452F0D0000147D9419A65310CA6F2C179D9215529D560D000014CD60464335DF21F87CFDB2FC68B6A4480D00001490CB80913EBB696E086381B5EC427B1F0D00001416F6CA16E4A4066D83821A0F0AEAA8620D0000144485152D18B6BBCD0BE8A8469579DDCC0D000014AFCAD71368A1F1C96B8696FC775701000D0000144048B7D56EBCE88525E7DE7F00D6C2D30D0000184048B7D56EBCE88525E7DE7F00D6C2D3C0000000000000148299031757A36082C6A621DE000502E0
ike 0:VPN_DR1Tech:676533: sent IKE msg (ident_i1send): Y.Y.Y.Y:500->X.X.X.X:500, len=288, id=54893b4a5a8c8148/0000000000000000
ike 0:VPN_DR1Tech:VPN_P2A: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2A: using existing connection
ike 0:VPN_DR1Tech:VPN_P2A: config found
ike 0:VPN_DR1Tech:VPN_P2A: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2A:6986028: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2B: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2B: using existing connection
ike 0:VPN_DR1Tech:VPN_P2B: config found
ike 0:VPN_DR1Tech:VPN_P2B: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2B:6986029: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2C: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2C: using existing connection
ike 0:VPN_DR1Tech:VPN_P2C: config found
ike 0:VPN_DR1Tech:VPN_P2C: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2C:6986030: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2D: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2D: using existing connection
ike 0:VPN_DR1Tech:VPN_P2D: config found
ike 0:VPN_DR1Tech:VPN_P2D: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2D:6986031: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2E: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2E: using existing connection
ike 0:VPN_DR1Tech:VPN_P2E: config found
ike 0:VPN_DR1Tech:VPN_P2E: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2E:6986032: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2F: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2F: using existing connection
ike 0:VPN_DR1Tech:VPN_P2F: config found
ike 0:VPN_DR1Tech:VPN_P2F: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2F:6986033: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2G: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2G: using existing connection
ike 0:VPN_DR1Tech:VPN_P2G: config found
ike 0:VPN_DR1Tech:VPN_P2G: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2G:6986034: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2H: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2H: using existing connection
ike 0:VPN_DR1Tech:VPN_P2H: config found
ike 0:VPN_DR1Tech:VPN_P2H: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2H:6986035: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2I: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2I: using existing connection
ike 0:VPN_DR1Tech:VPN_P2I: config found
ike 0:VPN_DR1Tech:VPN_P2I: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2I:6986036: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2J: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2J: using existing connection
ike 0:VPN_DR1Tech:VPN_P2J: config found
ike 0:VPN_DR1Tech:VPN_P2J: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2J:6986037: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2K: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2K: using existing connection
ike 0:VPN_DR1Tech:VPN_P2K: config found
ike 0:VPN_DR1Tech:VPN_P2K: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2K:6986040: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:VPN_P2L: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2L: using existing connection
ike 0:VPN_DR1Tech:VPN_P2L: config found
ike 0:VPN_DR1Tech:VPN_P2L: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:500 negotiating
ike 0:VPN_DR1Tech:676533:VPN_P2L:6986041: ISAKMP SA still negotiating, queuing quick-mode request
ike 0:VPN_DR1Tech:676533: out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
ike 0:VPN_DR1Tech:676533: sent IKE msg (P1_RETRANSMIT): Y.Y.Y.Y:500->X.X.X.X:500, len=288, id=54893b4a5a8c8148/0000000000000000
ike 0:VPN_DR1Tech:VPN_P2A: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2A: using existing connection
ike 0:VPN_DR1Tech:VPN_P2A: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2B: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2B: using existing connection
ike 0:VPN_DR1Tech:VPN_P2B: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2C: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2C: using existing connection
ike 0:VPN_DR1Tech:VPN_P2C: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2D: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2D: using existing connection
ike 0:VPN_DR1Tech:VPN_P2D: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2E: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2E: using existing connection
ike 0:VPN_DR1Tech:VPN_P2E: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2F: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2F: using existing connection
ike 0:VPN_DR1Tech:VPN_P2F: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2G: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2G: using existing connection
ike 0:VPN_DR1Tech:VPN_P2G: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2H: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2H: using existing connection
ike 0:VPN_DR1Tech:VPN_P2H: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2I: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2I: using existing connection
ike 0:VPN_DR1Tech:VPN_P2I: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2J: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2J: using existing connection
ike 0:VPN_DR1Tech:VPN_P2J: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2K: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2K: using existing connection
ike 0:VPN_DR1Tech:VPN_P2K: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2L: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2L: using existing connection
ike 0:VPN_DR1Tech:VPN_P2L: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2A: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2A: using existing connection
ike 0:VPN_DR1Tech:VPN_P2A: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2B: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2B: using existing connection
ike 0:VPN_DR1Tech:VPN_P2B: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2C: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2C: using existing connection
ike 0:VPN_DR1Tech:VPN_P2C: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2D: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2D: using existing connection
ike 0:VPN_DR1Tech:VPN_P2D: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2E: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2E: using existing connection
ike 0:VPN_DR1Tech:VPN_P2E: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2F: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2F: using existing connection
ike 0:VPN_DR1Tech:VPN_P2F: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2G: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2G: using existing connection
ike 0:VPN_DR1Tech:VPN_P2G: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2H: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2H: using existing connection
ike 0:VPN_DR1Tech:VPN_P2H: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2I: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2I: using existing connection
ike 0:VPN_DR1Tech:VPN_P2I: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2J: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2J: using existing connection
ike 0:VPN_DR1Tech:VPN_P2J: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2K: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2K: using existing connection
ike 0:VPN_DR1Tech:VPN_P2K: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2L: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2L: using existing connection
ike 0:VPN_DR1Tech:VPN_P2L: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2A: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2A: using existing connection
ike 0:VPN_DR1Tech:VPN_P2A: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2B: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2B: using existing connection
ike 0:VPN_DR1Tech:VPN_P2B: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2C: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2C: using existing connection
ike 0:VPN_DR1Tech:VPN_P2C: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2D: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2D: using existing connection
ike 0:VPN_DR1Tech:VPN_P2D: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2E: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2E: using existing connection
ike 0:VPN_DR1Tech:VPN_P2E: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2F: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2F: using existing connection
ike 0:VPN_DR1Tech:VPN_P2F: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2G: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2G: using existing connection
ike 0:VPN_DR1Tech:VPN_P2G: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:676533: out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
ike 0:VPN_DR1Tech:676533: sent IKE msg (P1_RETRANSMIT): Y.Y.Y.Y:500->X.X.X.X:500, len=288, id=54893b4a5a8c8148/0000000000000000
ike 0:VPN_DR1Tech:VPN_P2H: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2H: using existing connection
ike 0:VPN_DR1Tech:VPN_P2H: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2I: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2I: using existing connection
ike 0:VPN_DR1Tech:VPN_P2I: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2J: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2J: using existing connection
ike 0:VPN_DR1Tech:VPN_P2J: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2K: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2K: using existing connection
ike 0:VPN_DR1Tech:VPN_P2K: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2L: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2L: using existing connection
ike 0:VPN_DR1Tech:VPN_P2L: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2A: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2A: using existing connection
ike 0:VPN_DR1Tech:VPN_P2A: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2B: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2B: using existing connection
ike 0:VPN_DR1Tech:VPN_P2B: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2C: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2C: using existing connection
ike 0:VPN_DR1Tech:VPN_P2C: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2D: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2D: using existing connection
ike 0:VPN_DR1Tech:VPN_P2D: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2E: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2E: using existing connection
ike 0:VPN_DR1Tech:VPN_P2E: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2F: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2F: using existing connection
ike 0:VPN_DR1Tech:VPN_P2F: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2G: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2G: using existing connection
ike 0:VPN_DR1Tech:VPN_P2G: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2H: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2H: using existing connection
ike 0:VPN_DR1Tech:VPN_P2H: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2I: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2I: using existing connection
ike 0:VPN_DR1Tech:VPN_P2I: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2J: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2J: using existing connection
ike 0:VPN_DR1Tech:VPN_P2J: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2K: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2K: using existing connection
ike 0:VPN_DR1Tech:VPN_P2K: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2L: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2L: using existing connection
ike 0:VPN_DR1Tech:VPN_P2L: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2A: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2A: using existing connection
ike 0:VPN_DR1Tech:VPN_P2A: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2B: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2B: using existing connection
ike 0:VPN_DR1Tech:VPN_P2B: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2C: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2C: using existing connection
ike 0:VPN_DR1Tech:VPN_P2C: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2D: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2D: using existing connection
ike 0:VPN_DR1Tech:VPN_P2D: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2E: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2E: using existing connection
ike 0:VPN_DR1Tech:VPN_P2E: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2F: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2F: using existing connection
ike 0:VPN_DR1Tech:VPN_P2F: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2G: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2G: using existing connection
ike 0:VPN_DR1Tech:VPN_P2G: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2H: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2H: using existing connection
ike 0:VPN_DR1Tech:VPN_P2H: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2I: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2I: using existing connection
ike 0:VPN_DR1Tech:VPN_P2I: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2J: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2J: using existing connection
ike 0:VPN_DR1Tech:VPN_P2J: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2K: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2K: using existing connection
ike 0:VPN_DR1Tech:VPN_P2K: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:VPN_P2L: IPsec SA connect 7 Y.Y.Y.Y->X.X.X.X:0
ike 0:VPN_DR1Tech:VPN_P2L: using existing connection
ike 0:VPN_DR1Tech:VPN_P2L: config found
ike 0:VPN_DR1Tech: request is on the queue
ike 0:VPN_DR1Tech:676533: negotiation timeout, deleting
ike 0:VPN_DR1Tech: connection expiring due to phase1 down
ike 0:VPN_DR1Tech: deleting
ike 0:VPN_DR1Tech: flushing
ike 0:VPN_DR1Tech: flushed
ike 0:VPN_DR1Tech: deleted
ike 0:VPN_DR1Tech: schedule auto-negotiate
Hi,
Case resolved, looks like the router is the problem here. After i remove the router and use Fortigate to PPPoE dialup, the VPN instantly up back.
Thanks
the same shit... [>:]
ike 0:VPN_HQ: connection expiring due to phase1 down
As in below thread at the last MikePruett's comment, create a new thread with enough config info on both sides so we can comment on.
https://forum.fortinet.com/tm.aspx?m=115012
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.