Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
qrz
New Contributor

Troubleshoot pre-shared key mismatch

Hello.

I tried to debug non-working VPN tunnel and suspect there is PSK mismatch.

Fortigate doc says: "It is possible to identify a PSK mismatch using the following combination of CLI commands:

diag debug app ike filter name "phase1-name"

...

I got an error after this command, "command parse error before 'name'", why ? Are there any ways to do this ?

My Fortigate version is v5.6.4

5 Solutions
sw2090
Honored Contributor

you have to replace phase1-name by the name of your tunnel. However this filter is still  broken in 5.6 (and it was before 5.6) and will not work even if you set it. This is very annoying if you have more vpns running.

 

I work around that by doing diag debug app ike -1. LEt it run for a while and then copy-paste the output into a text editor where I can search it.

-- 

"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams

View solution in original post

-- "It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
sw2090
Honored Contributor

hm that looks more like non matching proposals in phase1 than a psk mismatch. Could you check that you have at least one pair of proposals identical on both sides?

-- 

"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams

View solution in original post

-- "It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
ede_pfau

Yes.

The incoming proposal is AES128/SHA256 with PFS group 5.

Usually (best practice) you would only configure one proposal on each side. Check NATT and DPD as well.


Ede

"Kernel panic: Aiee, killing interrupt handler!"

View solution in original post

Ede"Kernel panic: Aiee, killing interrupt handler!"
emnoc
Esteemed Contributor III

Agreed

 

PSK mis-match is not the issue and diag debug app ike -1 is your friend. Set a filter if you have tons or IKE gateways.

 

e.g 

 

   diag vpn ike  filter name <insert phase1 name>

 

I'm doing that at this exact moment and with a FGT with 300 vpns ;)

 

Ken Felix

PCNSE 

NSE 

StrongSwan  

View solution in original post

PCNSE NSE StrongSwan
sw2090
Honored Contributor

yeah this one is clear to me ;)

 

It now matched proposals but refused to bring the tunnel up because there is no policy for the tunnel traffic on your FGT: 

So create a policy (at least one) that affects tunnel traffic and it should come up.

-- 

"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams

View solution in original post

-- "It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
10 REPLIES 10
sw2090
Honored Contributor

yeah this one is clear to me ;)

 

It now matched proposals but refused to bring the tunnel up because there is no policy for the tunnel traffic on your FGT: 

So create a policy (at least one) that affects tunnel traffic and it should come up.

-- 

"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams

-- "It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Labels
Top Kudoed Authors