Hi all,
We have a number of FG-100As (FG100A-3.00-FW-build733-081121) and have been using them for years for IPsec VPNs to one another, as well as to a Nortel router.
Now we are trying to set up IPsec to a Cisco device run by a third party, but we' re getting the " Initiator: parsed G.G.G.G aggressive mode message #1 (ERROR)" message - even after double-checking the keys with one another and reentering at both ends.
I' ve read that this error can sometimes be due to other phase 1 settings not matching, but have checked them and they seem correct (I presume phase 2 settings are not relevant at this stage, but we believe they are correct too).
The routing is working well enough to trigger the fortigate to try and bring the connection up, so using diag debug enable and diag debug appli ike 2, here is what I see on the fortigate:
0:AEMO:2537: initiator: aggressive mode is sending 1st message...
0:AEMO:2537: cookie fa669c197d8884a0/0000000000000000
0:AEMO:2537: sent IKE msg (agg_i1send): ME.ME.ME.ME:500->G.G.G.G:500, len=488
AEMO: Initiator: sent G.G.G.G aggressive mode message #1 (OK)
0: comes G.G.G.G:500->ME.ME.ME.ME:500,ifindex=2....
0: exchange=Aggressive id=fa669c197d8884a0/ffb0d8a1666d76de len=428
0: found AEMO ME.ME.ME.ME 2 -> G.G.G.G:500
0:AEMO:2537: initiator: aggressive mode get 1st response...
0:AEMO:2537: VID CISCO-UNITY
0:AEMO:2537: VID draft-ietf-ipsra-isakmp-xauth-06.txt
0:AEMO:2537: VID DPD
0:AEMO:2537: DPD negotiated
0:AEMO:2537: VID draft-ietf-ipsec-nat-t-ike-02
0:AEMO:2537: VID FRAGMENTATION
0:AEMO:2537: unknown VID (16): 1F07F70EAA6514D3B0FA96542A500100
0:AEMO:2537: negotiation result
0:AEMO:2537: proposal id = 1:
0:AEMO:2537: protocol id = ISAKMP:
0:AEMO:2537: trans_id = KEY_IKE.
0:AEMO:2537: encapsulation = IKE/none
0:AEMO:2537: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC.
0:AEMO:2537: type=OAKLEY_HASH_ALG, val=MD5.
0:AEMO:2537: type=AUTH_METHOD, val=PRESHARED_KEY.
0:AEMO:2537: type=OAKLEY_GROUP, val=1024.
0:AEMO:2537: ISKAMP SA lifetime=86400
0:AEMO:2537: info_send_n1, type 23
0:AEMO:2537: sent IKE msg (p1_notify_23): ME.ME.ME.ME:500->G.G.G.G:500, len=60
AEMO: Initiator: parsed G.G.G.G aggressive mode message #1 (ERROR)
0:AEMO:2537: sent IKE msg (P1_RETRANSMIT): ME.ME.ME.ME:500->G.G.G.G:500, len=488
(and then it repeats)
Does anyone know of any particular issues with Cisco interop that might cause this? From the unknown VID line I believe this is a Cisco VPN Concentrator.
I have tried setting this VPN up both as a route-based VPN (which is the way that we usually do things) and also as a policy-based VPN as suggested by the ' FortiGate to Cisco PIX VPN' knowledge page. Both give the same results.
I notice that that page suggests using SHA1, but the other party explicitly specifies MD5 (and we tried SHA1 too just in case). Here are the details they gave us:
Connection Type: AEMO will answer only
Authentication: Pre-Share Keys
Encryption: 3DES
Hash: MD5
DH group: 2
Lifetime: 86400
Speed: 256Kbps
Transform Set: esp-3des esp-md5-hmac
I' ve attached our phase 1 configuration. Our phase 2 has 3DES, MD5, PFS off, 86400 keylife, and we' ve tried both with and without entering quick mode selectors (though as above, I believe that stuff isn' t relevant at the early stage the above error occurs anyway?).
We went through it on the phone and they are not getting much more info at their end in their logs (unfortunately they terminate hundreds of clients so not easy to talk them into using debug mode) - they did have some " Information Exchange processing failed" errors from our IP but that could actually have just been when I was trying out variations on the settings.
Any suggestions?
Thanks,
Will