Created on 06-30-2010 11:42 AM
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Created on 06-30-2010 12:22 PM
set auto-negotiate enableAlso check the phase2 selectors on both sides. The FGT may be a subset of the Cisco, which is why it works in one direction. The Cisco cannot open the connection because part of it' s phase2 range lies outside what the FGT will allow.... Just a thought. Good luck
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
PCNSE
NSE
StrongSwan
Created on 07-01-2010 12:29 PM
ORIGINAL: johns99 If the ASA-5520 is the initiator, it comes up for a few seconds and then renegotiates Phase 2 (interrupting the tunnel) over and over again.The two sides may not be equal. Sometimes the responder adjusts the parameters to what the initiator has requested so the tunnel will come up. By comparing the responder debug log on each side you should be able to see what the differences are.
If phases 1 and 2 pass when the FGT initiates the tunnel, doesn' t that mean that the relevant SA properties match and should therefore do so when the other side initiates it?Between two Fortigate yes. With other routers no. FortiOS defaults and techniques prefer a hard set phase 2 quick mode selector. Many other router brands don' t work this way. They are set up to use 0.0.0.0 as the quick mode selector with the equivalent of “set selector-match subset†enabled. They will provide whatever quick mode selector your Fortigate wants but will typically accept anything as a quick mode selector. The firewall controls what traffic can pass.
So...I' m thinking the root cause is a bug or incompatibility related to how the FGT implements/parses/compares address groups for SA during phase 2 negotiation.If the Fortigate is refusing the connection then it will be detailed in the debug log. For some problems I' ve had to analyze days of debug logs to figure out the pattern.
ANYWAY, I think preventing the ASA from iniating the tunnel will get around the problem (assuming the setting applies to re-negotiation of phase 2 as well), but I' m going to start with setting auto-negotiate to enable on the FGT to learn more about the behavior.This shouldn' t work. Typically routers create a new SA rather than reusing an existing SA unless it matches exactly. Even if you force the tunnel up on the Fortigate the Cisco will probably want to create another when it wants to send something. I would expect a lot of connectivity problems.
The phase 2 keylife on both sides is 28800 sec (8 hr) and renegotiation occurred after 6 hrs (I assume that is by design --- like DHCP renewal).My Fortigate with FortiOS 3.0 to a Checkpoint renegotiates anywhere from 50-0 seconds from the end of the tunnel. Renegotiating seamlessly lets the existing tunnel expire and creates a new one. The Cisco may decide to create another tunnel because the one you forced up wasn' t a match.
ORIGINAL: emnoc … upon termination of your phase1 SA, then any phase2 SA should magically be terminate as well.The IPSec standard and FortiOS KB specifically state that phase 2 may continue after their phase 1 goes down. The phase 2 tunnels will stay up but any communication about them will require a new phase 1. However many routers do drop their phase 2 when the phase 1 goes down. Fortigate phase 2 will continue after the phase 1 expires unless the other router brings them down.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1709 | |
1093 | |
752 | |
446 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.