Hi
Did anyone got a solution for this issue?
I am having the same issue also.
Ask them to check the order of their crypto MAP entries. Ask them to make sure their Dynamic MAP (Remote accesss VPN map) if they have one is at the end or at least get them to move yours at the top of the list. Like here the number 51 is a MAP which will be processed before MAP 60 :
crypto map EXAMPLE 51 match address vpn_ACLcrypto map EXAMPLE 51 set connection-type bi-directionalcrypto map EXAMPLE 51 set peer xxx.xxx.xxx.xxx crypto map EXAMPLE 51 set ikev1 phase1-mode maincrypto map EXAMPLE 51 set ikev1 transform-set aesshano crypto map EXAMPLE 51 set tfc-packetscrypto map EXAMPLE 60 match address vpn_ACL-IIcrypto map EXAMPLE 60 set connection-type bi-directionalcrypto map EXAMPLE 60 set peer yyy.yyy.yyy.yyy crypto map EXAMPLE 60 set ikev1 phase1-mode maincrypto map EXAMPLE 60 set ikev1 transform-set shastrongno crypto map EXAMPLE 60 set tfc-packets Also ask them to make sure the connection-type is bi-directional. They might have to use "show run all" command.
In a nutshell, the user with the more concise phase2 subnets will be able to open the tunnel. If the FGT has all zeros for phase2 and the Cisco has 192.168.x.x, then 192.168.x.x is contained within 0.0.0.0 and thus will be able to open the tunnel. This is why both sides should match exactly. Now I have seen examples (I am working on one between a FGT60B and my FWF80CM) where the phase2s match and one side cannot bring the tunnel up, but that isn't the normal behavior.
In addition, the setting that keeps the tunnel up is 'set auto-negotiate [enable | DISABLE]'. (Disable is the default) I'm not sure that would work if the FGT is unable to bring the tunnel up from a down state.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.