I get that this an old post (google search landed me here - where I found my answer I might add) but considering that most of the people that posted to this thread are still active on the forums, a sort of follow-up question if i may. You guys mention that Aggressive mode is to be used mostly for dynamic and dial-up connections. This is the default still to this day on the Fortigate wizard but in an environment with oversight we were forced to move ALL VPN's to Main Mode, ALL VPN's. Did we hurt our self in doing so? I get the extra time during negotiation, but in what other way would it be negative? If memory serves the Main Mode makes you move the gate into more of an interface based VPN but I don't recall specifics behind that. I know when using this type of VPN the client is assigned an IP in the defined range and then the clients gateway is always one number higher than the IP that they were assigned. ie:
Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Fortinet Virtual Ethernet Adapter (NDIS 6.30) Physical Address. . . . . . . . . : 00-09-0F-FE-00-01 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 10.100.31.153(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.255 Lease Obtained. . . . . . . . . . : Wednesday, April 20, 1999 4:20:00 PM Lease Expires . . . . . . . . . . : Saturday, December 31, 1999 23:59:59 PM Default Gateway . . . . . . . . . : 10.100.31.154 DHCP Server . . . . . . . . . . . : 14.20.24.7 DNS Servers . . . . . . . . . . . : 14.20.3.65 14.20.7.24 NetBIOS over Tcpip. . . . . . . . : Enabled for some reason Thanks - mainly just curious so thank you if anyone still has ears on
we were forced to move ALL VPN
what do you mean "forced" ?
If memory serves the Main Mode makes you move the gate into more of an interface based VPN but I don't recall specifics behind that
And no, aggressive or main mode for IKE has no bearing on vpn-interface ( aka routed-based ) or policy-ipsec ( aka policy-based ) VPNs.
FWIW, If you had a vulnerability scan and they flagged aggressive-mode ( most does btw ) than see if you can build the tunnels out with IKEv2.
Ken Felix
PCNSE
NSE
StrongSwan
Well, maybe "forced" is too harsh of a word but the auditors that came in and their script told them that we should be using Main Mode so as to not allow anyone to see the authentication proposal during IKE. I was pleased since that was the only thing that they really busted us up on this last time since we had managed to get rid of every reference to ALL addresses or ANY protocol or ANY interface on every single rule.... There is not one rule in our topology with ANY,ANY or ALL. That one I agree with them on in most cases.
Regarding the mode of the tunnel, when I changed them to custom tunnels and to Main mode the way our dial-up clients received their IP and GW changed to the previously mentioned setup where the IP is say .100 while the GW is one IP higher, 101. I know the tunnels before that change were setup to where they got an IP and the GW was the interface on the Gate. For whatever reason the whole policy based vs route based has confused me but I get that you're saying that IKE has nothing to do with that
User | Count |
---|---|
2551 | |
1356 | |
795 | |
646 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.