diag deb appl ike -1 ike 0:to-remote-vpn:15761: sent IKE msg (R-U-THERE): 192.168.x.142:4500->192.168.y.2:4500, len=92 ike 0: comes 192.168.y.2:4500->192.168.x.142:4500,ifindex=8.... ike 0: IKEv1 exchange=Informational id=56aaf214090a1f2a/19936a311a003ea5:97100104 len=92 ike 0: found to-remote-vpn 192.168.x.142 8 -> 192.168.y.2:4500 ike 0:to-remote-vpn:15761: notify msg received: R-U-THERE ike 0:to-remote-vpn:15761: confirmed nat-t RFC 3947 ike 0:to-remote-vpn:15761: sent IKE msg (R-U-THERE-ACK): 192.168.x.142:4500->192.168.y.2:4500, len=92 ike 0: comes 192.168.y.2:4500->192.168.x.142:4500,ifindex=8.... ike 0: IKEv1 exchange=Informational id=56aaf214090a1f2a/19936a311a003ea5:6e7156ad len=92 ike 0: found to-remote-vpn 192.168.x.142 8 -> 192.168.y.2:4500 ike 0:to-remote-vpn:15761: notify msg received: R-U-THERE-ACK ike 0:to-remote-vpn: link is idle 8 192.168.x.142->192.168.y.2:4500 dpd=1 seqno=b50e ike 0:to-remote-vpn:15761: send IKEv1 DPD probe, seqno 46350 ike 0:to-remote-vpn:15761: confirmed nat-t RFC 3947 increment seqno, repeatThe output shows lots of R-U-THERE and R-U-THERE-ACK at both ends continuously but nothing after that. There is also an entry saying " confirmed nat-t RFC3947" which would seem to be a step in the right direction. It seems that both FGT1 and FGT2 are sending R-U-THERE. I have NOT set up port forwarding on the nat router, presumed that FGT2 would bring up the tunnel. 2. What is the next expected step and what might be the config fault stopping it? Is there some other debug I can use to give me a clue or is it already in front of me? Thanks in advance,
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
HUB # diag vpn ike gate list #working tunnels deleted vd: root/0 name: ipsec-to-nat version: 1 interface: internal4 8 addr: <hub-ip>:500 -> <outside-ip>:500 created: 0s ago ISAKMP SA: created 1/1 IPsec SA: created 0/0 id/spi: 28619 e44c5adb56156e10/6cc78d9f1418f462 direction: responder status: connecting, state 5, started 0s ago ike 0:ipsec-to-nat:28629: confirmed nat-t RFC 3947 ike 0:ipsec-to-nat:28629: sent IKE msg (P1_RETRANSMIT): <hub-ip>:4500-><outside-ip>:4500, len=108 ike 0:ipsec-to-nat: link fail 8 <hub-ip>-><outside-ip>:4500 dpd=1 ike 0:ipsec-to-nat: DPD fail 8 <hub-ip>-><outside-ip>:4500 send failure, resetting ... ike 0:ipsec-to-nat: deleting ike 0:ipsec-to-nat: flushing ike 0:ipsec-to-nat: flushed ike 0:ipsec-to-nat: reset NAT-T ike 0:ipsec-to-nat: deleted ike 0:ipsec-to-nat: created DPD triggered connection: 0x134b270 8 <hub-ip>-><outside-ip>:500. ike 0:ipsec-to-nat: new connection. ike 0:ipsec-to-nat:28630: initiator: main mode is sending 1st message... ike 0:ipsec-to-nat:28630: cookie 7d5703885010591d/0000000000000000 ike 0:ipsec-to-nat:28630: sent IKE msg (ident_i1send): <hub-ip>:500-><outside-ip>:500, len=224 ike 0: comes <outside-ip>:500-><hub-ip>:500,ifindex=8.... ike 0: IKEv1 exchange=Identity Protection id=7d5703885010591d/aafdeb97af484be9 len=144 ike 0: found ipsec-to-nat <hub-ip> 8 -> <outside-ip>:500 ike 0:ipsec-to-nat:28630: initiator: main mode get 1st response... ike 0:ipsec-to-nat:28630: VID RFC 3947 4A131C81070358455C5728F20E95452F ike 0:ipsec-to-nat:28630: VID DPD AFCAD71368A1F1C96B8696FC77570100 ike 0:ipsec-to-nat:28630: DPD negotiated ike 0:ipsec-to-nat:28630: VID unknown (16): 8299031757A36082C6A621DE00040290 ike 0:ipsec-to-nat:28630: selected NAT-T version: RFC 3947 ike 0:ipsec-to-nat:28630: negotiation result ike 0:ipsec-to-nat:28630: proposal id = 1: ike 0:ipsec-to-nat:28630: protocol id = ISAKMP: ike 0:ipsec-to-nat:28630: trans_id = KEY_IKE. ike 0:ipsec-to-nat:28630: encapsulation = IKE/none ike 0:ipsec-to-nat:28630: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC. ike 0:ipsec-to-nat:28630: type=OAKLEY_HASH_ALG, val=SHA. ike 0:ipsec-to-nat:28630: type=AUTH_METHOD, val=PRESHARED_KEY. ike 0:ipsec-to-nat:28630: type=OAKLEY_GROUP, val=1024. ike 0:ipsec-to-nat:28630: ISKAMP SA lifetime=28800 ike 0:ipsec-to-nat:28630: sent IKE msg (ident_i2send): <hub-ip>:500-><outside-ip>:500, len=228 ike 0: comes <outside-ip>:500-><hub-ip>:500,ifindex=8.... ike 0: IKEv1 exchange=Identity Protection id=7d5703885010591d/aafdeb97af484be9 len=228 ike 0: found ipsec-to-nat <hub-ip> 8 -> <outside-ip>:500 ike 0:ipsec-to-nat:28630: initiator: main mode get 2nd response... ike 0:ipsec-to-nat:28630: NAT detected: PEER ike 0:ipsec-to-nat:28630: NAT-T float port 4500 ike 0:ipsec-to-nat:28630: add initial-contact ike 0:ipsec-to-nat:28630: confirmed nat-t RFC 3947 ike 0:ipsec-to-nat:28630: sent IKE msg (ident_i3send): <hub-ip>:4500-><outside-ip>:4500, len=108 ike shrank heap by 126976 bytes ike 0:ipsec-to-nat:28630: confirmed nat-t RFC 3947 ike 0:ipsec-to-nat:28630: sent IKE msg (P1_RETRANSMIT): <hub-ip>:4500-><outside-ip>:4500, len=108 ike 0: comes <outside-ip>:500-><hub-ip>:500,ifindex=8.... ike 0: IKEv1 exchange=Identity Protection id=44b4e444ea8dd807/24654d00a98bcfba len=228 ike 0: found ipsec-to-nat <hub-ip> 8 -> <outside-ip>:4500 ike 0:ipsec-to-nat: ISAKMP SA SPI 44b4e444ea8dd807/24654d00a98bcfba malformed or expired ike 0:ipsec-to-nat: link fail 8 <hub-ip>-><outside-ip>:4500 dpd=1Remote site diags:
NAT # diag vpn ike gate list vd: root/0 name: ipsec-to-hub version: 1 interface: wan2 5 addr: <inside-ip>:500 -> <hub-ip>:500 created: 136859s ago IKE SA: created 3/26181 IPsec SA: created 0/0 id/spi: 26552 e44c5adb56156e10/6cc78d9f1418f462 direction: initiator status: connecting, state 5, started 1s ago id/spi: 26551 511ad132d6706fc3/e5e6bc9cdf773331 direction: initiator status: connecting, state 5, started 11s ago id/spi: 26550 85807024c14a4b35/9557ac0ef3bf3061 direction: responder status: connecting, state 5, started 16s ago ike 0: comes <hub-ip>:500-><inside-ip>:500,ifindex=5.... ike 0: IKEv1 exchange=Identity Protection id=44b4e444ea8dd807/0000000000000000 len=224 ike 0: in 44B4E444EA8DD807<hex> ike 0:ipsec-to-hub:26562: retransmission, ignored since still generating response ike 0:ipsec-to-hub:26562: cookie 44b4e444ea8dd807/24654d00a98bcfba ike 0:ipsec-to-hub:26562: out 44B4E444EA8DD80724654D00A98BCFBA<hex> ike 0:ipsec-to-hub:26562: sent IKE msg (ident_r1send): <inside-ip>:500-><hub-ip>:500, len=144, id=44b4e444ea8dd807/24654d00a98bcfba ike 0: comes <hub-ip>:500-><inside-ip>:500,ifindex=5.... ike 0: IKEv1 exchange=Identity Protection id=44b4e444ea8dd807/24654d00a98bcfba len=228 ike 0: in 44B4E444EA8DD80724654D00A98BCFBA<hex> ike 0:ipsec-to-hub:26562: responder:main mode get 2nd message... ike 0:ipsec-to-hub:26562: NAT detected: ME ike 0:ipsec-to-hub:26562: out 44B4E444EA8DD80724654D00A98BCFBA<hex> ike 0:ipsec-to-hub:26562: sent IKE msg (ident_r2send): <inside-ip>:500-><hub-ip>:500, len=228, id=44b4e444ea8dd807/24654d00a98bcfba ike 0:ipsec-to-hub:26562: ISAKMP SA 44b4e444ea8dd807/24654d00a98bcfba key 16:40358CAA2A9192DB60525865D7510D4C ike 0: comes <hub-ip>:500-><inside-ip>:500,ifindex=5.... ike 0: IKEv1 exchange=Identity Protection id=7d5703885010591d/0000000000000000 len=224 ike 0: in 7D5703885010591D<hex> ike 0: found ipsec-to-hub <inside-ip> 5 -> <hub-ip>:500 ike 0:ipsec-to-hub:26563: responder: main mode get 1st message... ike 0:ipsec-to-hub:26563: VID RFC 3947 4A131C81070358455C5728F20E95452F ike 0:ipsec-to-hub:26563: VID draft-ietf-ipsec-nat-t-ike-03 7D9419A65310CA6F2C179D9215529D56 ike 0:ipsec-to-hub:26563: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448 ike 0:ipsec-to-hub:26563: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F ike 0:ipsec-to-hub:26563: VID draft-ietf-ipsec-nat-t-ike-01 16F6CA16E4A4066D83821A0F0AEAA862 ike 0:ipsec-to-hub:26563: VID draft-ietf-ipsec-nat-t-ike-00 4485152D18B6BBCD0BE8A8469579DDCC ike 0:ipsec-to-hub:26563: VID DPD AFCAD71368A1F1C96B8696FC77570100 ike 0:ipsec-to-hub:26563: negotiation result ike 0:ipsec-to-hub:26563: proposal id = 1: ike 0:ipsec-to-hub:26563: protocol id = ISAKMP: ike 0:ipsec-to-hub:26563: trans_id = KEY_IKE. ike 0:ipsec-to-hub:26563: encapsulation = IKE/none ike 0:ipsec-to-hub:26563: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC. ike 0:ipsec-to-hub:26563: type=OAKLEY_HASH_ALG, val=SHA. ike 0:ipsec-to-hub:26563: type=AUTH_METHOD, val=PRESHARED_KEY. ike 0:ipsec-to-hub:26563: type=OAKLEY_GROUP, val=1024. ike 0:ipsec-to-hub:26563: ISKAMP SA lifetime=28800 ike 0:ipsec-to-hub:26563: selected NAT-T version: RFC 3947 ike 0:ipsec-to-hub:26560: embryonic limit 4 reached, deleting 8705e6c9fc0a815e/5ff1a64967564542 ike 0:ipsec-to-hub: schedule auto-negotiate ike 0:ipsec-to-hub:26563: cookie 7d5703885010591d/aafdeb97af484be9 ike 0:ipsec-to-hub:26563: out 7D5703885010591DAAFDEB97AF484BE9<hex> ike 0:ipsec-to-hub:26563: sent IKE msg (ident_r1send): <inside-ip>:500-><hub-ip>:500, len=144, id=7d5703885010591d/aafdeb97af484be9 ike 0: comes <hub-ip>:500-><inside-ip>:500,ifindex=5.... ike 0: IKEv1 exchange=Identity Protection id=7d5703885010591d/aafdeb97af484be9 len=228 ike 0: in 7D5703885010591DAAFDEB97AF484BE9<hex> ike 0:ipsec-to-hub:26563: responder:main mode get 2nd message... ike 0:ipsec-to-hub:26563: NAT detected: ME ike 0:ipsec-to-hub:26563: out 7D5703885010591DAAFDEB97AF484BE9<hex> ike 0:ipsec-to-hub:26563: sent IKE msg (ident_r2send): <inside-ip>:500-><hub-ip>:500, len=228, id=7d5703885010591d/aafdeb97af484be9 ike 0:ipsec-to-hub:26563: ISAKMP SA 7d5703885010591d/aafdeb97af484be9 key 16:5667E7A4AC0477454DA5E088387DE686 ike 0:ipsec-to-hub:26562: out 44B4E444EA8DD80724654D00A98BCFBA<hex> ike 0:ipsec-to-hub:26562: sent IKE msg (P1_RETRANSMIT): <inside-ip>:500-><hub-ip>:500, len=228, id=44b4e444ea8dd807/24654d00a98bcfba ike 0: comes <hub-ip>:500-><inside-ip>:500,ifindex=5.... ike 0: IKEv1 exchange=Identity Protection id=94d5a88922c4e072/0000000000000000 len=224 ike 0: in 94D5A88922C4E072<hex> ike 0: found ipsec-to-hub <inside-ip> 5 -> <hub-ip>:500 ike 0:ipsec-to-hub:26564: responder: main mode get 1st message... ike 0:ipsec-to-hub:26564: VID RFC 3947 4A131C81070358455C5728F20E95452F ike 0:ipsec-to-hub:26564: VID draft-ietf-ipsec-nat-t-ike-03 7D9419A65310CA6F2C179D9215529D56 ike 0:ipsec-to-hub:26564: VID draft-ietf-ipsec-nat-t-ike-02 CD60464335DF21F87CFDB2FC68B6A448 ike 0:ipsec-to-hub:26564: VID draft-ietf-ipsec-nat-t-ike-02\n 90CB80913EBB696E086381B5EC427B1F ike 0:ipsec-to-hub:26564: VID draft-ietf-ipsec-nat-t-ike-01 16F6CA16E4A4066D83821A0F0AEAA862 ike 0:ipsec-to-hub:26564: VID draft-ietf-ipsec-nat-t-ike-00 4485152D18B6BBCD0BE8A8469579DDCC ike 0:ipsec-to-hub:26564: VID DPD AFCAD71368A1F1C96B8696FC77570100 ike 0:ipsec-to-hub:26564: negotiation result ike 0:ipsec-to-hub:26564: proposal id = 1: ike 0:ipsec-to-hub:26564: protocol id = ISAKMP: ike 0:ipsec-to-hub:26564: trans_id = KEY_IKE. ike 0:ipsec-to-hub:26564: encapsulation = IKE/none ike 0:ipsec-to-hub:26564: type=OAKLEY_ENCRYPT_ALG, val=AES_CBC. ike 0:ipsec-to-hub:26564: type=OAKLEY_HASH_ALG, val=SHA. ike 0:ipsec-to-hub:26564: type=AUTH_METHOD, val=PRESHARED_KEY. ike 0:ipsec-to-hub:26564: type=OAKLEY_GROUP, val=1024. ike 0:ipsec-to-hub:26564: ISKAMP SA lifetime=28800 ike 0:ipsec-to-hub:26564: selected NAT-T version: RFC 3947 ike 0:ipsec-to-hub:26561: embryonic limit 4 reached, deleting f33907ca1f3ab9e9/28f8b238220013fb ike 0:ipsec-to-hub: schedule auto-negotiateEnd of diags, EOM.
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1662 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.