Description |
This article describes how to resolve an issue where FortiGate is unable to establish an IPSEC tunnel to the remote VPN gateway. |
Scope | FortiGate IPSEC. |
Solution |
Symptoms and Cause: Check on the FortiGate IPSEC tunnel status. In this example, it will show 2 tunnels: VPN_to_WQD and VPN_WQD
get ipsec tunnel list NAME=VPN_to_WQD REMOTE-GW=60.50.220.14:0 NAME=VPN_WQD REMOTE-GW=60.50.220.14:0
Check on FortiGate IKE debug logs and it will show this error: could not locate phase1 configuration.
ike V=root:0:VPN_to_WQD:VPN_to_WQD: IPsec SA connect 62 180.74.240.29->60.50.220.14:0
ike V=root:0:VPN_WQD:VPN_WQD: IPsec SA connect 62 180.74.240.29->60.50.220.14:0
This is due to that FortiGate's 2 IPSEC tunnels are reaching the same remote destination gateway IP (in this example: 60.50.220.14).
In this example, the FortiGate has 2 IPSEC tunnels configured.
config vpn ipsec phase1-interface end
config vpn ipsec phase1-interface edit "VPN_to_WQD" end
Available solutions to address this issue:
config vpn ipsec phase1-interface edit "VPN_WQD" set network-overlay enable <----- set network-id 100 <----- next config vpn ipsec phase1-interface edit "VPN_to_WQD" set network-overlay enable <----- set network-id 200 <----- next end
This issue or the log can also be observed in a scenario in which the interface that is being used under the IPsec is not configured with any IP address.
No IP address is assigned to that interface:
Similar IKE debugs can be seen:
FG5H1E-1 # ike V=root:0:500E-GURUGRAM:IPSEC: IPsec SA connect 10 10.5.52.80->10.5.205.176:0
Assign the IP address on the interface to fix this issue.
Related articles : Troubleshooting Tip: IPSEC Tunnel (debugging IKE) Technical Tip: How to establish more than one IPsec tunnel with same pair of IP |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.