I want to start by saying that I’m not an expert of Fortigate in general, so sorry If I’ll make any mistakes below…
I have an IPsec VPN between two physical distant sites in HUB-Spoke mode.
The main (HUB) has a Fortigate 100F (firmware 6.2.9) with multiples spokes around the world and the second (Spoke) has a Fortigate 40F (firmware 6.4.7) .
On our main Fortigate, we have 2 ISP, so for every spokes we’ve configured 2 IPsec Tunnels (one principal and one of backup in case the first goes down) that point to HUB.
Issue:
Every morning, on the second Fortigate, every IPsec tunnels are down for some reason (primary and backup, but internet is ok). Phase 1 is enstablished on the primary Tunnel but Phase 2 is down. If I try to bring UP everyphase 2 from GUI, nothing happens.
Meanwhile the main Fortigate seems to be working well with others enstablished spokes (without the problematic spoke above).
What I tried:
- Whatching logs on the second Fortigate: https://kb.fortinet.com/kb/documentLink.do?externalID=FD46611 . My Phase 1 was UP, but phase 2 was down. I solved temporarily by manually disabling phase 1, and then re-enabling it again (all from CLI).
- Since we have just one pc on the second site, in “Log & Report → Forward Traffic” I’ve watched the logs related to that pc, to see what happens during the time that there was internet, but no Ipsec VPN. I’ve saw no traffic of Ipsec VPN, only towards internet.
Temporary solutions: (not definitive)
- Restart Fortigate on the second site (the site with IPsec tunnels down). When It restart, the primary IPsec tunnel is up and just working fine.
- I’ve disabled the backup tunnel (so only primary stays up) and this solved the issue for 3 days…then problem return again.
- Restart IPsec tunnel from CLI.
- Sconfigure IP of the IPsec in the second Fortigate, in “VPN–>IPsec Tunnels”, then trying to bring UP all phase 2, then setting the right IP and again bringing UP all phase 2.
Any ideas on how to fix this issue correctly? Have someone of you had the same problem?
Thanks for reading…
*****************************************************************************
EDIT 22/11/21: SOLUTION
I’d like to share the solution, which may help some people in future.
The problem was caused by microseconds on/off between the office’s cabin and our ISP “headquarter”.
(ISP technicians talked about a misalignment between our office’s router and their central)
This continuous switch, caused that IPsec tunnel after approximately one hour falls down.
Fortigate GUI went crazy and showed incorrect states (like UP when the tunnel was DOWN) that differs from CLI state which was the right one.
Thank you all for help and suggestions.