Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
AlexGera
New Contributor

Fortigate IPSec interface errors

Hello.

Please help me figure out why errors appear on the ipsec channel. There are two devices between which an ipsec tunnel is configured. As traffic increases, the number of errors increases greatly (about 1000 per hour).

 

Config from the first device. The second one is configured similarly.

DC1-FG3 (dc1) # fnsysctl ifconfig dc2-rtk-rtk
dc2-rtk-rtk Link encap:Unknown
inet addr:10.0.0.13 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1420 Metric:1
RX packets:600906772 errors:4080 dropped:0 overruns:0 frame:0
TX packets:896848272 errors:407591 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:102456623557 (95.4 GB) TX bytes:523239765513 (487.3 GB)


DC1-FG3 (dc1) # show vpn ipsec phase1-interface dc2-rtk-rtk
config vpn ipsec phase1-interface
edit "dc2-rtk-rtk"
set interface "vlan170-dc1"
set peertype any
set net-device disable
set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
set wizard-type simplified-static-fortigate
set remote-gw x.x.x.x
set psksecret ...
next
end
DC1-FG3 (dc1) # show vpn ipsec phase2-interface dc2-rtk-rtk
config vpn ipsec phase2-interface
edit "dc2-rtk-rtk"
set phase1name "dc2-rtk-rtk"
set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256
set src-addr-type name
set dst-addr-type name
set src-name "all"
set dst-name "all"
next
end

 

1 REPLY 1
AEK
SuperUser
SuperUser

Hi Alex 

I think it is caused by errors on WAN link between source and destination and can be out of your control.

I can see it is less than 0.1% so I'd just ignore them.

AEK
AEK
Labels
Top Kudoed Authors