09-30-2025 09:00 AM
Hi Everyone,
Recently while configuring a site-to-site VPN between a FortiGate firewall and a Cisco ASA, I faced an interesting issue: IPSec tunnel Phase 1 was up, but Phase 2 wouldn’t establish.
I solved it by aligning Phase 2 proposals (AES-256/SHA256) on both devices.
Looking forward to your experiences
Solved! Go to Solution.
09-30-2025 09:06 AM
Hi @MD Irshad Ansari multi-vendor VPNs are usually troublesome. I would recommend always explictly configuring the IKE/IPSec protocols rather than use the vendor defaults, ensuring the strongest crypto is used. Perhaps one vendor was using AES-256 (cbc) and the other AES-256 (gcm), these are different and must match.
09-30-2025 09:06 AM
Hi @MD Irshad Ansari multi-vendor VPNs are usually troublesome. I would recommend always explictly configuring the IKE/IPSec protocols rather than use the vendor defaults, ensuring the strongest crypto is used. Perhaps one vendor was using AES-256 (cbc) and the other AES-256 (gcm), these are different and must match.
09-30-2025 06:46 PM
Hi Rob,
Thanks a lot for your detailed explanation You’re absolutely right — with multi‑vendor VPNs, relying on vendor defaults usually causes mismatches. In my case, FortiGate was using AES‑256 (cbc) while the Cisco ASA was expecting AES‑256 (gcm), so Phase 2 negotiation was failing.
After explicitly defining AES‑256/SHA256 on both ends, the tunnel came up successfully. I’ll definitely follow your advice going forward and always define IKE/IPSec proposals explicitly instead of depending on defaults.
Appreciate your guidance and experience
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide