Hello All,
I've been trying to establish a tunnel with a third party Fortigate in AWS, and whilst I have a working tunnel, I am seeing most peculiar errors coming back from the Fortigate, it basically is rejecting my traffic selectors, but I don't understand how the traffic selectors are being built. I have an R81.20 cluster with a specific vpn domain and we seem to be sending every address it knows about, even though they are outside the encryption domain and in some cases our infrastructure; even the sync interfaces are in there. I've even got the tunnel config for this 3rd party overriding the default and supplying a single address as the encryption domain, and yet this still comes back.
The other VPNs connected to this cluster are star with no routing through the center gateway. This tunnel is set to host to host, partly as that is what I was asked for, and partly because setting it to gateway-to-gateway it does not work, it does the phase1 and phase 2 but encrypted outbound traffic does not reach the host behind the endpoint.
Time: 2025-09-29T10:39:51Z
Interface Direction: inbound
Interface Name: daemon
Source: <Single 3rd party vpn terminator>
Destination: <internal address>
VPN Peer Gateway: <Single 3rd party vpn terminator>
Scheme: IKEv2 [UDP (IPv4)]
Ike: Child SA exchange: Sending notification to peer: Traffic selectors unacceptable MyTSi: <every address the gateway cluster knows about, including the sync interfaces and other vpn devices> MyTSr: <Single 3rd party vpn terminator> <Single 3rd party vpn host> <224.0.0.0 - 224.0.0.255> Peer TSi: <Single 3rd party vpn terminator> Peer TSr:
IKE Initiator Cookie: 97644c4ac718ec96
IKE Responder Cookie: 1ee98d9668bb508e
IKE Phase2 Message ID: 00000002
IKE IDs: <Single 3rd party vpn terminator>
Community: VPN_fortigate
Reject Category: IKE failure
VPN Feature: IKE
Action: Reject
Type: Log
Blade: VPN
Interface: daemon
Any ideas ?
Many thanks
Ian