Chapter 10 IPsec VPN : Phase 1 parameters : Defining IKE negotiation parameters : Defining IKE negotiation parameters : Dead peer detection
  
Dead peer detection
Sometimes, due to routing issues or other difficulties, the communication link between a FortiGate unit and a VPN peer or client may go down. Packets could be lost if the connection is left to time out on its own. The FortiGate unit provides a mechanism called Dead Peer Detection, sometimes referred to as gateway detection or ping server, to prevent this situation and reestablish IKE negotiations automatically before a connection times out: the active Phase 1 security associations are caught and renegotiated (rekeyed) before the Phase 1 encryption key expires.
By default, Dead Peer Detection sends probe messages every five seconds by default (see dpd-retryinterval in the FortiGate CLI Reference). If you are experiencing high network traffic, you can experiment with increasing the ping interval. However longer intervals will require more traffic to detect dead peers which will result in more traffic.
In the web-based manager, the Dead Peer Detection option can be enabled when you define advanced Phase 1 options. The config vpn ipsec phase1 CLI command supports additional options for specifying a retry count and a retry interval.
For more information about these commands and the related config router gwdetect CLI command, see the FortiGate CLI Reference.
For example, enter the following CLI commands to configure dead peer detection on the existing IPsec Phase 1 configuration called test to use 15 second intervals and to wait for 3 missed attempts before declaring the peer dead and taking action.
config vpn ipsec phase1
edit test
set dpd enable
set dpd-retryinveral 15
set dpd-retrycount 3
next
end