<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">Hi Yuri,<div><div><blockquote type="cite"><p class="MsoNormal"><span style="color:#1f497d">I’ve tried Netcomm NTC-6908 and
Cisco SRP 541W. Netcomm drops out every 30 minutes, Cisco dropouts every hour.</span><span style="color:black"></span></p></blockquote></div><div>Probably not the right list for technical support, but what you are seeing is normal Phase 2 re-keying. I'm not all that familiar with Fortigate, but a quick google shows that the default P2 key lifetime is 1800 seconds [1], which is ties in nicely with your logs (and seems awfully short IMHO). </div><div><br></div><div>You generally always see a small blip during a re-key, but on some kit phase 2 is re-negotiated prior to the previous key expiring in order to minimise this disruption.</div><div><br></div><div>I would increase the Fortigate's P2 lifetime up to 28800 or something similar:</div><div><div><br></div><div>config vpn ipsec phase2</div><div>edit <tunnel_name></div>set keylifeseconds 28800<div><br></div><div><div>and then do the same on your spoke devices (Netcomm/Cisco).</div></div><div><br></div></div><div>[1] <a href="http://docs.fortinet.com/fgt/handbook/40mr3/fortigate-cli-40-mr3.pdf">http://docs.fortinet.com/fgt/handbook/40mr3/fortigate-cli-40-mr3.pdf</a></div><br></div><div>Cheers,</div><div><br></div><div>Ben</div></body></html>