| Description | This article describes that sometimes when deploying a new IPsec tunnel between a FortiGate and an Azure Vnet server the tunnel may not form or flap phase1 SA between established and connecting statuses. |
| Scope | Forming a tunnel between FortiGate and a Vnet server. |
| Solution |
diagnose vpn ike gateway list name <phase1 name>
diagnose sniffer packet any "host <vnet public ip> and esp" 4 0 l
diagnose vpn ike log-filter dst-addr4 <vnet public ip> diagnose debug application ike -1 diagnose debug enable
To stop the debugs, run the following commands:
diagnose debug disable
Note: Starting v7.4.1, the 'diagnose vpn ike log-filter dst-addr4' command has been changed to 'diagnosevpn ike log filter rem-addr4'.
config vpn ipsec phase1-interface edit <phase1 name> set passive-mode enable end
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.